Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Akamai Akamai Cloud Computing

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform enables schools and academy trusts to build and review their cybersecurity policies. This service contains an e-learning module that provides schools and trusts with the capability to deploy customised cybersecurity awareness training and coaching to staff and board members.

  • Barracuda Endpoint XDR

    SCG CORPORATE LIMITED

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Facial Recognition Services

    VIABLE DATA LTD

    Cloud-based facial recognition services for performing business critical functions such as security checks, personnel identification, watch-listing operations and digital travel credentials for immigration, borders, law enforcement and access control functions. Our scalable intelligent identification software platform includes the ability to integrate with existing biometric algorithms.

  • Pathlock Cloud Application Access Governance (AAG)

    Grey Monarch Limited

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Profile™

    SAPPHIRE TECHNOLOGIES LIMITED

    Our Profile™ SaaS solution guides you through the process of collaborative information gathering, reporting and auditing against compliance frameworks and standards including NCSC's Cyber Assessment Framework (for GovAssure and NIS Directive), HSE's OG86 and IEC/ISA 62443.

  • ProofPoint Email Fraud Defence

    INTEGRITY360 LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • Data Subject Access Request Automation

    TMC3 LIMITED

    Privacy rights automation by OneTrust. The platform enables organisations to automate the end-to-end DSAR and other individuals rights fulfilment to meet UK GDPR requirements. Seamlessly automate manual tasks associated with personal data requests through data discovery and robotic automation technology. Operationalise all data subject requests in a single platform.

  • Egress Prevent - Integrated Email Cloud Security - Outbound

    S3 Ltd

    Egress Prevent protects against data breaches by reducing human activated risk. Intelligent DLP technologies combine with custom policies and machine learning to: detect accidental and malicious data loss alert users to potential data breaches stop them before they happen with real-time prompts. Misdirected Emails, Mis-attached file detection & Content Analysis.

  • CDW AvePoint Insights for Microsoft 365

    CDW LIMITED

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Neo Technology Case Management Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Case Management Solutions cater to various scenarios like investigations, service requests, and incident handling. Our experts assess each scenario individually, leveraging common design approaches to tackle specific issues effectively. We offer flexible implementation packages, ranging from proof of concept (PoC) to large-scale deployments.

  • Rapid7 Managed Threat Complete - Managed SIEM/SOC and Vulnerability Management

    ITHQ LTD

    Rapid7’s MTC managed service - prepare for, detect, and respond to threats in your environment. Rapid7 supports your team to accelerate your proactive, responsive, and strategic security maturity and extend your security operations by providing customised security guidance and hands-on 24x7x365 monitoring, threat hunting, incident response, and exposure management.

  • AttackIQ breach attack simulation

    Bright Cyber (Voodoo technology LTD)

    AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.

  • KPMG SOFY

    KPMG LLP

    SOFY platform runs on both subscription-based and one-off assessment model, and offers advanced, configurable, and ready-to-use data analytics solutions allowing clients to make better SOX Compliant business choices, manage risk, and improve overall performance. SOFY helps streamline - Access management, Continuous Controls Monitoring, Risk Management, Third Party Risk & more.

  • Website development

    TRUE DIGITAL LIMITED

    Building world class websites using a headless CMS, and creating high performing digital experience platforms to answer our clients bespoke requirements.

  • Forcepoint Email Security

    CHESS ICT LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Digital Twins

    VIABLE DATA LTD

    We can create a real-time model of your system, enabling efficient data capture and quicker insights. We connect diverse datasets to create a holistic view to enable effective decision making. We extend your system beyond the raw data, initiating automated decisions based on inputs.

  • Claroty Secure Remote Access

    INTEGRITY360 LIMITED

    Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.

  • Action and issue tracking software (Insight4GRC 4action)

    RSM UK RISK ASSURANCE SERVICES LLP

    Action tracking software that enables actions to be assigned to action owners and their status reported. Interactive monitoring dashboards provide real-time views of the status of agreed actions. Attach evidence to support action completion and utilise alerting and calendar integration to provide reminders. Mobile and tablet friendly, iOS and Android.

  • Computacenter - IBM API Connect On Cloud Reserved Instance (Dedicated)

    Computacenter (UK) Ltd

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • Recorded Future

    TheTechForce Limited

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • KnowBe4 Security Awareness Training platform

    FORDWAY SOLUTIONS LIMITED

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.

  • Tessian DLP

    INTEGRITY360 LIMITED

    Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.

  • Activtrak - Compliance, Security and Productivity

    Glemnet Ltd

    ActivTrak is a workforce productivity and analytics application that helps organizations understand how and what people do at work. Our cloud-based user activity monitoring software provides contextual data and insights that enable mid-market organizations to be more productive, secure, and compliant.

  • CMS websites

    JBi Digital

    We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services. We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.

  • Palo Alto Prisma Cloud

    BYTES SOFTWARE SERVICES LIMITED

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc

  • CDW Sophos Managed Detection and Response Complete (MDR) Endpoint

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • USM Anywhere SIEM Licences

    MONDAS CONSULTING LTD

    Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.

  • boxxe Sophos Intercept X Advanced with XDR Server

    BOXXE LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Barracuda 24X7 O365 Detection & Response

    SCG CORPORATE LIMITED

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.