Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Nexus Mobile Device Management (MDM)

    NEXUS OPEN SYSTEMS LIMITED

    Microsoft Enterprise Mobility + Security is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. Service includes: Azure Active Directory Premium; Microsoft Cloud App Security; Microsoft Intune; Azure Information Protection and Microsoft Advanced Threat Analytics.

  • SonicWall Secure Mobile Access - SMA8200v - with Central Management Server

    SOFTCAT PLC

    SonicWalls SMA8200v is an enterprise grade zero trust virtual appliance with FIPS 140-2 certification for customers needing to maintain full control over data & management planes. It can support user counts typically starting at 50 and moving upwards into the tens of thousands.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    INTEGRITY360 LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Fortinet FortiVM - Cloud-Native Network Firewall Service

    ITHQ LTD

    Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.

  • Stone Cloud Enterprise Network Security - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • Security Awareness & Phishing Training - KnowBe4

    RAZOR THORN SECURITY LTD

    KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.

  • Rapid7 InsightCloudSec

    Chess CyberSecurity Ltd t/a CyberLab

    "InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management"

  • Secure Software Development Lifecycle

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.

  • CheckPoint Harmony Email & Collaboration (Avanan)

    NOC365 LTD

    Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.

  • Check Point Harmony Email and Collaboration

    SAPPHIRE TECHNOLOGIES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • COOLSPIRiT a Databarracks Company: Barracuda Web Application Firewall (WAF-as-a-Service)

    COOLSPIRIT LIMITED

    Barracuda Web Application Firewall blocks sophisticated web-based attacks that target the applications hosted on web servers and the sensitive or confidential data to which they have access. Placed between the Internet and web servers, scan all inbound web traffic to block attacks and outbound traffic to prevent data loss.

  • Computacenter - CrowdStrike Falcon Identity Threat Detection & Protection

    COMPUTACENTER (UK) LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • boxxe Cisco Secure Access Service Edge (SASE)

    BOXXE LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Akamai DNS Security - Enterprise Threat Protector (ETP)

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Secure Data Environment - SDE

    HITACHI DIGITAL SERVICES UK LIMITED

    Fully integrated, cloud-native solution enabling healthcare research and analytics teams to securely access and collaborate on diverse data sets through tailored, self-service analytics workspaces used for collaborative clinical research and analysis.

  • KGN Data Engineering and Data Science

    KGN SOFTWARE LTD

    KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.

  • Kentico

    SPINDOGS LTD

    Kentico for mobile optimised, accessible website development. Spindogs' Kentic CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Trustmarque Logpoint Converged SIEM and SOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to monitor, detect and alert on security events/incidents within an IT environment. It provides a comprehensive/centralised view of infrastructure security posture, activities and automated playbooks in response to events.

  • Tenable Vulnerability Management and PCI-ASV

    KHIPU NETWORKS LIMITED

    Identify and prioritise vulnerabilities based on risk to your business. The PCI ASV add-on allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organisation complies with PCI DSS.

  • ProofPoint Email Fraud Defence

    SOFTCAT PLC

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW Proofpoint Tessian Enterprise Data Loss Prevention

    CDW LIMITED

    Proofpoint Enterprise Data Loss Prevention (DLP) protects your organization against data loss that originates with your people. It brings together our solutions for email, cloud and endpoint DLP. The product combines content, behavior and threat telemetry from these channels to address the full spectrum of people-centric data-loss scenarios.

  • Charity Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft 365 Backup

    virtualDCS Ltd

    Backup Microsoft Office 365 data at the click of a button. Our fully browser managed solution provides a feature-rich office 365 backup solution and allows you to be secure in the knowledge that Veeam is protecting your data securely in the UK.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    CHESS ICT LIMITED

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • OCTANE Web and API Monitoring

    IB BOOST LTD

    IB Boost’s OCTANE platform combines the rich visualisation capabilities with dashboarding and monitoring with the ORQA automation robotic agents to provide a total web and monitoring solution that scales for all sizes, including synthetic user monitoring and API integrations points in a consolidated, modern web platform.

  • Forcepoint Advanced Malware Detection (AMD)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW, Web Security and Email Security to provide defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • CDW Sophos Zero Trust Network Access (ZTNA)

    CDW LIMITED

    "Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users."

  • Focus112 copy

    FOCUS DATA SERVICES LIMITED

    Focus Data's design systems tailored for both communication providers and law enforcement agencies, facilitating the streamlined handling of requests, retrieval, and analysis of communication data. Efficiently manage the acquisition of communication data from cellular service providers and transform it into actionable intelligence, benefiting operational inquiries and court proceedings.

  • CloudCover Guardian for Azure

    Advania UK (CCS) Limited

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Rapid7 InsightCloudSec

    INTEGRITY360 LIMITED

    InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management