Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • ProofPoint Email Fraud Defence

    SOFTCAT PLC

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW Proofpoint Tessian Enterprise Data Loss Prevention

    CDW LIMITED

    Proofpoint Enterprise Data Loss Prevention (DLP) protects your organization against data loss that originates with your people. It brings together our solutions for email, cloud and endpoint DLP. The product combines content, behavior and threat telemetry from these channels to address the full spectrum of people-centric data-loss scenarios.

  • Charity Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft 365 Backup

    virtualDCS Ltd

    Backup Microsoft Office 365 data at the click of a button. Our fully browser managed solution provides a feature-rich office 365 backup solution and allows you to be secure in the knowledge that Veeam is protecting your data securely in the UK.

  • Forcepoint Advanced Malware Detection (AMD)

    Cyberlab

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW, Web Security and Email Security to provide defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • CDW Sophos Zero Trust Network Access (ZTNA)

    CDW LIMITED

    "Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users."

  • Focus112 copy

    Focus Data Services Ltd

    Focus Data's design systems tailored for both communication providers and law enforcement agencies, facilitating the streamlined handling of requests, retrieval, and analysis of communication data. Efficiently manage the acquisition of communication data from cellular service providers and transform it into actionable intelligence, benefiting operational inquiries and court proceedings.

  • CloudCover Guardian for Azure

    CCS Media Limited

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Rapid7 InsightCloudSec

    INTEGRITY360 LIMITED

    InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management

  • XDR - Extended Detection & Response - Office 365 Monitoring

    Network Utilities (Systems) Ltd

    Managed security solution that collects, aggregates, and normalises log data from Office 365 tenants using an analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Detects Business Email Compromise and identify threat like behaviour i.e. unauthorised access, admin changes, impossible logins, mass file downloads, and brute force attacks.

  • Mimecast Perimeter Defence Plan (Zone 1)

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Cloudflare Cloud Email Security

    SOFTCAT PLC

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • SolarWinds Security Event Manager (SEM) License

    Prosperon Networks Ltd

    SolarWinds® Event Manager (SEM), formally SolarWinds Log & Event Management is a powerful SIEM solution. Combining log management, correlation, forwarding, reporting, file integrity monitoring, user activity monitoring, USB detection and prevention, threat intelligence, and active response into a virtual appliance, that’s easy to deploy, manage, and use.

  • ORCHA: Activate (Digital Health Library and Formulary)

    ORCHA HEALTH LTD

    ORCHA is the world’s leading digital health quality management and distribution platform, featuring the infrastructure needed to deliver digital health safely in healthcare services at scale. The platform enables and supports the end-to-end digital transformation of organisations, through a formulary, app library, digital health academy, toolkits and risk management frameworks.

  • Check Point Cloudguard Cloud-Native Application Protection Platform (CNAPP)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Orca Security

    BLUEFORT SECURITY LIMITED

    Provides a Cloud-Native zero-touch approach to cloud security. Operates a patent-pending “SideScanning” technology, which delivers 100% security visibility and coverage across customer’s entire cloud environment. Utilizes a context engine combining workload and cloud configuration details to build a unified data model and visual map of all cloud based critical assets

  • ServiceNow (ITSM/ITOM/CSM) - Implementation - by SCC

    SPECIALIST COMPUTER CENTRES PLC

    Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM). SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.

  • Netwrix PolicyPak

    INTEGRITY360 LIMITED

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    PHOENIX SOFTWARE LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • AvePoint Policies for Microsoft 365

    Avepoint UK Ltd

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • STREAM Integrated Risk & Assurance Manager

    ACUITY RISK MANAGEMENT LIMITED

    STREAM Integrated Risk Manager provides a holistic environment to capture integrated risk use cases within a Cloud infrastructure and provide clear reports. These use cases include Enterprise Risk, Cyber and IT, ISMS, Control and Compliance Assurance, Incidents, Audits and Findings, Policy, Business Continuity, Privacy, Vendor and Supply Chain, Vulnerability.

  • Logpoint Converged SIEM and SOAR

    Cyberlab

    Logpoint's platform brings together Security Incident and Event Management(SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure.

  • BeyondTrust Identity Security Insights

    INTEGRITY360 LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.

  • Netwrix ChangeTracker

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Change Tracker helps organisations to enhance their security posture, through the process of hardening configurations and monitoring for unauthorized changes to criticial system files - in real time. The solution includes a comprehensive library of CIS certfied benchmark reports, designed to reduce the attack surface. bssgc

  • Disaster Recovery as a Service / DRaaS (via Zerto)

    Atlas Cloud Ltd

    Disaster recovery (DR) for virtual desktops ensures your organisation can swiftly recover from disruptions of any kind. It allows us to replicate virtual applications and desktops in a different location, at the touch of a button with minimal data loss and downtime – keeping key systems running in any situation.

  • Full Stack Observability

    FORFUSION LTD

    Gain end-to-end visibility to confidently plan and deploy your hybrid cloud, whilst obtaining valuable insights through real-time workload performance. Our experts help you to leverage application and infrastructure monitoring tools to reliably validate success, so you can tailor your approach to addressing potential issues in hybrid or multi-cloud environments.

  • Web penetration testing

    ISOTOMA LIMITED

    Even when hosting in the cloud, the security of your web application is your responsibility. Isotoma's penetration testing service helps ensure your application is secure against the most common techniques used by hackers today.

  • Google Cloud BeyondCorp / Chrome Enterprise Premium

    Netpremacy Limited

    BeyondCorp is Google's implementation of the zero trust model. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.

  • CDW Proofpoint Archive

    CDW LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types

  • Cloud Security

    FORFUSION LTD

    Leverage end-to-end security for both public and private cloud domains. Exploit the power of identity services and user identity to secure your network. Using products from the largest IT security vendor in the world to secure your workplace is critical and a very positive step towards increasing business performance.