Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1734 results found

1734 results found in Lot 2: Cloud software in the category Security risk management

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • EIS (Cantium) Tenable Licensing

    Cantium Business Solutions

    Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.

  • Neotas Investigative SaaS Platform

    NEOTAS LIMITED

    Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • CDW BlueVoyant - Digital Risk Protection (DRP)

    CDW LIMITED

    Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.

  • BlackBerry AtHoc Critical Communication & Event Management

    BlackBerry UK Limited

    BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Global VAT Reporting Tool (GVRT)

    ERNST & YOUNG LLP

    GVRT is a cloud-hosted, global Value Added Tax (VAT) and Goods and Services Tax (GST) reporting solution, that redefines and globally standardises the preparation, production, and reporting process of the business. EY GVRT is designed to simplify, digitise, and automate your indirect tax compliance, helping future proof your organisation.

  • MetaLearning Premium

    MetaCompliance Ltd

    MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.

  • Cyber Range platform / Cyber security exercises

    CYBEXER TECHNOLOGIES

    Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.

  • Beyondtrust Remote Support

    CYBERIAM HOLDINGS LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.

  • MTI Hybrid Datacenter- Rationalisation & Migration

    MTI TECHNOLOGY LIMITED

    MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Microsoft Cloud App Security

    VE3 GLOBAL LTD

    Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • AvePoint Policies for Microsoft 365

    BYTES SOFTWARE SERVICES LIMITED

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive. bssgc

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Efecte Cloud Based Service Management

    Matrix42 Sweden AB

    Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management (ITSM & ESM), Identity and Access Management (IAM), and Conversational IT. With our innovative and scalable solutions, organizations can streamline operations, enhance productivity, and achieve digital transformation goals.

  • Inoapps Customer Billing Management

    INOAPPS LIMITED

    Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.

  • Palantir Platform: Gotham

    PALANTIR TECHNOLOGIES UK, LTD.

    Palantir Gotham is an enterprise platform for planning missions and running investigations using disparate data, while maintaining privacy and access controls. The platform also incorporates Palantir Foundry’s capabilities, offering a suite of analytical and operational applications, enabling analysts to produce actionable intelligence based on the full ecosystem of available data.

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Broadcom/Symantec Endpoint Security Complete

    Gradian Systems Ltd

    Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses artificial-intelligence (AI) to optimize security decisions.

  • KnowBe4: Leading Security Awareness Training & Simulated Phishing for Human Risk in UK Public Sector

    S3 Ltd

    KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks. Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.

  • CDW Crowdstrike Falcon Endpoint Detection & Response (EDR)

    CDW LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Jamf Apple Device Management and Security Solutions for Education

    GBM DIGITAL TECHNOLOGIES LIMITED

    Jamf allows educational institutions to easily manage and secure their Apple ecosystem, enabling them to support equitable learning with iPad. Jamf provides a complete and comprehensive management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy.

  • Backup as a Service

    Kick ICT

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • SAP GRC as a Service

    Turnkey Consulting (UK) Limited

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Grant Thornton - Cyber Training and Awareness

    GRANT THORNTON UK LLP

    Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.

  • Palo Alto Cortex XSOAR

    BYTES SOFTWARE SERVICES LIMITED

    XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs. bssgc