Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • Rapid7 Managed Threat Complete - Managed SIEM/SOC and Vulnerability Management

    ITHQ LTD

    Rapid7’s MTC managed service - prepare for, detect, and respond to threats in your environment. Rapid7 supports your team to accelerate your proactive, responsive, and strategic security maturity and extend your security operations by providing customised security guidance and hands-on 24x7x365 monitoring, threat hunting, incident response, and exposure management.

  • AttackIQ breach attack simulation

    Bright Cyber (Voodoo technology LTD)

    AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.

  • KPMG SOFY

    KPMG LLP

    SOFY platform runs on both subscription-based and one-off assessment model, and offers advanced, configurable, and ready-to-use data analytics solutions allowing clients to make better SOX Compliant business choices, manage risk, and improve overall performance. SOFY helps streamline - Access management, Continuous Controls Monitoring, Risk Management, Third Party Risk & more.

  • Website development

    True Digital

    Building world class websites using a headless CMS, and creating high performing digital experience platforms to answer our clients bespoke requirements.

  • Forcepoint Email Security

    CHESS ICT LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Digital Twins

    Viable Data

    We can create a real-time model of your system, enabling efficient data capture and quicker insights. We connect diverse datasets to create a holistic view to enable effective decision making. We extend your system beyond the raw data, initiating automated decisions based on inputs.

  • Claroty Secure Remote Access

    INTEGRITY360 LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • Action and issue tracking software (Insight4GRC 4action)

    RSM UK RISK ASSURANCE SERVICES LLP

    Action tracking software that enables actions to be assigned to action owners and their status reported. Interactive monitoring dashboards provide real-time views of the status of agreed actions. Attach evidence to support action completion and utilise alerting and calendar integration to provide reminders. Mobile and tablet friendly, iOS and Android.

  • Computacenter - IBM API Connect On Cloud Reserved Instance (Dedicated)

    Computacenter (UK) Ltd

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • Recorded Future

    TheTechForce Limited

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • KnowBe4 Security Awareness Training platform

    Fordway

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.

  • Tessian DLP

    INTEGRITY360 LIMITED

    Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.

  • Activtrak - Compliance, Security and Productivity

    Glemnet Ltd

    ActivTrak is a workforce productivity and analytics application that helps organizations understand how and what people do at work. Our cloud-based user activity monitoring software provides contextual data and insights that enable mid-market organizations to be more productive, secure, and compliant.

  • CMS websites

    JBi Digital

    We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services. We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.

  • Palo Alto Prisma Cloud

    Bytes Software Services

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc

  • CDW Sophos Managed Detection and Response Complete (MDR) Endpoint

    CDW Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • USM Anywhere SIEM Licences

    MONDAS CONSULTING LTD

    Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.

  • boxxe Sophos Intercept X Advanced with XDR Server

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Barracuda 24X7 O365 Detection & Response

    Southern Communications Corporate Solutions T/A SCG Corporate

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.

  • Aiimi Insight Engine – Legacy Decommissioning

    Aiimi Ltd

    Insight Engine connects to and ingests information from a multitude of source systems, including both data and documents via API, data export ingestion or from databases and file shares. Once made available through our search and discovery interface, the legacy application can be safely decommissioned.

  • KnowBe4 SecurityCoach

    Softcat Limited

    SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from your existing security stack to deliver real-time coaching, reinforces your security culture and turns insecure user behaviour into an opportunity

  • Check Point Harmony SASE

    Charterhouse Voice & Data

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • Aiimi Insight Engine – Search & Discovery

    Communication-STEM Ltd

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.

  • GlobalSign Certificate Products

    GMO GLOBALSIGN LIMITED

    GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.

  • Tenable PCI-ASV

    Softcat Limited

    An add-on to Tenable Vulnerability Management. Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.

  • Computacenter - ProofPoint Insider Threat Management

    Computacenter (UK) Ltd

    Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.

  • Web application firewall (WAF)

    Jisc Services Ltd

    The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.

  • Computacenter - CrowdStrike Falcon Next Gen SIEM

    Computacenter (UK) Ltd

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • GovAPI Integrator: Seamless Data Integration Services for the UK Government

    WR LOGIC LIMITED

    Integration of Microsoft Power Platform applications with public-sector systems and third-party services through custom APIs. Ensuring smooth data flow and integrity, enhancing low-code/no-code apps on PowerApps, Power Automate, and Power BI. Leveraging advanced API techniques and Microsoft's secure cloud, optimising connectivity and functionality for improved service delivery and operational efficiency.

  • MetaPrivacy

    MetaCompliance Ltd

    MetaPrivacy is a cloud-based privacy lifecycle management system that delivers an automated approach to data privacy compliance. The platform has been designed to increase stakeholder engagement by providing graphically rich, interactive assessments incorporating video instruction, as part of the personal data information gathering phase.