Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • CDW Microsoft Windows 10/11 Enterprise E5 Suite

    CDW LIMITED

    Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11

  • CyberArk Workforce Identity

    BYTES SOFTWARE SERVICES LIMITED

    CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection . bssgc

  • Google Workspace

    COBRY LTD

    Google Workspace is Google’s secure productivity and collaboration platform, giving teams of all sizes the tools they need to get everything done, all in one place. The cloud based IT system means your teams can work and collaborate effectively no matter where they are.

  • Cyber Security Services - EDR, MDR, XDR, VM

    PLANNED LINK LTD

    Delivering enterprise-grade, threat-led Cyber Security Services that truly protect our clients. These services are able to deploy and configure a full suite of applications and use cases in your organisation tailored to specific requirements - Supporting: Microsoft, Elastic, Splunk, Tenable, Sophos, Barracuda and more

  • Proofpoint Advanced Package

    PHOENIX SOFTWARE LIMITED

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • CDW Microsoft Enterprise Mobility + Security E3

    CDW LIMITED

    Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics

  • Power BI for Microsoft 365 Users

    CLOUD COVER IT SERVICES LTD T/A Flyte

    Create a data-driven culture with business intelligence for all Enable everyone at every level of your organisation to make confident decisions using up-to-the-minute analytics. Microsoft Power BI enables data visualisation and dashboeard creation, CCIT support on all aspects: design, development, integration and maintenance.

  • Qualys Software Licensing and Renewals

    CLOUD 21 LIMITED

    Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Qualys to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Qualys VMDR software, including licensing consultancy services to help our clients get the most from their Qualys deployment.

  • MDM (Mobile Device Management)

    SCG CORPORATE LIMITED

    Mobile device management (MDM) provides enhanced security across a mobile fleet as well as supporting improved asset management and greater control of application deployment.

  • Check Point Harmony Browse

    SOFTCAT PLC

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • SAP Business Process Management

    LEFKE IT LIMITED

    At LefkeIT, our SAP Business Process Management services are designed for Government Departments. We specialize in analyzing, optimizing, and automating business processes within SAP systems. Leverage our expertise to streamline operations, improve efficiency, and drive innovation. Trust us to enhance your SAP environment for maximum effectiveness and productivity.

  • Check Point Harmony Mobile

    NETWORK INTEGRATION TECHNOLOGIES LTD

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • IBM Guardium on Cloud

    RESPONSIV SOLUTIONS LTD.

    The IBM Security Guardium for Marketplaces offering delivers an advanced data security solution based on the IBM Security Guardium Data Protection product. It allows Clients to automatically discover and classify sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behaviour analytics.

  • Consulting Services

    AVORD Limited

    A powerful client based platform that provides the management of time and costs across a wide range of consultancy, including security, operations and strategy. Examples include penetration testing, compliance certifications, Operational Technology (OT), 24x7 365 SOC Services.

  • Tenable Web App Scanning

    INTEGRITY360 LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • VMWare Workspace ONE UEM

    VE3 GLOBAL LTD

    VMWare Workspace ONE empowers enterprises with secure app management. Integrating access management and endpoint control, VE3 modernizes IT operations for mobile-cloud dynamics.

  • MetaPolicy

    MetaCompliance Ltd

    MetaPolicy enables organisations to automate and manage the key tasks associated with policy management. With MetaPolicy, organisations can increase policy participation, easily obtain employee attestation to key policies, and embed a culture of compliance.

  • Broadcom/Symantec Web Protection Suite

    Gradian Systems Ltd

    Symantec WPS gives organizations an advanced cloud-delivered Secure Web Gateway and leading on-premise SWG deployment—both of which can operate seamlessly together with a unified management, reporting, and policy control interface. It also includes Threat Intelligence, SSL Inspection, Content Analysis, Isolation, Sandboxing, WAF, and more.

  • Mimecast - Perimeter Defence Plan (Zone 1)

    PHOENIX SOFTWARE LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Computacenter - ProofPoint Tessian DLP

    Computacenter (UK) Ltd

    Adaptive Email DLP uses behavioural-AI to learn about employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential incidents. And it warns the user in real time, preventing sensitive data loss through email.

  • Microsoft Office 365 Threat Intelligence

    VE3 GLOBAL LTD

    VE3 offers comprehensive threat landscape analysis services for organizations, leveraging data from Windows endpoints, Azure Advanced Threat Analytics, and Office 365 Advanced Threat Protection. Our solution alerts security administrators to potential threats, enabling them to track threat actors and trends effectively, ultimately enhancing asset defence capabilities.

  • Forescout Automation & Control

    Cyberlab

    Network Security Automation & Control delivers real-time and continuous visibility across all asset types and enables secure and compliant connectivity between all asset types within the network. Organizations can automate compliance and policy control and enable quick incident recovery while integrating and automating workflows for improved cybersecurity response.

  • boxxe Enterprise Mobility + Security E5

    BOXXE LIMITED

    Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security

  • Sophos Firewall

    Cyberlab

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Keyfactor EJBCA Azure AWS

    UNSUNG LIMITED

    EJBCA PKI for Enterprises - A powerful and flexible certificate issuance and management system to issue and enable full life-cycle control of digital certificate and Certificate (CA), Registration (RA) and Validation Authorities (VA); enabling multiple use cases and standards compliance.

  • Exchange Online Archive

    PHOENIX SOFTWARE LIMITED

    Cloud-based, enterprise-class archiving solution that solves archiving, compliance, regulatory and eDiscovery challenges. Immutable preservation of information with in-place hold, with a well-integrated user experience. Unlimited archive storage of Exchange data using retention policies.

  • Microsoft Online Services and Agreements

    BYTES SOFTWARE SERVICES LIMITED

    Select your tailored Microsoft agreement from the complete range of Microsoft online services and software. bssgc

  • M365 E5 eDiscovery and Audit

    PHOENIX SOFTWARE LIMITED

    Quickly find relevant data and respond efficiently for a variety of requests including litigations, investigations, and privacy regulations

  • Rapid7 InsightIDR

    BYTES SOFTWARE SERVICES LIMITED

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry. bssgc

  • Document Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of their document management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.