Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • Rapid7 InsightCloudSec

    INTEGRITY360 LIMITED

    InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management

  • XDR - Extended Detection & Response - Office 365 Monitoring

    Network Utilities (Systems) Ltd

    Managed security solution that collects, aggregates, and normalises log data from Office 365 tenants using an analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Detects Business Email Compromise and identify threat like behaviour i.e. unauthorised access, admin changes, impossible logins, mass file downloads, and brute force attacks.

  • Mimecast Perimeter Defence Plan (Zone 1)

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Cloudflare Cloud Email Security

    Softcat Limited

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • ORCHA: Activate (Digital Health Library and Formulary)

    ORCHA Health Ltd

    ORCHA is the world’s leading digital health quality management and distribution platform, featuring the infrastructure needed to deliver digital health safely in healthcare services at scale. The platform enables and supports the end-to-end digital transformation of organisations, through a formulary, app library, digital health academy, toolkits and risk management frameworks.

  • Check Point Cloudguard Cloud-Native Application Protection Platform (CNAPP)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Orca Security

    BlueFort Security Ltd

    Provides a Cloud-Native zero-touch approach to cloud security. Operates a patent-pending “SideScanning” technology, which delivers 100% security visibility and coverage across customer’s entire cloud environment. Utilizes a context engine combining workload and cloud configuration details to build a unified data model and visual map of all cloud based critical assets

  • ServiceNow (ITSM/ITOM/CSM) - Implementation - by SCC

    Specialist Computer Centres plc

    Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM). SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.

  • Netwrix PolicyPak

    INTEGRITY360 LIMITED

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Phoenix Software Ltd

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • AvePoint Policies for Microsoft 365

    Avepoint UK Ltd

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • STREAM Integrated Risk & Assurance Manager

    ACUITY RISK MANAGEMENT LIMITED

    STREAM Integrated Risk Manager provides a holistic environment to capture integrated risk use cases within a Cloud infrastructure and provide clear reports. These use cases include Enterprise Risk, Cyber and IT, ISMS, Control and Compliance Assurance, Incidents, Audits and Findings, Policy, Business Continuity, Privacy, Vendor and Supply Chain, Vulnerability.

  • Logpoint Converged SIEM and SOAR

    Chess CyberSecurity Ltd

    Logpoint's platform brings together Security Incident and Event Management(SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure.

  • BeyondTrust Identity Security Insights

    INTEGRITY360 LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.

  • Netwrix ChangeTracker

    Bytes Software Services

    Netwrix Change Tracker helps organisations to enhance their security posture, through the process of hardening configurations and monitoring for unauthorized changes to criticial system files - in real time. The solution includes a comprehensive library of CIS certfied benchmark reports, designed to reduce the attack surface. bssgc

  • Disaster Recovery as a Service / DRaaS (via Zerto)

    Atlas Cloud Ltd

    Disaster recovery (DR) for virtual desktops ensures your organisation can swiftly recover from disruptions of any kind. It allows us to replicate virtual applications and desktops in a different location, at the touch of a button with minimal data loss and downtime – keeping key systems running in any situation.

  • Full Stack Observability

    Forfusion Ltd

    Gain end-to-end visibility to confidently plan and deploy your hybrid cloud, whilst obtaining valuable insights through real-time workload performance. Our experts help you to leverage application and infrastructure monitoring tools to reliably validate success, so you can tailor your approach to addressing potential issues in hybrid or multi-cloud environments.

  • Web penetration testing

    Isotoma Ltd

    Even when hosting in the cloud, the security of your web application is your responsibility. Isotoma's penetration testing service helps ensure your application is secure against the most common techniques used by hackers today.

  • Google Cloud BeyondCorp / Chrome Enterprise Premium

    Netpremacy Limited

    BeyondCorp is Google's implementation of the zero trust model. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.

  • CDW Proofpoint Archive

    CDW Limited

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types

  • Cloud Security

    Forfusion Ltd

    Leverage end-to-end security for both public and private cloud domains. Exploit the power of identity services and user identity to secure your network. Using products from the largest IT security vendor in the world to secure your workplace is critical and a very positive step towards increasing business performance.

  • Pathlock Cloud Cybersecurity Application Controls (CAC) for SAP

    Grey Monarch Limited

    Pathlock Cloud CAC automatically scans SAP systems for over 4000 security vulnerabilities and cybersecurity weaknesses at any desired frequency (e.g. daily, weekly, monthly). In this way, the SAP systems remain up-to-date with SAP security notes and patches. Other SAP security risks are also quickly identified with clear remediation instructions provided.

  • Sophos Managed Risk

    Softcat Limited

    Vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Sophos Managed Risk, our experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks before they disrupt business.

  • CDW Check Point CloudGuard Code Security (Spectral)

    CDW Limited

    CloudGuard Code Security, part of CloudGuard CNAPP, provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends.

  • Skylight

    BLANKBOX TECHNOLOGIES LTD

    Skylight is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles

  • KnowBe4 Compliance Plus

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations.

  • Endpoint Detection and Response (EDR)

    CYMBALSTREAM SOLUTIONS LIMITED

    Cymbalstream, partnering with CrowdStrike, offers Endpoint Detection and Response (EDR) services. CrowdStrike's Falcon Insight XDR consolidates security products into one agent, console, and cloud-native architecture. It provides comprehensive endpoint protection, detection, and response capabilities against breaches and advanced cyber threats targeting endpoints like laptops, desktops, and servers

  • Azure IoT Insights: Real-Time Analytics and Integration Service

    WR LOGIC LIMITED

    Azure IoT Insights utilizes Azure Stream Analytics and Azure IoT Hub to provide real-time data processing and analytics for IoT-driven industries. It enables real-time monitoring and analysis, supports immediate decision-making, and enhances operations across smart city infrastructure, manufacturing, and environmental monitoring, ensuring timely and relevant insights.

  • Encryption Intelligence

    Ampliphae

    Allows you to manage encryption risk, address weak encryption that puts your data at risk today, and implement an effective mitigation strategy to migrate your organisation to quantum-safe encryption technologies. Post-quantum encryption discovery, planning and implementation for cloud, IoT and applications. Continuously updated realtime cryptographic inventory for the whole organisation.

  • Tenable Cloud Security

    Phoenix Software Ltd

    See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.