Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1728 results found

1728 results found in Lot 2: Cloud software in the category Security risk management

  • Computacenter - Proofpoint DLP Transform Package

    Computacenter (UK) Ltd

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Barrier Networks Crowdstrike Falcon for IT Automation

    Barrier Networks

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.

  • Privileged Access Management (PAM) & Identity as a Service (IDaaS)

    EXPONENTIAL-E LIMITED

    The PAM Service allows policies and identities to be to be defined and managed for human and non-human (machine) identities requiring privileged credentials. Time bound sessions are monitored, logged, recorded, and stored for compliance and audit. Context aware MFA and SSO are integrated, with remote access for external vendors controlled.

  • Palo Alto Prisma Access

    SOFTCAT PLC

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Core coc00n Device Protection

    COC00N CYBER LIMITED

    Core coc00n provides highly secure devices without compromising usability. It employs familiar, off-the-shelf hardware such as Apple and Windows devices to ensure that while users benefit from high-level security, the learning curve associated with new or unfamiliar technology is minimized, allowing for a seamless integration into their daily lives.

  • Secure digital payments

    ECKOH UK LIMITED

    A PCI Level 1 compliant payment solution that enables your customers to make secure ecom or e-wallet payments when speaking with an agent. Digital Payments allows for de-scoping of Card Not Present payments allowing our clients to certify for PCI using SAQ-A or SAQ-D.

  • Sophos Endpoint Security, Intercept X, XDR & MTR

    SCG CORPORATE LIMITED

    Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.

  • Check Point Harmony Mobile

    LRQA

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Trustmarque Palo Alto Cortex Xpanse

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services. Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.

  • Check Point VSX

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point VSX (Virtual System Extension) is a comprehensive network security solution that offers robust virtual firewall and VPN capabilities. It enables businesses to create multiple virtualised security gateways within a single hardware appliance, enhancing security flexibility and efficiency while reducing operational costs.

  • DXC Technology Vulnerability Management

    ENTSERV UK LIMITED

    We provide regular and proactive identification of network vulnerabilities to defend against external hackers and disgruntled insiders as a fully managed service. We provide targeted, actionable information to clients on vulnerabilities and recommendations for remediation and can track the success of that remediation.

  • boxxe Cisco ThousandEyes

    BOXXE LIMITED

    ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.

  • boxxe Tenable One Enterprise Exposure Management Platform

    BOXXE LIMITED

    "Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface.

  • Managed SIEM and SOC - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    SecurityHQ

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.

  • HCL AppScan on Cloud

    INTEC SYSTEMS LIMITED

    HCL AppScan is a dynamic application security testing solution designed for security experts and pen testers to use when performing security tests on web applications and web API. It runs automated scans that explore and test web applications based on one of the most powerful scanning engines available.

  • Barrier Networks Crowdstrike Falcon Counter Adversary Operations

    Barrier Networks

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Cloud SaaS Products

    BASEEL PARTNERS LLP

    Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • Micro Focus, now OpenText - Fortify on Demand (FoD) on SaaS

    MICRO FOCUS

    Fortify on Demand (FoD) is a remotely-delivered, cloud-based application security as a service solution. Application security testing is performed and reviewed by application security experts using application testing technologies and manual techniques. All customers are provided access to our technical account support team.

  • ThreatMatch - Cyber Threat Intelligence Sharing Platform

    SECURITY ALLIANCE LIMITED

    The ThreatMatch Intelligence Portal / Platform is collaborative, purpose-built for intelligence sharing. ThreatMatch Community Subscription enables the development and operation of secure, trusted communities, based on sector, geography or collaborative efforts. Quickly share intelligence across the whole community and allow members of the community to share their own intelligence.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • Disclosures Manager - Disclosure and Barring Service (DBS) services

    Atlantic Data

    Atlantic Data's Disclosures service provides organizations with an online platform for processing, administering, and managing criminal record checks. This service connects directly to the DBS through its eBulk service. Disclosures Manager is highly configurable with a comprehensive suite of management tools to assist organisations to manage and oversee these checks.

  • KPMG Cyber Risk Insights, risk quantification software

    KPMG LLP

    KPMG Cyber Risk Insights is an intuitive Cyber Risk Quantification (CRQ) SaaS product. Using a threat-led and financial modelling approach, it accurately assess the likelihood and impact of cyber-attacks. Cyber Risk Insights helps articulate your risk exposure in business terms, and prioritise defence capabilities and controls that maximise risk reduction.

  • Computacenter - IBM Netezza as a Service

    Computacenter (UK) Ltd

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • Pathlock Cloud Application Access Governance (AAG)

    RESULTING LIMITED

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • EIS (Cantium) Tenable Licensing

    Cantium Business Solutions

    Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.

  • Neotas Investigative SaaS Platform

    NEOTAS LIMITED

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • CDW BlueVoyant - Digital Risk Protection (DRP)

    CDW LIMITED

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • BlackBerry AtHoc Critical Communication & Event Management

    BlackBerry UK Limited

    BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.