Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2502 results found

2502 results found in Lot 2: Cloud software in the category Security

  • Tanium Converged End Point Management (XEM)

    Khipu Networks Limited

    Visibility, control, compliance and remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • CrowdStrike Falcon Counter Adversary Operations

    INTEGRITY360 LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Proofpoint Threat Protection Suite

    SOFTCAT PLC

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Phonehub Advanced Contacts Manager

    PHONEHUB IO LTD

    Secure intelligent system to identify, authenticate, and manage prisoner contacts. Designed to reduce resource requirements, improve security and public protection, and improve family contact. Integrates with HMPPS systems.

  • Active Directory Compromised Password Monitoring

    PEGASUS LABS PTY LTD

    Pegasus Labs AD Protection stops users adding common or compromised passwords to their accounts, resets existing breached passwords and detects AD misconfigurations. It continually monitors and automatically responds to new breaches keeping Active Directory and Azure AD secure.

  • Mimecast Brand Exploit Protect

    CHESS ICT LIMITED

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • SAP Cloud Platform Services

    LEFKE IT LIMITED

    At LefkeIT, our SAP Cloud Platform Services cater to Government Departments, facilitating seamless migration and optimization of SAP solutions in the cloud. From strategy development to implementation and support, we ensure efficient utilization of SAP Cloud Platform's capabilities. Trust us for reliable, cost-effective cloud solutions tailored to your organization's needs.

  • MEAConnexus

    ISSURED LIMITED

    Advancement in digital technology comes an increased risk to security with more opportunities for information to be compromised and, as a result, its quality, accuracy and reliability are open to challenge. Issured Mea : Connexus; a blockchain enabled video platform to support secure messaging, immutable records, collaboration and formalise records.

  • Workday Data Migration Services

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd offers specialized Workday Data Migration Services to ensure seamless, secure transfers of critical data for government departments. Our expert team guarantees efficient data integration, minimizing downtime and maintaining the utmost data integrity and compliance with regulatory standards.

  • DarkTrace Security Services

    THE SERVER LABS LTD

    Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. Join over 6,800 organizations worldwide that rely on a digital immune system to avoid cyber disruptions, without impacting regular business operations

  • Microsoft M365 for Frontline workers - F3

    BYTES SOFTWARE SERVICES LIMITED

    Microsoft 365 F3 is a complete, intelligent solution that combines Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely. bssgc

  • CDW Check Point Harmony Endpoint

    CDW LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Netsweeper Offsite Web Filter

    Netsweeper Inc.

    Part of the Netsweeper Education Ecosystem, works with the Netsweeper central platform to extend web filtering and digital monitoring to student devices, ensuring they remain protected when they leave the school’s network. It can be installed on Windows, OSX, Chrome, iOS and Android devices.

  • Technology Selection

    JBi Digital

    JBi Digital will guide you to build the optimal tech stack for your organisation with robust, scalable and secure solutions that are customised by certified professionals. Whether you’re updating entire systems or making targeted improvements, our approach is driven by your requirements and informed by in-depth user and system analysis.

  • UK Sovereign Multi Factor Authenication (MFA) - OKTA

    NINE23 LTD

    UK Sovereign managed Cloud service for effective Multi-Factor Authentication (MFA). Protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. OKTA provides simple, streamlined login experience for every user and application, it integrates easily with your existing technology.

  • Check Point CloudGuard Web Application Firewall (WAF)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • Splunk Threat Detection Investigation and Response Suite

    SOFTCAT PLC

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.

  • CrowdStrike Falcon Next Gen SIEM

    SOFTCAT PLC

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Galaxkey Secure Email

    INTEGRITY360 LIMITED

    Galaxkey Secure Email provides pure end-to-end Email Encryption. Features include: email revocation, classification, notifications and geofencing. All centrally managed with complete white labelling capabilities. Encryption is CPA Certified by the NCSC.

  • DyTASKⒸ Demand Modeller

    Innaxys Ltd

    DyTASK Demand Modeller provides an AI-driven approach to patrol demand analytics for policing/ public safety services. Using concepts from criminology, it provides realistic, real-time predictions of risk to inform patrol management. Taking into account populations, sociodemographic, forecasted conditions and other available intelligence data, it supports targeted responses in real time.

  • CDW Sophos Central Email Advanced (CEMA)

    CDW LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Vectra Detect for M365 + AWS

    INTEGRITY360 LIMITED

    As the industry’s first network detection and response solution for the cloud, Vectra Detect for Office 365 and Azure AD extends the proven platform that currently protects public clouds, private data centres, and enterprise environments to Microsoft Office 365.

  • Proofpoint Core - P1 Bundle

    PHOENIX SOFTWARE LIMITED

    Train end users to be more resilient against threats. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations/cultural/knowledge assessments, comprehensive training and awareness materials. Tailor training curriculum delivered to your users based on the actual threats they receive.

  • Cyber Security Awareness Testing & Training as a Service

    XEROX (UK) LIMITED

    The worlds largest integrated platform for Security Awareness Training and Simulated Phishing – the solution includes over 1,000 Course Modules & 14,000 Email Phishing Templates, with enterprise grade reporting displaying risk scores by user or department. This service is hosted in a Microsoft Azure ISO 27001 certified environment.

  • Privileged Access Management PAM

    SAPPHIRE TECHNOLOGIES LIMITED

    PAM suite provides Privileged Access Management and Task Automation to protect your IT infrastructure, cloud services and critical assets. By separating users from privileged credentials we enforce a " least privilege" policy which controls, monitors and audits authorised employees and third-party access.

  • Data Mapping and Records of Processing Activities

    TMC3 LIMITED

    Data Mapping and Records of Processing Activities by OneTrust. The platform enables organisations to identify personal data flows and maintain adequate records of processing activities to meet UK GDPR requirements. Seamlessly connect and discover all data systems utilising flexible intake methods including pre-built connectors, expert-crafted questionnaires, and bulk import tools.

  • Proofpoint Threat Protection Suite

    PHOENIX SOFTWARE LIMITED

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Broadcom/Symantec Protection Engine

    Gradian Systems Ltd

    Symantec Protection Engine (SPE) for Cloud Services 8.2 is a flexible and feature-rich client/server application that allows customers to incorporate malware and threat detection technologies into almost any application. SPE for Cloud Services provides access to innovative security that helps to ensure the safety of incoming content to your environment.

  • Microsoft Cloud Solutions Provider

    ARROW BUSINESS COMMUNICATIONS LIMITED (Trading under the brand name ARO)

    ARO are a Tier-1 Cloud Solutions Provider (CSP) allowing your organisation to benefit from license consultancy, procurement of services such as M365 licenses, Microsoft software licenses and Azure subscriptions as well as support, underpinning these services by leveraging Microsoft Premier Support. Access to procure licenses and services via self-service capability.

  • CDW Sophos Integration Packs

    CDW LIMITED

    Sophos offers seamless integration with a broad, open ecosystem of technology partners to deliver superior cybersecurity outcomes.