Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Microsoft Cloud App Security

    Ve3 Global Ltd

    Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • AvePoint Policies for Microsoft 365

    Bytes Software Services

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive. bssgc

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Efecte Cloud Based Service Management

    Efecte AB

    Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management (ITSM & ESM), Identity and Access Management (IAM), and Conversational IT. With our innovative and scalable solutions, organizations can streamline operations, enhance productivity, and achieve digital transformation goals.

  • Inoapps Customer Billing Management

    INOAPPS LIMITED

    Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.

  • Palantir Platform: Gotham

    Palantir Technologies UK, Ltd.

    Palantir Gotham is an enterprise platform for planning missions and running investigations using disparate data, while maintaining privacy and access controls. The platform also incorporates Palantir Foundry’s capabilities, offering a suite of analytical and operational applications, enabling analysts to produce actionable intelligence based on the full ecosystem of available data.

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Broadcom/Symantec Endpoint Security Complete

    Gradian Systems Ltd

    Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses artificial-intelligence (AI) to optimize security decisions.

  • KnowBe4: Leading Security Awareness Training & Simulated Phishing for Human Risk in UK Public Sector

    S3 Ltd

    KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks. Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.

  • CDW Crowdstrike Falcon Endpoint Detection & Response (EDR)

    CDW Limited

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Jamf Apple Device Management and Security Solutions for Education

    GBM DIGITAL TECHNOLOGIES LIMITED

    Jamf allows educational institutions to easily manage and secure their Apple ecosystem, enabling them to support equitable learning with iPad. Jamf provides a complete and comprehensive management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy.

  • Backup as a Service

    Kick ICT

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.

  • altIAM - Identity and Access Management

    Altiatech Ltd

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • SAP GRC as a Service

    Turnkey Consulting (UK) Limited

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Grant Thornton - Cyber Training and Awareness

    Grant Thornton UK LLP

    Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.

  • Palo Alto Cortex XSOAR

    Bytes Software Services

    XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs. bssgc

  • Tenable One - Enterprise

    INTEGRITY360 LIMITED

    Tenable One gives you visibility across attack surface, focus efforts to prevent attacks, accurately communicate cyber-risk to support optimal business performance. Tenable One Enterprise is comprises all features in Standard plus: Attack Path Analysis for breach/attack mitigation, External Attack Surface Management allowing organizations to identify/reduce risks from attacker’s perspective.

  • Proofpoint Archive

    Softcat Limited

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    Trustmarque Solutions Limited

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Exchange Online Modern Authentication Proxy

    PEGASUS LABS PTY LTD

    Pegasus Labs Modern Authentication Proxy allows customers to connect applications to Exchange Online via POP, IMAP or SMTP where those applications only support basic authentication.

  • TRUSTMARQUE PROOFPOINT PRODUCT SET

    Trustmarque Solutions Limited

    Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.

  • UK GDPR Compliance Platform

    tmc3 Limited

    The OneTrust platform enables organisations to centrally manage and track UK GDPR compliance activities. Enforce the governance of UK GDPR policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • Aiimi Insight Engine – Data Privacy & Compliance

    Aiimi Ltd

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using artificial intelligence to identify personal data across all of your data sources. Providing SAR collection, redaction and disclosure capability, along with compliance auditing and actions for remediating non-compliant data, with a simple and slick user interface.

  • Compliance and Archiving Solutions

    Vizst Technology

    Meet your legal, policy and compliance obligations including GDPR, Subject Access Requests and Freedom of Information. With solutions from leading vendors including Mimecast and Cryoserver, we offer comprehensive email and Microsoft Teams searching, security and archiving.

  • Forcepoint Behavioral Analytics (FBA)

    Chess CyberSecurity Ltd

    Forcepoint Behavioral Analytics (FBA) enables security teams to proactively monitor for high risk behavior inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • ESET Threat Intelligence, Telemetry & Intelligence Feeds

    ESET UK Limited

    ESET’s Threat Intelligence service provides global knowledge gathered by ESET experts on targeted attacks, botnet activity detection, advanced persistent threats (APTs), zero-days and botnet activities. Our comprehensive services offer real-time monitoring, threat analysis, potential risk detection, potential risk mitigation and actionable insights before they can impact your operations.

  • SPOT

    NETAPP

    Spot by NetApp is a cloud optimization SaaS platform for FinOps and DevOps. It ensures the best balance of cost, performance, reliability and security for cloud applications (virtual machines, container/Kubernetes clusters) and automates cost optimization at multiple level, across the public hyperscalers: Amazon AWS, Microsoft Azure and Google Cloud Platform.

  • Power BI Services for Educational Departments

    INET

    Our team provide consulting, implementation and ongoing support for the implementation of Microsoft’s Power BI cloud-based analytics service. We identify business challenges, needs and data requirements, ensuring the solution meets operational and management requirements.Our analysis allows development of simple, powerful visualisations and measures that support improved performance within the service