Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Sophos Intercept X Advanced with XDR Server

    SOFTCAT PLC

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Wordpress

    SPINDOGS LTD

    Design and development of mobile optimised, accessible Wordpress content management system websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Tenable Cloud Security

    PHOENIX SOFTWARE LIMITED

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.

  • IDENTITY AND ACCESS MANAGEMENT SERVICE (IAMS)

    TEXUNA TECHNOLOGIES LTD

    Identity Provider (IdP) with Role-Based Access Control (RBAC) Lifecycle for enterprise authentication and authorisation. Secure API-driven access to any application with centralised IAM policies. Integrate identity information across user journey lifecycle for joiners, movers and leavers. OAuth and SAML-based Single Sign-On for behaviour tracking and attribute exchange between integrated systems.

  • Victim and Vulnerable Persons Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower case managers to support victims and vulnerable people at every stage of their journey. Secure, scalable, with UK GDPR and DPA Pt3 compliance. Quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK Data Sovereignty for efficient, sustainable, and legal operations.

  • CDW Palo Alto Prisma Access

    CDW LIMITED

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • boxxe Sophos Mobile

    BOXXE LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Ultima AvePoint Cloud Management for Office 365

    ULTIMA BUSINESS SOLUTIONS LTD.

    Reduce the administration overhead associated with Office 365 by centrally managing configuration tasks and permissions. Address issues in bulk such as policy violations. Ensure content is available to the right users when it is needed.

  • Microsoft Power Automate

    VE3 GLOBAL LTD

    Power Automate democratizes intelligent automation by empowering everyone, from end users to experts at the forefront of technology, to seamlessly build secure, automated solutions that combine robotic process automation (RPA) and digital process automation (DPA) into a single cloud-based solution.

  • CloudCover 365 Backup

    Advania UK (CCS) Limited

    Backup Microsoft Office 365 data at the click of a button. Our fully browser managed solution provides a feature-rich office 365 backup solution and allows you to be secure in the knowledge that Veeam is protecting your data securely in the UK.

  • Managed XDR Powered By Barracuda (includes O365 monitoring)

    QUADRIS LIMITED

    Managed security product that collects, aggregates, and normalises log data from hundreds of sources for AI enabled analysis using Barracuda Network’s analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Identifies threat like behaviour in your systems such as impossible logins, multi-factor bypass, coordinated attacks, and rogue agents.

  • Druva Data Resiliency Cloud - Endpoints and SaaS Applications

    SOFTCAT PLC

    Druva provides a flexible, comprehensive platform to centrally-protect and govern business-critical data across endpoints, and multiple SaaS applications. Built in the cloud, Druva makes it easy to discover, protect, and govern your SaaS data, even if it is complex, distributed, and fluid.

  • Sophos Intercept X Advanced with XDR Server

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Cloudflare Cloud Email Security

    INTEGRITY360 LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • Barrier Networks DevOps Platform (Sonatype Nexus)

    BARRIER NETWORKS LIMITED

    Our integrated open source governance platform (Nexus) helps more than 1,000 organizations and 10 million software developers simultaneously accelerate innovation and improve application security.

  • imc Cyber Crime Time

    Scheer IMC (UK) LEARNING LTD

    In today’s digital age, the threat landscape is rapidly evolving, making robust cybersecurity awareness more essential than ever. That’s where Cyber Crime Time comes into play—a groundbreaking modular cybersecurity awareness campaign designed to revolutionize how your team interacts with IT security.

  • WSO2

    Mitra Innovation

    As a WSO2 Platinum Partner, Mitra has spent well over a decade helping clients deliver integration, API management and IAM projects. We specialize in Open Banking (OB), Insurance, Financial Services, Healthcare and Telecommunications, and have applied WSO2 technology to the business problems and opportunities of our clients in 20+ countries.

  • YUDU Sentinel

    YUDU Sentinel

    Keep vital business communications running in a crisis, when all other systems fail. Sentinel delivers mass notification, document hosting and collaboration tools to help manage an incident remotely from any device, to keep crisis response teams and key stakeholders updated throughout the life cycle of any critical event.

  • Domain Tools - DNS Threat Intelligence (CTI)

    Bright Cyber

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain names, DNS and related data for cyber threat intelligence.

  • AvePoint Confide

    PHOENIX SOFTWARE LIMITED

    Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide

  • Sophos Intercept X Mobile

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Trustmarque Quest On Demand

    TRUSTMARQUE SOLUTIONS LIMITED

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT/Partners/MSPs move faster, tighten security and control hybrid Office365 environments. Migrate, manage, report, secure and recover hybrid AD/Office 365 workloads across all tenants from a single dashboard. One-stop platform for secure SaaS solutions for Office365 migration, management, security.

  • Nexus Managed M365 Defender Endpoint Security

    NEXUS OPEN SYSTEMS LIMITED

    Nexus Managed M365 Defender Endpoint Security gives your organisation the latest best in class Anti-Virus Endpoint Security and Email Security without the headache. The service is built around a simple per device per month cost. Updates and upgrades included.

  • Computacenter - Palo Alto Prisma Cloud

    COMPUTACENTER (UK) LIMITED

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • BMC Helix Client Management

    Fusion Business Solutions (UK) Limited

    BMC Client Management optimises your service management cloud solution to provide comprehensive, automated endpoint management, delivery of great service to end users whilst minimising cost, maintaining compliance and reducing security risk. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Client Management.

  • Phishing Protection

    PEGASUS LABS PTY LTD

    Automate the response to phishing, spam and malware emails based on user reports and global threat intelligence. Reduce the time required for security staff to process email by identifying phishing campaigns and automatically grouping and responding to all emails at once.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    PHOENIX SOFTWARE LIMITED

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • Barrier Networks DNS Detection and Response solution (InfoBlox Threat Defence)

    BARRIER NETWORKS LIMITED

    DNS Detection and Response solution, detects threat activity and stops attacks occurring, using DNS threat intelligence, disrupting attacker supply chains. AI-driven analytics focuses analysts and provides insights reducing MTTR, raise ROI of existing security tools, and elevate SecOps efficiency. Domain Monitoring/Domain Takedown services enable brand protection and combat emerging threats.

  • WithSecure Vulnerability Management

    IOCO SOLUTIONS LIMITED

    WithSecure™ Elements Vulnerability Management is an easy-to-deploy, cloud-based vulnerability scanner that covers your network, assets, the deep web and compliance.

  • Barrier Networks Crowdstrike Falcon Complete MDR

    BARRIER NETWORKS LIMITED

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.