Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Cyber Security Awareness Training as a Service

    SCG CORPORATE LIMITED

    Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. KnowBe4 as a service is the world’s most popular integrated platform for awareness training combined with simulated phishing attacks and complete outsourced management makes SCCS a leading provider in cybersecurity awareness training.

  • Barrier Netowrks DNS, DHCP and IPAM (Infoblox Blox DDI)

    BARRIER NETWORKS LIMITED

    Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.

  • XM Cyber- Attack Path Management

    INTEGRITY360 LIMITED

    The XM Cyber platform continuosly and safely runs attack simulations across Hybrid-Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users-user-behavior that can allow an attacker to laterally move /compromise critical assets. XM Cyber then prioritises the issues/devices/accounts that put the most amount of critical assets at risk.

  • Sophos Central Email Advanced

    SOFTCAT PLC

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Barrier Networks Crowdstrike Falcon Cloud Security

    BARRIER NETWORKS LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • CDW Proofpoint Email Fraud Defense

    CDW LIMITED

    Email Fraud Defense stops email based identity deception. Access to a reporting portal and regular meetings with a Proofpoint consultant help to implement DMARC. Risky suppliers can be identified. SPF and DKIM can be hosted by Proofpoint and there is a Secure Email Relay option.

  • Akamai Software Services

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Sophos Intercept X Server

    CHESS ICT LIMITED

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • Managed Service Desk

    SOFTSERVE SYSTEMS LTD

    SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.

  • Data & Analytics in Local Government

    VE3 GLOBAL LTD

    In collaboration with Xantura,VE3 offers analytics-driven insights and facilitates proactive intervention to enhance outcomes. Our accredited and established solution, OneView,empowers organizations to securely harness growing amounts of citizen data. It automates case summaries, provides a unified view,utilizes predictive models to identify individuals at risk, and comprehends trends and demand drivers.

  • Concentric AI

    GRADIAN SYSTEMS LTD

    Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.

  • Recorded Future

    ITogether

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Anaconda Inc. Licenses

    JUMPING RIVERS LTD

    With over 25 million users worldwide and counting, Anaconda solves unique problems associated with conducting open-source data science in businesses across all industries, at scale. Anaconda empowers users of all levels to achieve their data science goals by making it easy to search and install thousands of Python/R packages.

  • Check Point Harmony Endpoint

    LRQA

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    SOFTCAT PLC

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS INTELLIGENCE LIMITED

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • COOLSPIRiT a Databarracks Company: Barracuda Email Protection Premium

    COOLSPIRIT LIMITED

    Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.

  • Akamai Akamai Cloud Computing

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Barracuda Endpoint XDR

    SCG CORPORATE LIMITED

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Mydex Safe, Secure Cloud for service integration and tranformation (SSC)

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    The need for transformation to locally integrated operational services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. The SSC allows organisations across varying sectors and regulatory environments, working together to deliver joined-up services.

  • Pathlock Cloud Application Access Governance (AAG)

    Grey Monarch Limited

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • ProofPoint Email Fraud Defence

    INTEGRITY360 LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW AvePoint Insights for Microsoft 365

    CDW LIMITED

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Lightspeed Alert - Safety Monitoring Tool

    Sync

    Supporting equitable learning with iPad, Lightspeed Alert is a safety monitoring tool for schools. Utilising advanced AI, it detects concerning online behaviours such as cyberbullying, self-harm, and explicit content in real-time. Integrated with Google/Microsoft, it enables early intervention, promoting student safety with comprehensive device coverage.

  • AttackIQ breach attack simulation

    Bright Cyber

    AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.

  • Forcepoint Email Security

    CHESS ICT LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Claroty Secure Remote Access

    INTEGRITY360 LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • Computacenter - IBM API Connect On Cloud Reserved Instance (Dedicated)

    COMPUTACENTER (UK) LIMITED

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • Sophos Managed Detection and Response Essentials (MDR) Server

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • KnowBe4 Security Awareness Training platform

    FORDWAY SOLUTIONS LIMITED

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.