Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Centerprise Email Archiving Solution by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit

  • e2e Vulnerability Scanning Service

    e2e-assure Ltd

    Find vulnerabilities in your external-facing services - before attackers do. Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.

  • CDW AvePoint EnPower for Microsoft 365

    CDW LIMITED

    As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365. AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Identity and access management (IDAM)

    ZAIZI LTD

    Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions. We provide skills and advice guiding you from discovery through to implementation.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Aiimi Insight Engine – Migration

    AIIMI LIMITED

    Insight Engine provides extensive automation to support your migration activities, whether these are simple cloud migrations or more complex content management migrations between systems such as File Shares, Cloud Storage, SharePoint, Cloud Storage or OpenText Content Server. Rules based migrations can take advantage of the extensive metadata extraction routines provided.

  • Incident Management Solution

    GET SWARMS LIMITED

    Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.

  • Tenable PCI-ASV

    PHOENIX SOFTWARE LIMITED

    Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • IBM Watson Query

    IBM UNITED KINGDOM LIMITED

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • Dell PowerProtect DD Virtual Edition

    PHOENIX SOFTWARE LIMITED

    A software-defined, immutable data protection and cyber recovery solution from Dell's PowerProtect DD series, also known as Dell Data Domain Virtual Edition - DDVE. Allows fast and flexible deployments for backup and disaster recovery solutions in cloud and hybrid environments.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • RiskTree

    2T SECURITY LTD

    RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • SolarWinds User Device Tracker (UDT) License

    Prosperon Networks Ltd

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    e2e-assure Ltd

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • Disclosures DBS - Disclosure and Barring Service (DBS) services

    Atlantic Data

    Atlantic Data's Disclosures service offers organizations an online platform for processing, administering, and managing criminal record checks for staff and volunteers. This service connects directly to the DBS through its efficient eBulk service. Disclosures includes a suite of management information to support organizations in managing and overseeing these checks.

  • Barrier Networks Crowdstrike Falcon Identity Threat Detection & Protection

    Barrier Networks

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • Mimecast DMARC Analyzer

    CHESS ICT LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • SecurEnvoy MFA / Identity Access Platform

    Cyberlab

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • ServiceNow (ITSM/ITOM/CSM) - Fitness Check by SCC

    SPECIALIST COMPUTER CENTRES PLC

    SCC has a growing track record of delivering IMPACT to existing ServiceNow (ITSM/ITOM/CSM) customers via our tried and tested Fitness Check solution. Over customised environment? Not getting the benefit from ServiceNow’s family releases? Struggling to deliver ROI? Allow SCC to health check your Service Desk environment solving your issues

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • BeyondTrust Identity Security Insights

    SOFTCAT PLC

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Dev-ops Consulting Services

    VE3 GLOBAL LTD

    Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads.

  • Centerprise Email Spam Filtering by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    SpamTitan Cloud is a full-service, cloud based email security solution which protects your business, your employees and your clients. The cloud solution is simple to set up and manage, requires no software installation and provides 99.7% spam detection, virus and malware blocking, authentication control, outbound scanning and robust reporting structures.

  • KnowBe4 PhishER

    NETWORK INTEGRATION TECHNOLOGIES LTD

    PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns.