Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1537 results found

1537 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Sophos Central Device Encryption

    INTEGRITY360 LIMITED

    Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.

  • NodeZro Namespace Command Centre

    Through Technology Limited

    NodeZro Command Centre automates the discovery, mapping, monitoring, vulnerability management and supply chain risk analysis for Internet DNS Namespaces. It provides customers with an efficient automated process to understand and secure your external digital footprint while reducing the risk of domain hijacking and phishing attacks. The leading Namespace Security Tool.

  • KickSecure SOC

    Kick ICT

    We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security. We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.

  • CDW Check Point Harmony Browse

    CDW Limited

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Barracuda WAF as a Service

    QUADRIS LIMITED

    Combine full Web Application and API Protection (WAAP) functionality with a complete set of advanced security services and solutions that protect your applications against today’s multiplying threats. Whether your applications are deployed on-premises, in the cloud, or hybrid, Barracuda Application Protection makes it easy to keep them secure and available.

  • Progress Flowmon

    Phoenix Software Ltd

    Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.

  • IRIS Intelligence Cyber Security Remediation Tracker

    IRIS Intelligence Ltd.

    The IRIS Cyber Security Remediation Tracker enables enterprises to proactively identify and manage threats and vulnerabilities concerning Cyber Security. The service facilitates collaboration of IT and Business units in managing Cyber Security risks. The service can be used to integrate best practices and policies from NIST and NCSC.

  • Forescout Cyber Assurance

    CHESS ICT LIMITED

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.

  • Firewalls - FortiGate by Fortinet

    Brookcourt Solutions

    Leveraging Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide Area Networking (SD-WAN) and Software Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Proofpoint Threat Protection Suite

    INTEGRITY360 LIMITED

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Barracuda Email Protection Premium

    MISCO TECHNOLOGIES LIMITED

    Barracuda Email Protection Premium is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Sophos Mobile

    INTEGRITY360 LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Ark interview management

    DAVID HORN COMMUNICATIONS LIMITED

    Ark is an interview management solution for accurate functionality to receive, monitor and retain the evidence throughout its lifetime. The client applications are attachable to our Core backend and facilitates the recording of evidence on smart phones, interview rooms and laptops.

  • KnowBe4 KMSAT

    NETWORK INTEGRATION TECHNOLOGIES LTD

    KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.

  • Wiz Advanced

    Bytes Software Services

    Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. bssgc

  • Cisco Meraki from Cinos

    Cinos

    Cisco Meraki service from Cinos delivering cloud controlled wired and wireless networking, SD-WAN, network security, security cameras/CCTV and endpoint management. Wireless Access Points, LAN switches, security and SD-WAN, cellular gateways, smart cameras and sensors all controlled via simple, comprehensive cloud dashboard and fully managed by Cinos.

  • Falcon Data Protection

    Phoenix Software Ltd

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Microsoft Enterprise Mobility & Security (EM&S) & Intune Licenses - CoreGov

    Core

    Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3. Includes cybersecurity, eDiscovery, Azure Information Protection, Threat Analytics, MDM.

  • Delinea Secret Server (PAM)

    INTEGRITY360 LIMITED

    Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.

  • Bilingual umbraco CMS

    Spindogs Ltd

    Development of Bilingual Umbraco CMS mobile optimised, accessible websites. Spindogs' Umbraco CMS platform provides bespoke templates for content editors. GDPR compliant Umbraco CMS forms and tagging are out-of-the-box. Umbraco CMS offers version control, integrations, SSO, and multilingualism. Umbraco content management system is open-source, user friendly, and fully customisable.

  • boxxe Microsoft Defender for Identity

    BOXXE LIMITED

    Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline

  • Prizsm

    Ultranyx

    Prizsm ultra-secure data storage and communications in the public cloud. Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.

  • Palo Alto Cortex XSIAM

    Softcat Limited

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Check Point Harmony Email and Collaboration

    Softcat Limited

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Computacenter - Tanium Converged End Point Management (XEM)

    Computacenter (UK) Ltd

    Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • Keepit - Cloud Backup & Recovery (M365, Salesforce, Google, Azure AD, Zendesk, PowerBI, MS Dynamics)

    S3 Ltd

    SaaS Cloud Backup Solution Keepit provides data protection for all your key SaaS applications in one single, vendor-independent platform. We protect your crucial cloud data created in Microsoft 365, Entra ID (formerly Azure AD), Salesforce, Google Workspace, Azure DevOps, Power Platform, Dynamics 365, and Zendesk.

  • Aqua Software - The Complete Cloud Native Security Platform

    WM Promus

    Protect cloud native applications by minimizing their attack surface, detecting vulnerabilities, embedded secrets, and other security issues. Gain insight into your vulnerability posture and prioritize remediation and mitigation according to contextual risk. Accelerate development, enforce compliance, gain real-time visibility and control over your security posture and protect applications.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bssgc

  • Tenable Lumin

    Softcat Limited

    Calculate, communicate and compare your cyber risk.

  • Check Point Cloudguard Network Security (CGNS)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.