Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2502 results found

2502 results found in Lot 2: Cloud software in the category Security

  • BMC Helix Continuous Optimization

    Fusion Business Solutions (UK) Limited

    BMC Helix Continuous Optimisation helps IT organizations effectively plan for changes in business demand and continuously optimize both IT cost and capacity. Fusion GBS is a Elite Partner of BMC, reselling BMC Helix.

  • Sophos Central Intercept X Advanced with XDR

    Planet IT

    Sophos Intercept X Advanced with EDR consolidates powerful endpoint detection and response (EDR) with unmatched endpoint protection. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely, respond with precision.

  • Fortinet Core Services

    IOCO SOLUTIONS LIMITED

    FortiGate, FortiManager and FortiAnalyzer solutions provide a core capability to any organization looking to improve their security posture. Flexible licensing models based on organizational and regulatory requirements results in great ROI. Backed by world leading security researchers and developers results in solutions for now and the future.

  • Forcepoint Insider Threat (FIT)

    CHESS ICT LIMITED

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Check Point Cloudguard WAFaaS

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point CloudGuard WAF provides Web Application and API protection.With deep application contextual analysis,it eliminates the tradeoff between the level of security and the complexity of managing application security.Whether your application is hosted in a datacenter or in a public/private cloud,CloudGuard's patent-pending decision engine covers,OWASP top ten attacks,API attacks

  • Zscaler Security from Virgin Media O2 Business

    Virgin Media Business

    Zscaler is a global cloud-based information security company that provides Secure Access Service Edge (SASE) solutions; internet security; web security; next generation firewalls; sandboxing; SSL inspection; antivirus; vulnerability management and granular control of user activity in cloud computing, mobile and Internet of Things (IoT) environments.

  • Forcepoint Cloud Web Security

    SAPPHIRE TECHNOLOGIES LIMITED

    Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership.

  • Akamai Bot Management and protection

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Palo Alto Networks Cortex Xpanse

    Khipu Networks Limited

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organisation actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • Sophos Intercept X Advanced with XDR

    SOFTCAT PLC

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • CDW OneTrust Privacy Management Technology

    CDW LIMITED

    OneTrust is the category-defining enterprise platform to operationalize trust. More than 12,000 customers, including half of the Fortune Global 500, use OneTrust to make trust a competitive differentiator, implementing central agile workflows across privacy, security, data governance, data protection, third-party risk, ethics and compliance, and ESG programs.

  • Proofpoint Archive

    INTEGRITY360 LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • Workday Process Redesign

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Workday Process Redesign, helping government departments optimize their operational workflows. Our services streamline processes, enhance efficiency, and improve user experiences by aligning Workday functionalities with specific organizational needs and goals.

  • Barracuda Email Protection Advanced

    PHOENIX SOFTWARE LIMITED

    Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Nutanix Security and Compliance services

    HYPER TALENT SOLUTIONS LTD

    Nutanix Security and Compliance service offers robust solutions to safeguard data and infrastructure. It ensures adherence to industry standards and regulatory requirements. This service provides advanced security measures, continuous monitoring, and proactive threat detection, ensuring data integrity and protecting against cyber threats, enabling businesses to maintain compliance.

  • Fortinet Fortigate Managed Firewall Service

    QUADRIS LIMITED

    Quadris offer the Fortinet flagship enterprise firewall platform, FortiGate, as a fully managed firewall solution, it is available in a wide range of sizes and form factors to fit any environment. Quadris offers 24x7x365 support, deployment-flexibility, predictable costs. Quadris provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    PHOENIX SOFTWARE LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Barrier Networks Centri for Secure Access Service Edge & Zero Trust Platform (Fortinet FortiSASE)

    Barrier Networks

    SASE extends networking and security capabilities beyond where they have typically been available, allowing users, regardless of location, to take advantage of firewall as a service (FWaaS), secure web gateway (SWG), zero-trust network access (ZTNA), and a medley of other threat detection functions.

  • Netsweeper -Onguard -Cloud Safeguarding and Monitoring

    Netsweeper Inc.

    Netsweeper OnGuard™ is a powerful content monitoring and reporting platform that helps schools meet safeguarding initiatives and protect at-risk students by identifying harmful actions in real time, allowing you to take proactive steps for early intervention, safety and the promotion of mental health wellness.

  • Unify Call Control System (UC3S) PIN Phone for Prison Estates and Secure Facilities copy

    Unify Business Solutions Limited

    The Unify Call Control System (UC3S) is a secure platform which enables prisons and secure facilities to manage phone calls internally and externally. The UC3S allows staff to control, monitor and record phone calls and includes integrated reporting. Call rates are adjustable enabling differing tariffs to be set for detainees.

  • CDW Proofpoint DLP Transform Package

    CDW LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Broadcom/Symantec Validation & Identification Protection (VIP)

    Gradian Systems Ltd

    In the world of BYO devices and remote access, organizations need a security-solution that can address the growing attack surface. Symantec-VIP is a user-friendly, cloud-based, strong-authentication service that provides secure access to sensitive data and applications anytime, anywhere, from any device enabling a critical piece of your Zero-Trust security strategy.

  • Microsoft Windows Enterprise Licenses - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    Windows 10 / 11 Enterprise Licenses for customers wanting to access Enterprise feature sets on their corporate desktop.

  • Human Risk Management platform

    CultureAI

    The CultureAI Human Risk Management Platform empowers security teams to proactively monitor human risk across multiple applications, providing real-time insights into risky employee behaviours and security vulnerabilities. Armed with these insights, organisations can deliver coaching in the moment and automate fixes, ensuring optimal efficiency and effectiveness.

  • Computacenter - Proofpoint Advanced Package

    Computacenter (UK) Ltd

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • ORIGIN8TIVE’S CLOUD PACKET BROKER

    Origin8tive Ltd

    Origin8tive's Cloud Packet Broker enables distributing network traffic across multiple appliances, vital for complex cloud networks requiring various analytical tools to meet legal and regulatory standards and enhance data security. Deployable in AWS environments, it utilises VPC traffic mirroring for seamless traffic capture and distribution to end appliances.

  • Palo Alto Cortex XSIAM

    XPERTEX LTD

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.

  • Distributed Denial of Service (DDoS)

    SAPPHIRE TECHNOLOGIES LIMITED

    DDOS protection automatically prevents scalable attacks including HTTP/S Floods, DNS, and more. We defend organisations against today’s most advanced DDoS attacks using advanced behavioural based detection for both network layer (L3/4) and application-layer (L7) attacks, automatic real-time signature creation to protect against zero-day attacks,

  • Infor ERP Implementation and Support

    VE3 GLOBAL LTD

    Implementation of Infor ERP and comprehensive work ticket and escalation protocol. Documentation of all support tasks. Clarification of business procedures/transactions within M3. Serving as a remote extension for client key users. Troubleshooting and resolving configuration issues. Addressing general table maintenance and bug fixes. Establishing or modifying business processes.

  • Key Management Solution

    GET SWARMS LIMITED

    Safeguard Your Data with Get Swarm's Key Management Solution, designed to safeguard sensitive data and streamline access control. Our service ensures the secure storage, encryption, and centralized management of cryptographic keys.Able to manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.