Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Focus112 copy

    Focus Data Services Ltd

    Focus Data's design systems tailored for both communication providers and law enforcement agencies, facilitating the streamlined handling of requests, retrieval, and analysis of communication data. Efficiently manage the acquisition of communication data from cellular service providers and transform it into actionable intelligence, benefiting operational inquiries and court proceedings.

  • CloudCover Guardian for Azure

    CCS Media Limited

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Rapid7 InsightCloudSec

    INTEGRITY360 LIMITED

    InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management

  • XDR - Extended Detection & Response - Office 365 Monitoring

    Network Utilities (Systems) Ltd

    Managed security solution that collects, aggregates, and normalises log data from Office 365 tenants using an analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Detects Business Email Compromise and identify threat like behaviour i.e. unauthorised access, admin changes, impossible logins, mass file downloads, and brute force attacks.

  • Mimecast Perimeter Defence Plan (Zone 1)

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Cloudflare Cloud Email Security

    SOFTCAT PLC

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • SolarWinds Security Event Manager (SEM) License

    Prosperon Networks Ltd

    SolarWinds® Event Manager (SEM), formally SolarWinds Log & Event Management is a powerful SIEM solution. Combining log management, correlation, forwarding, reporting, file integrity monitoring, user activity monitoring, USB detection and prevention, threat intelligence, and active response into a virtual appliance, that’s easy to deploy, manage, and use.

  • ORCHA: Activate (Digital Health Library and Formulary)

    ORCHA HEALTH LTD

    ORCHA is the world’s leading digital health quality management and distribution platform, featuring the infrastructure needed to deliver digital health safely in healthcare services at scale. The platform enables and supports the end-to-end digital transformation of organisations, through a formulary, app library, digital health academy, toolkits and risk management frameworks.

  • Check Point Cloudguard Cloud-Native Application Protection Platform (CNAPP)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Orca Security

    BLUEFORT SECURITY LIMITED

    Provides a Cloud-Native zero-touch approach to cloud security. Operates a patent-pending “SideScanning” technology, which delivers 100% security visibility and coverage across customer’s entire cloud environment. Utilizes a context engine combining workload and cloud configuration details to build a unified data model and visual map of all cloud based critical assets

  • ServiceNow (ITSM/ITOM/CSM) - Implementation - by SCC

    SPECIALIST COMPUTER CENTRES PLC

    Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM). SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.

  • Netwrix PolicyPak

    INTEGRITY360 LIMITED

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    PHOENIX SOFTWARE LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • AvePoint Policies for Microsoft 365

    Avepoint UK Ltd

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • STREAM Integrated Risk & Assurance Manager

    ACUITY RISK MANAGEMENT LIMITED

    STREAM Integrated Risk Manager provides a holistic environment to capture integrated risk use cases within a Cloud infrastructure and provide clear reports. These use cases include Enterprise Risk, Cyber and IT, ISMS, Control and Compliance Assurance, Incidents, Audits and Findings, Policy, Business Continuity, Privacy, Vendor and Supply Chain, Vulnerability.

  • Unified Security Management Cyber Security

    ATCH Ltd

    ATCH and its Partner Trinity Cyber invented and operate the first technology that deeply inspects full-session Internet traffic to expose and mitigate threats inline and in real time. The TC:Edge technology defeats attacker tactics, techniques and procedures (TTPs) and is fully automated, improving security overnight without adding expense or resources.

  • Logpoint Converged SIEM and SOAR

    Cyberlab

    Logpoint's platform brings together Security Incident and Event Management(SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure.

  • BeyondTrust Identity Security Insights

    INTEGRITY360 LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.

  • Netwrix ChangeTracker

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Change Tracker helps organisations to enhance their security posture, through the process of hardening configurations and monitoring for unauthorized changes to criticial system files - in real time. The solution includes a comprehensive library of CIS certfied benchmark reports, designed to reduce the attack surface. bssgc

  • Disaster Recovery as a Service / DRaaS (via Zerto)

    Atlas Cloud Ltd

    Disaster recovery (DR) for virtual desktops ensures your organisation can swiftly recover from disruptions of any kind. It allows us to replicate virtual applications and desktops in a different location, at the touch of a button with minimal data loss and downtime – keeping key systems running in any situation.

  • Full Stack Observability

    FORFUSION LTD

    Gain end-to-end visibility to confidently plan and deploy your hybrid cloud, whilst obtaining valuable insights through real-time workload performance. Our experts help you to leverage application and infrastructure monitoring tools to reliably validate success, so you can tailor your approach to addressing potential issues in hybrid or multi-cloud environments.

  • Web penetration testing

    ISOTOMA LIMITED

    Even when hosting in the cloud, the security of your web application is your responsibility. Isotoma's penetration testing service helps ensure your application is secure against the most common techniques used by hackers today.

  • Google Cloud BeyondCorp / Chrome Enterprise Premium

    Netpremacy Limited

    BeyondCorp is Google's implementation of the zero trust model. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.

  • CDW Proofpoint Archive

    CDW LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types

  • Cloud Security

    FORFUSION LTD

    Leverage end-to-end security for both public and private cloud domains. Exploit the power of identity services and user identity to secure your network. Using products from the largest IT security vendor in the world to secure your workplace is critical and a very positive step towards increasing business performance.

  • Pathlock Cloud Cybersecurity Application Controls (CAC) for SAP

    Grey Monarch Limited

    Pathlock Cloud CAC automatically scans SAP systems for over 4000 security vulnerabilities and cybersecurity weaknesses at any desired frequency (e.g. daily, weekly, monthly). In this way, the SAP systems remain up-to-date with SAP security notes and patches. Other SAP security risks are also quickly identified with clear remediation instructions provided.

  • Sophos Managed Risk

    SOFTCAT PLC

    Vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Sophos Managed Risk, our experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks before they disrupt business.

  • CDW Check Point CloudGuard Code Security (Spectral)

    CDW LIMITED

    CloudGuard Code Security, part of CloudGuard CNAPP, provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends.

  • Skylight

    BLANKBOX TECHNOLOGIES LTD

    Skylight is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles

  • KnowBe4 Compliance Plus

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations.