Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Barrier Networks DNS Detection and Response solution (InfoBlox Threat Defence)

    Barrier Networks

    DNS Detection and Response solution, detects threat activity and stops attacks occurring, using DNS threat intelligence, disrupting attacker supply chains. AI-driven analytics focuses analysts and provides insights reducing MTTR, raise ROI of existing security tools, and elevate SecOps efficiency. Domain Monitoring/Domain Takedown services enable brand protection and combat emerging threats.

  • WithSecure Vulnerability Management

    IOCO SOLUTIONS LIMITED

    WithSecure™ Elements Vulnerability Management is an easy-to-deploy, cloud-based vulnerability scanner that covers your network, assets, the deep web and compliance.

  • Interneuron RPA - Business Continuity as a Service

    Interneuron Ltd

    Interneuron's robotic process automation technology (RPA) allows you to deploy a business continuity solution for almost any application. Our RPA technology can automate 'snapshots' of 3rd party systems and provide offline, offsite, or redundant access to your data in the event of a 3rd party system outage.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    SOFTCAT PLC

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Barrier Networks Crowdstrike Falcon Complete MDR

    Barrier Networks

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Crowdstrike Application Security Posture Management

    BYTES SOFTWARE SERVICES LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation. bssgc

  • Cyber Security Awareness Training as a Service

    SCG CORPORATE LIMITED

    Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. KnowBe4 as a service is the world’s most popular integrated platform for awareness training combined with simulated phishing attacks and complete outsourced management makes SCCS a leading provider in cybersecurity awareness training.

  • DNS & CTI - Domain Tools

    BROOKCOURT SOLUTIONS LIMITED

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.

  • Barrier Netowrks DNS, DHCP and IPAM (Infoblox Blox DDI)

    Barrier Networks

    Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.

  • Varonis SaaS Data Security Platform

    CYBANETIX LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • XM Cyber- Attack Path Management

    INTEGRITY360 LIMITED

    The XM Cyber platform continuosly and safely runs attack simulations across Hybrid-Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users-user-behavior that can allow an attacker to laterally move /compromise critical assets. XM Cyber then prioritises the issues/devices/accounts that put the most amount of critical assets at risk.

  • Barrier Networks Crowdstrike Falcon Cloud Security

    Barrier Networks

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • CDW Proofpoint Email Fraud Defense

    CDW LIMITED

    Email Fraud Defense stops email based identity deception. Access to a reporting portal and regular meetings with a Proofpoint consultant help to implement DMARC. Risky suppliers can be identified. SPF and DKIM can be hosted by Proofpoint and there is a Secure Email Relay option.

  • OneTrust GRC and Security Assurance Software

    Oyster Information Management Solutions Limited

    OneTrust GRC and Security Assurance is a modular GRCPrivacy Management Software solution to help all organisations: map, measure and manage risk; manage third-party risk and centrally manage and streamline the execution of compliance audits.

  • CyberArk Workforce Password Management SaaS

    PHOENIX SOFTWARE LIMITED

    "The service offers a password vault for business users to store any secrets such as (business) personal usernames and passwords to unconnected (non federated) services and any secrets including file attachments.

  • Akamai Software Services

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Cyber Security Compliance and Governance Platform

    TMC3 LIMITED

    OneTrust GRC empowers public sector entities to streamline cyber security compliance and governance. Our integrated cyber security compliance and governance platform enhances operational risk management, ensures regulatory alignment, and supports proactive threat mitigation with cutting-edge AI insights and robust policy management tools.

  • AI Assurance

    NAIMURI LIMITED

    Providing 3rd-party AI TEVV (Test, Evaluation, Verification & Validation) for Government customers & their vendors. Allowing risk-quantification of AI solutions prior to deployment, & development of best practices for automation & democratisation of MLOps. We provide expertise across a range of sub-disciplines e.g. computer vision, language models & uncertainty quantification.

  • Mimecast Perimeter Defence Plan (Zone 1)

    CHESS ICT LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Commvault Cloud Powered by Metallic AI

    BYTES SOFTWARE SERVICES LIMITED

    Commvault provide a cyber resilience platform built for the hybrid enterprise. Commvault Cloud delivers true cloud cyber resilience while ensuring the fastest recovery and we protect more workloads than anyone else. bssgc

  • Managed Service Desk

    SOFTSERVE SYSTEMS LTD

    SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.

  • Data & Analytics in Local Government

    VE3 GLOBAL LTD

    In collaboration with Xantura,VE3 offers analytics-driven insights and facilitates proactive intervention to enhance outcomes. Our accredited and established solution, OneView,empowers organizations to securely harness growing amounts of citizen data. It automates case summaries, provides a unified view,utilizes predictive models to identify individuals at risk, and comprehends trends and demand drivers.

  • Concentric AI

    Gradian Systems Ltd

    Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.

  • The Anywhere Platform featuring AnywhereGRC

    POLARISOFT THE ANYWHERE COMPANY LIMITED

    The Anywhere Company (TAC) provides a beautifully uncomplicated SaaS business management platform with modules for governance, risk and compliance, project and portfolio management, performance management, and product development. Our innovative approach improves decision-making and ensures that activities align to overall management strategy with the least risk and maximum benefit.

  • Recorded Future

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • IBM WatsonX.Governance

    IBM UNITED KINGDOM LIMITED

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.

  • Anaconda Inc. Licenses

    JUMPING RIVERS LTD

    With over 25 million users worldwide and counting, Anaconda solves unique problems associated with conducting open-source data science in businesses across all industries, at scale. Anaconda empowers users of all levels to achieve their data science goals by making it easy to search and install thousands of Python/R packages.

  • Check Point Harmony Endpoint

    LRQA

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS INTELLIGENCE LIMITED

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • MetaLearning Essentials

    MetaCompliance Ltd

    MetaLearning Essentials combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Essentials provides animated and lifelike eLearning courses.