Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1695 results found

1695 results found in Lot 2: Cloud software in the category Security risk management

  • CrowdStrike Falcon Cloud Security

    Softcat Limited

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Netwrix Privilege Secure

    INTEGRITY360 LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.

  • Microsoft 365 Teams Phone

    Atlas Cloud Ltd

    Microsoft 365 Teams Phone allows you to replace your existing VoIP system with features directly delivered from Microsoft 365. Calls between users within your organization are handled internally, removing long-distance costs on internal calls. It’s like having a digital phone system integrated seamlessly with your collaboration tools.

  • CDW CrowdStrike Falcon Next Gen SIEM

    CDW Limited

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Rubrik Cloud Data Management, Backup and Recovery

    Khipu Networks Limited

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.

  • Sophos Intercept X Advanced with X/MDR

    INTEGRITY360 LIMITED

    Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.

  • boxxe Tenable Unified CNAPP and CIEM software

    BOXXE LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • Cylance Unified Endpoint Security Platform - Prevention First

    BlackBerry UK Limited

    For over a decade, Cylance® AI ENDPOINT has been deployed by businesses and governments around the world, proving its effectiveness in stopping both current and future zero-day attacks with astounding accuracy as validated by leading independent test labs

  • Optimizely headless website build

    True Digital

    Building world class websites using Optimizely as a headless CMS, and creating high performing digital experience platforms to answer our clients bespoke requirements.

  • MyTeamsWork Case Management

    Cloud Application Services

    MyTeamsWork is a flexible case management system, integrated with MS Teams and Microsoft 365. Our self-hosted package can be deployed in a few easy steps to Cloud infrastructure, running a compatible technology stack so that you can get started quickly and focus on delivering value early.

  • Tenable PCI-ASV

    Bytes Software Services

    Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc

  • Digital IoT Tracking and Resource Management

    ishelp.co.uk Ltd

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • MTI Managed Microsoft Defender for Endpoint (MDE) / (XDR)

    MTI Technology Ltd

    We provide a fully Managed Microsoft Defender Service, monitored by our 24x7x365 UK SOC using SC cleared SecOps analysts. We fully configure your Microsoft Defender deployment, to prevent attacks, detect, analyse, and respond to alerts and security issues using the Defender tooling.

  • Power App

    Clarity Tech Ltd

    We use Microsoft Office 365 which include SharePoint Online, Power App, Exchange Online, Lync Online and Office Professional Plus. Most of these online services have a subset of the features available on their on-premises counterparts. We can help migrate existing systems, or deploy new systems into Office 365.

  • Managed PKI

    Entrust Datacard (Europe) Limited

    Managed PKI gives you your own high assurance, dedicated PKI, fully managed (and optionally certified) from Entrust's ultra-secure facilities, located in the UK. With Managed PKI you have a fully bespoke, PKI platform ready for all enterprise certificates, remote signing (TrustedX), eIDAS compliant Qualified Certificates etc.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • CardEasy secure contact centre payment solutions

    ECKOH UK LIMITED

    CardEasy enables you to de-scope your contact center environment from PCI DSS, including voice and digital engagement channels. Seamless integration with your existing telephony and IT infrastructure reduces the risks and costs associated with managing compliant card payment transactions in your contact centers, whilst improving customer experience and trust

  • Enterprise Risk Management and Portfolio Analysis application (ERM)

    riskHive Software Solutions Ltd

    riskHive Enterprise Risk Manager® is a secure private-cloud risk database that supports all your risk management needs and is fully configurable to meet the changing requirements of your risk management journey. riskHive ERM supports the management of risk, opportunity, actions, controls, issues, dependencies, BIA, assumptions, benefits and modelling.

  • MTI Trend Micro Vision One

    MTI Technology Ltd

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Check Point Harmony Browse

    INTEGRITY360 LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Web Application Development

    JBi Digital

    JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective. Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.

  • BT Managed Endpoint Security CrowdStrike

    BT PLC

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    Ve3 Global Ltd

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.

  • Armis Centrix

    INTEGRITY360 LIMITED

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.

  • CHARMS

    SOCIAL CARE NETWORK SOLUTIONS LIMITED

    Secure hosting, development, Case Management. Children: front-door referral service, child protection, family hubs, care orders, Regional Adoption Agencies, prospective adopter assessment, adoption support, letterbox, fostering, foster carer recruitment, assessment, panel, payments, residential care, semi-independence, care leavers, supported living, Adults: shared lives, residential care, supported employment, day care and domiciliary care.

  • Income Management and Enterprise Cash Receipting

    Digital Modus Ltd

    Digital Modus Supplier Relationship Manager (SRM) simplifies and automates contract management from initiation through renewal, ensuring compliance and optimising negotiation outcomes. Utilise dynamic dashboards to monitor supplier performance metrics in real-time, ensuring compliance with SLAs, KPI Tracking and continuous improvement. Ensure transparency and compliance with procurement legislation and best practices.

  • Armis Centrix

    Communication-STEM Ltd

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.

  • Privacy Management platform

    GET SWARMS LIMITED

    Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.

  • OKTA SSO and Identity Management Software License and Deployment Service

    BLOCKPHISH

    Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA