Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • IRIS Intelligence Strategic and Enterprise Risk Management (ERM) Software

    IRIS INTELLIGENCE LIMITED

    IRIS Enterprise Risk Management Software helps organisations assess enterprise-wide risks and manage them more effectively. It facilitates increased risk identification, ensures assessment consistency, tracks mitigation action progress and delivers timely, customised reports to Management. IRIS-ERM is a highly flexible system with tailored customer processes, and ISO31000, ISO27001 and COSO support.

  • MetaCompliance Security Awareness Premium Plus

    MetaCompliance Ltd

    MetaCompliance Security Awareness Premium Plus helps raise awareness of cyber threats, reduce the risks associated with attacks, and embed a culture of security compliance. Organisations can automate their annual security awareness program and deliver 12 months of awareness activities that engage employees to uphold best practice behaviours, all year round.

  • Managed Azure from Chess ICT

    Cyberlab

    Our Managed Service supports Microsoft Azure, which provides compute, storage, backup, VMs, DR and associated public cloud services. With Azure you can rapidly deploying new applications and scaling on demand.

  • Censornet Unified Security Service (Email, Web, CASB, MFA)

    Network Utilities (Systems) Ltd

    Web Security, Cloud Access Security Broker (CASB), Email Security, Compliant Email Archiving, and Multi-Factor Authentication on a single unified cloud hosted platform.

  • Sophos Central Intercept X Advanced with XDR and Managed Threat Response Standard

    INTEGRITY360 LIMITED

    Central Intercept X Advanced with Managed Threat Response (MTR) Standard is for organisations seeking the best protection coupled with the Sophos Managed Threat Response service. Includes all features in Central Intercept X Advanced with XDR plus 24/7 Threat Hunting, Adversarial Detections, Security Health Check, Data Retention, and Activity Reporting.

  • Tenable Lumin

    BYTES SOFTWARE SERVICES LIMITED

    Calculate, communicate and compare your cyber risk. bssgc

  • Castlepoint Manage Information Everywhere

    STLP CONSULTING PTY LTD

    Castlepoint reads, registers and regulates all information in a network, in any format and any system. It uses Explainable AI to automatically detect and classify high-risk and high-value information, and track what happens to it. It provides enterprise eDiscovery, privacy and security management, audit, records management, and Generative AI governance.

  • NowPrivacy

    Smartlytics Consultancy Limited

    NowPrivacy is a comprehensive data governance and management platform designed to empower organisations fully understand and control their data landscape. As data environments grow increasingly complex, NowPrivacy provides a robust solution to navigate, manage, and secure both unstructured and structured data, ensuring compliance and enhancing data privacy across the board.

  • Forcepoint Cloud Access Security Broker (CASB)

    Cyberlab

    Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions on using the Cloud

  • Nexus Mobile Device Management (MDM)

    NEXUS OPEN SYSTEMS LIMITED

    Microsoft Enterprise Mobility + Security is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. Service includes: Azure Active Directory Premium; Microsoft Cloud App Security; Microsoft Intune; Azure Information Protection and Microsoft Advanced Threat Analytics.

  • SonicWall Secure Mobile Access - SMA8200v - with Central Management Server

    SOFTCAT PLC

    SonicWalls SMA8200v is an enterprise grade zero trust virtual appliance with FIPS 140-2 certification for customers needing to maintain full control over data & management planes. It can support user counts typically starting at 50 and moving upwards into the tens of thousands.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    INTEGRITY360 LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Fortinet FortiVM - Cloud-Native Network Firewall Service

    ITHQ LTD

    Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.

  • Stone Cloud Enterprise Network Security - Cisco Umbrella

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • Secure Software Development Lifecycle

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.

  • Check Point Harmony Email and Collaboration

    SAPPHIRE TECHNOLOGIES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Enterprise Case Management

    ACUBED IT SOLUTIONS LIMITED

    Dynamics365 solution provides a fully configurable software platform that is easy to use and manage. Business solutions range from contact, activity and stakeholder management, complaints handling, legal case management and customer service. Designed for public sector organisations, rapid to implement and can provide connectivity and integration with third party applications.

  • Cloud SaaS Products

    BASEEL LTD

    Baseel Limited can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • Forcepoint Email Security

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Computacenter - CrowdStrike Falcon Identity Threat Detection & Protection

    Computacenter (UK) Ltd

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Akamai DNS Security - Enterprise Threat Protector (ETP)

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • KGN Data Engineering and Data Science

    KGN SOFTWARE LTD

    KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.

  • Trustmarque Logpoint Converged SIEM and SOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to monitor, detect and alert on security events/incidents within an IT environment. It provides a comprehensive/centralised view of infrastructure security posture, activities and automated playbooks in response to events.

  • Tenable Vulnerability Management and PCI-ASV

    Khipu Networks Limited

    Identify and prioritise vulnerabilities based on risk to your business. The PCI ASV add-on allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organisation complies with PCI DSS.

  • ProofPoint Email Fraud Defence

    SOFTCAT PLC

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW Proofpoint Tessian Enterprise Data Loss Prevention

    CDW LIMITED

    Proofpoint Enterprise Data Loss Prevention (DLP) protects your organization against data loss that originates with your people. It brings together our solutions for email, cloud and endpoint DLP. The product combines content, behavior and threat telemetry from these channels to address the full spectrum of people-centric data-loss scenarios.

  • Charity Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft 365 Backup

    virtualDCS Ltd

    Backup Microsoft Office 365 data at the click of a button. Our fully browser managed solution provides a feature-rich office 365 backup solution and allows you to be secure in the knowledge that Veeam is protecting your data securely in the UK.

  • Forcepoint Advanced Malware Detection (AMD)

    Cyberlab

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW, Web Security and Email Security to provide defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • CDW Sophos Zero Trust Network Access (ZTNA)

    CDW LIMITED

    "Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users."