Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1553 results found

1553 results found in Lot 2: Cloud software in the category Secure content and threat management

  • CrowdStrike Falcon Data Protection

    INTEGRITY360 LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Barracuda Email Protection Premium

    PRIMESYS LTD

    Barracuda Email Protection Premium is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Crowdstrike Falcon Identity Threat Detection & Protection

    SOFTCAT PLC

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • 2FA messaging

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    SOFTCAT PLC

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Censornet Unified Security Service (Email, Web, CASB, MFA)

    Network Utilities (Systems) Ltd

    Web Security, Cloud Access Security Broker (CASB), Email Security, Compliant Email Archiving, and Multi-Factor Authentication on a single unified cloud hosted platform.

  • Sophos Central Intercept X Advanced with XDR and Managed Threat Response Standard

    INTEGRITY360 LIMITED

    Central Intercept X Advanced with Managed Threat Response (MTR) Standard is for organisations seeking the best protection coupled with the Sophos Managed Threat Response service. Includes all features in Central Intercept X Advanced with XDR plus 24/7 Threat Hunting, Adversarial Detections, Security Health Check, Data Retention, and Activity Reporting.

  • Tenable Lumin

    BYTES SOFTWARE SERVICES LIMITED

    Calculate, communicate and compare your cyber risk. bssgc

  • Castlepoint Manage Information Everywhere

    STLP CONSULTING PTY LTD

    Castlepoint reads, registers and regulates all information in a network, in any format and any system. It uses Explainable AI to automatically detect and classify high-risk and high-value information, and track what happens to it. It provides enterprise eDiscovery, privacy and security management, audit, records management, and Generative AI governance.

  • NowPrivacy

    Smartlytics Consultancy Limited

    NowPrivacy is a comprehensive data governance and management platform designed to empower organisations fully understand and control their data landscape. As data environments grow increasingly complex, NowPrivacy provides a robust solution to navigate, manage, and secure both unstructured and structured data, ensuring compliance and enhancing data privacy across the board.

  • Delinea Secret Server (Formerly Thycotic Centrify)

    ITHQ LTD

    Delinea Secret Server is a comprehensive Privileged Access Management (PAM) solution that securely manages and audits access to critical systems and data. It offers robust functionality including encrypted credential storage, session monitoring, role-based access controls, and compliance reporting, both in the cloud and on-premises. Remove complexity of legacy PAM solutions.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    Gradian Systems Ltd

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Forcepoint Cloud Access Security Broker (CASB)

    Cyberlab

    Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions on using the Cloud

  • Nexus Mobile Device Management (MDM)

    NEXUS OPEN SYSTEMS LIMITED

    Microsoft Enterprise Mobility + Security is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. Service includes: Azure Active Directory Premium; Microsoft Cloud App Security; Microsoft Intune; Azure Information Protection and Microsoft Advanced Threat Analytics.

  • SonicWall Secure Mobile Access - SMA8200v - with Central Management Server

    SOFTCAT PLC

    SonicWalls SMA8200v is an enterprise grade zero trust virtual appliance with FIPS 140-2 certification for customers needing to maintain full control over data & management planes. It can support user counts typically starting at 50 and moving upwards into the tens of thousands.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    INTEGRITY360 LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Fortinet FortiVM - Cloud-Native Network Firewall Service

    ITHQ LTD

    Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.

  • Stone Cloud Enterprise Network Security - Cisco Umbrella

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • Security Awareness & Phishing Training - KnowBe4

    RAZOR THORN SECURITY LTD

    KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.

  • Rapid7 InsightCloudSec

    Cyberlab

    "InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management"

  • Secure Software Development Lifecycle

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.

  • CheckPoint Harmony Email & Collaboration (Avanan)

    NOC365 LTD

    Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.

  • Check Point Harmony Email and Collaboration

    SAPPHIRE TECHNOLOGIES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • COOLSPIRiT a Databarracks Company: Barracuda Web Application Firewall (WAF-as-a-Service)

    COOLSPIRiT, a Databarracks company

    Barracuda Web Application Firewall blocks sophisticated web-based attacks that target the applications hosted on web servers and the sensitive or confidential data to which they have access. Placed between the Internet and web servers, scan all inbound web traffic to block attacks and outbound traffic to prevent data loss.

  • Computacenter - CrowdStrike Falcon Identity Threat Detection & Protection

    Computacenter (UK) Ltd

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • boxxe Cisco Secure Access Service Edge (SASE)

    BOXXE LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Akamai DNS Security - Enterprise Threat Protector (ETP)

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Secure Data Environment - SDE

    HITACHI DIGITAL SERVICES UK LIMITED

    Fully integrated, cloud-native solution enabling healthcare research and analytics teams to securely access and collaborate on diverse data sets through tailored, self-service analytics workspaces used for collaborative clinical research and analysis.

  • KGN Data Engineering and Data Science

    KGN Software Ltd

    KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.

  • Kentico

    SPINDOGS LTD

    Kentico for mobile optimised, accessible website development. Spindogs' Kentic CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.