Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3838 results found

3838 results found in Lot 2: Cloud software in the category Application security

  • Palo Alto Cortex XDR

    BYTES SOFTWARE SERVICES LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency. bssgc

  • MTI Delinea Secret Server Cloud Privilege Access Management & Privilege Manager

    MTI TECHNOLOGY LIMITED

    Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.

  • Barracuda SecureEdge (SASE)

    PRIMESYS LTD

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.

  • PSAT Security Awareness Training - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • CyberCyte EAR

    Grove Information Systems

    CyberCyte EAR is a Blue Team Platform for discovering and responding to threats and risks more accurately by creating a consolidated analysis framework integrating asset, threat, hardening baseline, and vulnerability information.

  • Informu Information Asset Register and Management System

    INFORMU SOLUTIONS LIMITED

    The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.

  • Wiz

    SOFTCAT PLC

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support

  • Evolve Security Automation

    2T SECURITY LTD

    Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business. This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.

  • Netwrix Recover for Active Directory

    INTEGRITY360 LIMITED

    Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime. This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects (GPOs), and more

  • Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

    BARRIER NETWORKS LIMITED

    MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

  • iplicit Finance for Nonprofits & Charities

    IPLICIT LIMITED

    iplicit empowers nonprofits and charities to simplify compliance, enhance transparency, and optimise financial operations. Its robust handling of complex funding structures and seamless integration capabilities make it an excellent choice for organisations focused on maximising efficiency and seeking to dedicate more resources to mission-critical activities.

  • Arcus Trading Standards

    ARCUS GLOBAL LIMITED

    Arcus Trading Standards is a flexible and intuitive cloud-based solution helping Trading Standard's practitioners manage all aspects of their work including inspections, investigations, monitoring, enforcement, providing advice, and managing evidence. The included mobile app supports full access and offline remote working. Enabling officers and teams to work efficiently and effectively.

  • Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

    NETWORK 2 SUPPLIES LIMITED

    N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

  • CDW Check Point Harmony SASE

    CDW LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Managed Azure Virtual Desktop

    Intercity Technology Limited

    Intercity’s Managed Azure Virtual Desktop is a secure, scalable virtual desktop solution. It enables access to Windows desktops and applications from anywhere, on any device with centralised management and automated updates. Improving productivity and flexibility while reducing IT overhead. Ideal for organisations embracing remote work and cloud-based desktop solutions.

  • Machine to Machine alerting

    BOOMALERT LIMITED

    BoomAlert automates incident communication. Build bespoke communication workflows, meet requirements for critical events. Alerting workflows automate coordinated processes based on responses, time triggers, count triggers and escalation paths. Critical Alerting, Incident Management, Business Continuity, IT Monitoring, Machine-2-Machine Alerting, Event Management. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited.

  • End to End Software Development, Resource Optimization with AI

    ADAPPT LIMITED

    Progressive software development services at Adappt. We develop robust, scalable and secured web/mobile applications. Share your ideas, taking your business on a success flight! Offload manual data input and repetitive tasks to AI for accurate/speedy results. Enables employees to concentrate on value-driven work, enhancing throughput and minimizing human errors.

  • Forcepoint Data Guard

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Wonde EduSync

    EVOUCHERS LTD

    Wonde’s innovative School Edusync is a Electronic document and records management (EDRM) tool that provides a secure and automated way to provision school Learning Management Systems (LMSs) such as Google-Workspace, Microsoft-SDS, and Apple School Manager with data from a schools MIS, automatically creating, updating and deleting users, groups and classrooms.

  • Identity Threat Defense & Response (ITDR) - Proofpoint

    BROOKCOURT SOLUTIONS LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Varonis SaaS Data Security Platform

    SOFTCAT PLC

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Powered by Neo: Vehicle Abandonment Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's Vehicle Abandonment Management solution efficiently addresses the challenges of managing abandoned vehicles in the housing sector. Our robust case management and task management capabilities streamline identification, monitoring, and resolution processes.

  • Geopolitical Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you. Accelerate your decision-making with contextualized OSINT data about geopolitical threats and trends. We fuse open source, dark web, technical sources, and original research. By dynamically linking, categorising, and updating intelligence in real time,

  • Scrap Metal Dealer's Registration Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ scrap metal dealer licensing software provides data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power you mandatory, selective and additional schemes.

  • Netwrix Endpoint Protector

    SOFTCAT PLC

    oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.

  • Sentinel Hotline

    YUDU Sentinel

    Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.

  • GBG IDscan Enterprise

    GB GROUP PLC

    GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.

  • Computacenter - Proofpoint Complete Package

    COMPUTACENTER (UK) LIMITED

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Panacea Sourcing Software

    PANACEA APPLICATIONS LIMITED

    End-to-end source-to-pay (S2P). Order to delivery, goods receipt and supplier invoicing. Audit trail, reports. GDPR and PCR Compliant. Accounts payable, finance system. Supplier portals. Configurable e-Catalogue, instant pricing options. Procurement, tendering, contract lifecycle management, due diligence. DPS, Dynamic Markets, frameworks. RFQ, further-competition. Evaluation, moderation, award. Category Management. Find-a-Tender, Contracts Finder.

  • Palo Alto Prisma Services

    CYBIT LIMITED

    Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include: Prisma Cloud for cloud application security Prisma Access (SASE) Cloud access security Prisma SaaS for visibility and control