Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1526 results found

1526 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Check Point Harmony Mobile

    Nettitude Limited

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Computacenter - CyberArk Endpoint Privilege Manager (EPM) SaaS

    Computacenter (UK) Ltd

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Trustmarque Palo Alto Cortex Xpanse

    Trustmarque Solutions Limited

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • Check Point VSX

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point VSX (Virtual System Extension) is a comprehensive network security solution that offers robust virtual firewall and VPN capabilities. It enables businesses to create multiple virtualised security gateways within a single hardware appliance, enhancing security flexibility and efficiency while reducing operational costs.

  • boxxe Cisco ThousandEyes

    BOXXE LIMITED

    ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.

  • boxxe Tenable One Enterprise Exposure Management Platform

    BOXXE LIMITED

    "Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface.

  • HCL AppScan on Cloud

    Intec Systems Ltd

    HCL AppScan is a dynamic application security testing solution designed for security experts and pen testers to use when performing security tests on web applications and web API. It runs automated scans that explore and test web applications based on one of the most powerful scanning engines available.

  • Accenture Email Security Services

    Accenture (UK) Limited

    A managed email security service to protect your email services from spam, malware and phishing attacks. The ability to perform advanced email routing, encryption and data loss prevention for your outbound email.

  • Barrier Networks Crowdstrike Falcon Counter Adversary Operations

    Barrier Networks

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Micro Focus, now OpenText - Fortify on Demand (FoD) on SaaS

    MICRO FOCUS

    Fortify on Demand (FoD) is a remotely-delivered, cloud-based application security as a service solution. Application security testing is performed and reviewed by application security experts using application testing technologies and manual techniques. All customers are provided access to our technical account support team.

  • ThreatMatch - Cyber Threat Intelligence Sharing Platform

    Security Alliance Limited

    The ThreatMatch Intelligence Portal / Platform is collaborative, purpose-built for intelligence sharing. ThreatMatch Community Subscription enables the development and operation of secure, trusted communities, based on sector, geography or collaborative efforts. Quickly share intelligence across the whole community and allow members of the community to share their own intelligence.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • Computacenter - IBM Netezza as a Service

    Computacenter (UK) Ltd

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • iboss Zero Trust Core Package

    Axians Networks Limited

    iboss is a cloud based Secure Web Gateway platform.  iboss utilises containerised cloud architecture allowing customers to migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. PDNS intergration, and admin created GDPR Zones UK datacentres. Includes Core Filtering, Malware detection and Data Loss Prevention as SaaS

  • Pathlock Cloud Application Access Governance (AAG)

    Resulting Ltd

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Cyber Vulnerability Research

    Leidos Innovations UK Limited

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • EIS (Cantium) Tenable Licensing

    Cantium Business Solutions

    Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.

  • Neotas Investigative SaaS Platform

    Neotas

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    Bytes Software Services

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc

  • CDW BlueVoyant - Digital Risk Protection (DRP)

    CDW Limited

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • BlackBerry AtHoc Critical Communication & Event Management

    BlackBerry UK Limited

    BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Global VAT Reporting Tool (GVRT)

    Ernst & Young LLP (EY)

    GVRT is a cloud-hosted, global Value Added Tax (VAT) and Goods and Services Tax (GST) reporting solution, that redefines and globally standardises the preparation, production, and reporting process of the business. EY GVRT is designed to simplify, digitise, and automate your indirect tax compliance, helping future proof your organisation.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    Phoenix Software Ltd

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • MTI Hybrid Datacenter- Rationalisation & Migration

    MTI Technology Ltd

    MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Microsoft Cloud App Security

    Ve3 Global Ltd

    Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • AvePoint Policies for Microsoft 365

    Bytes Software Services

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive. bssgc

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.