Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Optimizely headless website build

    TRUE DIGITAL LIMITED

    Building world class websites using Optimizely as a headless CMS, and creating high performing digital experience platforms to answer our clients bespoke requirements.

  • MyTeamsWork Case Management

    CLOUD APPLICATION SERVICES LTD

    MyTeamsWork is a flexible case management system, integrated with MS Teams and Microsoft 365. Our self-hosted package can be deployed in a few easy steps to Cloud infrastructure, running a compatible technology stack so that you can get started quickly and focus on delivering value early.

  • Tenable PCI-ASV

    BYTES SOFTWARE SERVICES LIMITED

    Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc

  • Digital IoT Tracking and Resource Management

    ISHELP.CO.UK LIMITED

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • MTI Managed Microsoft Defender for Endpoint (MDE) / (XDR)

    MTI TECHNOLOGY LIMITED

    We provide a fully Managed Microsoft Defender Service, monitored by our 24x7x365 UK SOC using SC cleared SecOps analysts. We fully configure your Microsoft Defender deployment, to prevent attacks, detect, analyse, and respond to alerts and security issues using the Defender tooling.

  • Power App

    Clarity Tech Ltd

    We use Microsoft Office 365 which include SharePoint Online, Power App, Exchange Online, Lync Online and Office Professional Plus. Most of these online services have a subset of the features available on their on-premises counterparts. We can help migrate existing systems, or deploy new systems into Office 365.

  • Managed PKI

    ENTRUST (EUROPE) LIMITED

    Managed PKI gives you your own high assurance, dedicated PKI, fully managed (and optionally certified) from Entrust's ultra-secure facilities, located in the UK. With Managed PKI you have a fully bespoke, PKI platform ready for all enterprise certificates, remote signing (TrustedX), eIDAS compliant Qualified Certificates etc.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • CardEasy secure contact centre payment solutions

    ECKOH UK LIMITED

    CardEasy enables you to de-scope your contact center environment from PCI DSS, including voice and digital engagement channels. Seamless integration with your existing telephony and IT infrastructure reduces the risks and costs associated with managing compliant card payment transactions in your contact centers, whilst improving customer experience and trust

  • Enterprise Risk Management and Portfolio Analysis application (ERM)

    riskHive Software Solutions Ltd

    riskHive Enterprise Risk Manager® is a secure private-cloud risk database that supports all your risk management needs and is fully configurable to meet the changing requirements of your risk management journey. riskHive ERM supports the management of risk, opportunity, actions, controls, issues, dependencies, BIA, assumptions, benefits and modelling.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Cylance - End Point AI Enabled Anti Virus Protection

    Grove Information Systems

    Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.

  • Check Point Harmony Browse

    INTEGRITY360 LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Web Application Development

    JBi Digital

    JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective. Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.

  • BT Managed Endpoint Security CrowdStrike

    BT PLC

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    VE3 GLOBAL LTD

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.

  • Armis Centrix

    INTEGRITY360 LIMITED

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.

  • CHARMS

    SOCIAL CARE NETWORK SOLUTIONS LIMITED

    Secure hosting, development, Case Management. Children: front-door referral service, child protection, family hubs, care orders, Regional Adoption Agencies, prospective adopter assessment, adoption support, letterbox, fostering, foster carer recruitment, assessment, panel, payments, residential care, semi-independence, care leavers, supported living, Adults: shared lives, residential care, supported employment, day care and domiciliary care.

  • Armis Centrix

    Communication-STEM Ltd

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.

  • Privacy Management platform

    GET SWARMS LIMITED

    Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.

  • OKTA SSO and Identity Management Software License and Deployment Service

    AVELLA SECURITY LIMITED

    Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA

  • BeyondTrust Identity Security Insights

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc

  • CrowdStrike Falcon Identity Protection

    BT PLC

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..

  • Microsoft Office 365

    Synergi Software Limited

    Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.

  • CheckPoint Harmony Browse

    BYTES SOFTWARE SERVICES LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc

  • KnowBe4 Security Awareness Training and Phishing Simulation

    LINEAL SOFTWARE SOLUTIONS LIMITED

    Lineal provide Phishing Campaign design and execution services for customers followed by management reporting and end user training to support real business change and develop improved awareness of modern cyber security risks. We also provide full support and are a Microsoft Gold and KnowBe4 partner providing licensing and support.

  • CDW Cisco Secure Access Service Edge (SASE)

    CDW LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Mimecast Cybergraph

    QUADRIS LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Computacenter - IBM Cloud Pak for Data

    Computacenter (UK) Ltd

    IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.