Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Guardicore Software Defined Segmentation Managed Service

    AVELLA SECURITY LIMITED

    The Guardicore Centra Security Platform allows you automatically visualise your entire data centre environment, map application dependencies and flows to identify security gaps, and create policies based on asset classification, including AI-powered templates, reducing your attack surface and minimising the risk of Ransomware

  • Crowdstrike Falcon Next gen SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.

  • Tessian ICES

    INTEGRITY360 LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Barrier Networks

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Micro Focus, now OpenText - OpenText Core IAM Foundation on SaaS

    MICRO FOCUS

    OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides: • Identity Governance • Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework • Password Management • Identity Intelligence Basic

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Centerprise Email Archiving Solution by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit

  • e2e Vulnerability Scanning Service

    e2e-assure Ltd

    Find vulnerabilities in your external-facing services - before attackers do. Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.

  • CDW AvePoint EnPower for Microsoft 365

    CDW LIMITED

    As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365. AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Identity and access management (IDAM)

    ZAIZI LTD

    Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions. We provide skills and advice guiding you from discovery through to implementation.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Aiimi Insight Engine – Migration

    AIIMI LIMITED

    Insight Engine provides extensive automation to support your migration activities, whether these are simple cloud migrations or more complex content management migrations between systems such as File Shares, Cloud Storage, SharePoint, Cloud Storage or OpenText Content Server. Rules based migrations can take advantage of the extensive metadata extraction routines provided.

  • Incident Management Solution

    GET SWARMS LIMITED

    Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.

  • Tenable PCI-ASV

    PHOENIX SOFTWARE LIMITED

    Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • IBM Watson Query

    IBM UNITED KINGDOM LIMITED

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • Dell PowerProtect DD Virtual Edition

    PHOENIX SOFTWARE LIMITED

    A software-defined, immutable data protection and cyber recovery solution from Dell's PowerProtect DD series, also known as Dell Data Domain Virtual Edition - DDVE. Allows fast and flexible deployments for backup and disaster recovery solutions in cloud and hybrid environments.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • RiskTree

    2T SECURITY LTD

    RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • SolarWinds User Device Tracker (UDT) License

    Prosperon Networks Ltd

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    e2e-assure Ltd

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • Identity Assurance Services

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer a range of Identity Assurance Services, covering strategy, design, development, operational support and implementation services. With digital identity industry expertise, we provide services ranging from securing digital channels to performing biographical and biometric checks, ensuring the accuracy of an identity claim.

  • Disclosures DBS - Disclosure and Barring Service (DBS) services

    Atlantic Data

    Atlantic Data's Disclosures service offers organizations an online platform for processing, administering, and managing criminal record checks for staff and volunteers. This service connects directly to the DBS through its efficient eBulk service. Disclosures includes a suite of management information to support organizations in managing and overseeing these checks.

  • Barrier Networks Crowdstrike Falcon Identity Threat Detection & Protection

    Barrier Networks

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • Mimecast DMARC Analyzer

    CHESS ICT LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • SecurEnvoy MFA / Identity Access Platform

    Cyberlab

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.