Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1526 results found

1526 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Check Point Harmony Endpoint

    Nettitude Limited

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    Softcat Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS Intelligence Ltd.

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • COOLSPIRiT a Databarracks Company: Barracuda Email Protection Premium

    COOLSPIRiT

    Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.

  • Akamai Akamai Cloud Computing

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Barracuda Endpoint XDR

    Southern Communications Corporate Solutions T/A SCG Corporate

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Mydex Safe, Secure Cloud for service integration and tranformation (SSC)

    Mydex Data Services Community Interest Company

    The need for transformation to locally integrated operational services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. The SSC allows organisations across varying sectors and regulatory environments, working together to deliver joined-up services.

  • Pathlock Cloud Application Access Governance (AAG)

    Grey Monarch Limited

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • ProofPoint Email Fraud Defence

    INTEGRITY360 LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW AvePoint Insights for Microsoft 365

    CDW Limited

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Lightspeed Alert - Safety Monitoring Tool

    GBM DIGITAL TECHNOLOGIES LIMITED

    Supporting equitable learning with iPad, Lightspeed Alert is a safety monitoring tool for schools. Utilising advanced AI, it detects concerning online behaviours such as cyberbullying, self-harm, and explicit content in real-time. Integrated with Google/Microsoft, it enables early intervention, promoting student safety with comprehensive device coverage.

  • AttackIQ breach attack simulation

    Bright Cyber (Voodoo technology LTD)

    AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.

  • Forcepoint Email Security

    CHESS ICT LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Claroty Secure Remote Access

    INTEGRITY360 LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • Computacenter - IBM API Connect On Cloud Reserved Instance (Dedicated)

    Computacenter (UK) Ltd

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    Bytes Software Services

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • KnowBe4 Security Awareness Training platform

    Fordway

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.

  • Tessian DLP

    INTEGRITY360 LIMITED

    Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.

  • CMS websites

    JBi Digital

    We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services. We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.

  • Palo Alto Prisma Cloud

    Bytes Software Services

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc

  • CDW Sophos Managed Detection and Response Complete (MDR) Endpoint

    CDW Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • USM Anywhere SIEM Licences

    MONDAS CONSULTING LTD

    Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.

  • boxxe Sophos Intercept X Advanced with XDR Server

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Barracuda 24X7 O365 Detection & Response

    Southern Communications Corporate Solutions T/A SCG Corporate

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.

  • Check Point Harmony SASE

    Charterhouse Voice & Data

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • GlobalSign Certificate Products

    GMO GLOBALSIGN LIMITED

    GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.

  • EIS (Cantium) BitWarden

    Cantium Business Solutions

    EIS (the trading arm of Cantium Business Solutions) provides BitWarden to help secure passwords, passkeys and sensitive information. Specialising in aiding with all aspects of BitWarden, we collaborate with the complete application suite within BitWarden's portfolio, addressing business obstacles, enhancing workflows, increasing efficiency and minimising costs.

  • Tenable PCI-ASV

    Softcat Limited

    An add-on to Tenable Vulnerability Management. Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.

  • Computacenter - ProofPoint Insider Threat Management

    Computacenter (UK) Ltd

    Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.

  • Web application firewall (WAF)

    Jisc Services Ltd

    The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.