Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • XM Cyber- Attack Path Management

    INTEGRITY360 LIMITED

    The XM Cyber platform continuosly and safely runs attack simulations across Hybrid-Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users-user-behavior that can allow an attacker to laterally move /compromise critical assets. XM Cyber then prioritises the issues/devices/accounts that put the most amount of critical assets at risk.

  • Barrier Networks Crowdstrike Falcon Cloud Security

    Barrier Networks

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • CDW Proofpoint Email Fraud Defense

    CDW Limited

    Email Fraud Defense stops email based identity deception. Access to a reporting portal and regular meetings with a Proofpoint consultant help to implement DMARC. Risky suppliers can be identified. SPF and DKIM can be hosted by Proofpoint and there is a Secure Email Relay option.

  • OneTrust GRC and Security Assurance Software

    Oyster Information Management Solutions Limited

    OneTrust GRC and Security Assurance is a modular GRCPrivacy Management Software solution to help all organisations: map, measure and manage risk; manage third-party risk and centrally manage and streamline the execution of compliance audits.

  • CyberArk Workforce Password Management SaaS

    Phoenix Software Ltd

    "The service offers a password vault for business users to store any secrets such as (business) personal usernames and passwords to unconnected (non federated) services and any secrets including file attachments.

  • Akamai Software Services

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Cyber Security Compliance and Governance Platform

    tmc3 Limited

    OneTrust GRC empowers public sector entities to streamline cyber security compliance and governance. Our integrated cyber security compliance and governance platform enhances operational risk management, ensures regulatory alignment, and supports proactive threat mitigation with cutting-edge AI insights and robust policy management tools.

  • AI Assurance

    Naimuri

    Providing 3rd-party AI TEVV (Test, Evaluation, Verification & Validation) for Government customers & their vendors. Allowing risk-quantification of AI solutions prior to deployment, & development of best practices for automation & democratisation of MLOps. We provide expertise across a range of sub-disciplines e.g. computer vision, language models & uncertainty quantification.

  • Mimecast Perimeter Defence Plan (Zone 1)

    CHESS ICT LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Commvault Cloud Powered by Metallic AI

    Bytes Software Services

    Commvault provide a cyber resilience platform built for the hybrid enterprise. Commvault Cloud delivers true cloud cyber resilience while ensuring the fastest recovery and we protect more workloads than anyone else. bssgc

  • Managed Service Desk

    SOFTSERVE

    SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.

  • Data & Analytics in Local Government

    Ve3 Global Ltd

    In collaboration with Xantura,VE3 offers analytics-driven insights and facilitates proactive intervention to enhance outcomes. Our accredited and established solution, OneView,empowers organizations to securely harness growing amounts of citizen data. It automates case summaries, provides a unified view,utilizes predictive models to identify individuals at risk, and comprehends trends and demand drivers.

  • Concentric AI

    Gradian Systems Ltd

    Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.

  • The Anywhere Platform featuring AnywhereGRC

    POLARISOFT THE ANYWHERE COMPANY LIMITED

    The Anywhere Company (TAC) provides a beautifully uncomplicated SaaS business management platform with modules for governance, risk and compliance, project and portfolio management, performance management, and product development. Our innovative approach improves decision-making and ensures that activities align to overall management strategy with the least risk and maximum benefit.

  • Recorded Future

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • IBM WatsonX.Governance

    IBM United Kingdom Ltd

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.

  • Anaconda Inc. Licenses

    Jumping Rivers Ltd

    With over 25 million users worldwide and counting, Anaconda solves unique problems associated with conducting open-source data science in businesses across all industries, at scale. Anaconda empowers users of all levels to achieve their data science goals by making it easy to search and install thousands of Python/R packages.

  • Check Point Harmony Endpoint

    Nettitude Limited

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS Intelligence Ltd.

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • MetaLearning Essentials

    MetaCompliance Ltd

    MetaLearning Essentials combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Essentials provides animated and lifelike eLearning courses.

  • Akamai Akamai Cloud Computing

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform enables schools and academy trusts to build and review their cybersecurity policies. This service contains an e-learning module that provides schools and trusts with the capability to deploy customised cybersecurity awareness training and coaching to staff and board members.

  • Barracuda Endpoint XDR

    Southern Communications Corporate Solutions T/A SCG Corporate

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Facial Recognition Services

    Viable Data

    Cloud-based facial recognition services for performing business critical functions such as security checks, personnel identification, watch-listing operations and digital travel credentials for immigration, borders, law enforcement and access control functions. Our scalable intelligent identification software platform includes the ability to integrate with existing biometric algorithms.

  • Pathlock Cloud Application Access Governance (AAG)

    Grey Monarch Limited

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • ProofPoint Email Fraud Defence

    INTEGRITY360 LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • Data Subject Access Request Automation

    tmc3 Limited

    Privacy rights automation by OneTrust. The platform enables organisations to automate the end-to-end DSAR and other individuals rights fulfilment to meet UK GDPR requirements. Seamlessly automate manual tasks associated with personal data requests through data discovery and robotic automation technology. Operationalise all data subject requests in a single platform.

  • Egress Prevent - Integrated Email Cloud Security - Outbound

    S3 Ltd

    Egress Prevent protects against data breaches by reducing human activated risk. Intelligent DLP technologies combine with custom policies and machine learning to: detect accidental and malicious data loss alert users to potential data breaches stop them before they happen with real-time prompts. Misdirected Emails, Mis-attached file detection & Content Analysis.

  • CDW AvePoint Insights for Microsoft 365

    CDW Limited

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Neo Technology Case Management Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Case Management Solutions cater to various scenarios like investigations, service requests, and incident handling. Our experts assess each scenario individually, leveraging common design approaches to tackle specific issues effectively. We offer flexible implementation packages, ranging from proof of concept (PoC) to large-scale deployments.