Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Protective DNS and content filtering

    ITHQ LTD

    DNSFilter provides protective DNS and content filtering services, blocking malicious sites and inappropriate content at the DNS level. It features easy policy creation, roaming client support, and flexible deployment options, suitable for diverse environments including remote work settings.

  • Google Workspace Business Standard

    Levett Consultancy Ltd

    Google Workspace Business Standard edition includes everything within the starter edition plus you get 2 TB of pooled storage for each user in your organisation to store Gmail messages, Google Photos, and files in Google Drive. Standard edition also provides the ability to record meeting sessions from within Google Meet.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    CHESS ICT LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • SolarWinds Access Rights Manager (ARM) license

    Prosperon Networks Ltd

    SolarWinds® Access Rights Manager (ARM) is designed to assist IT and Security Administrators to quickly and easily provision, de-provision, manage and audit user access rights to systems, data, and files. ARM helps to protect organisations from the potential risks of data breaches, and demonstrate regulatory compliance.

  • SolarWinds Database Performance Analyzer (DPA) License

    Prosperon Networks Ltd

    SolarWinds® Database Performance Analyzer (DPA) provides deep visibility into database performance and advice for performance optimisation and tuning. Understand how every aspect of the system affects performance across relational database operations, host server and OS, virtualization resources and storage I/O.

  • Crown Workforce Management Suite

    Crown Computing Limited

    Crown Workforce Management empowers organisations to overcome complex workforce challenges, to significantly improve business and operational efficiency. The WFM suite comprises: time & attendance and absence management, staff rostering, people and activity management. Data security and reliability are paramount. Fully configurable and interfaces with any HR, payroll and ERP system.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    Cyberlab

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Cynet360

    INTEGRITY360 LIMITED

    Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.

  • Acronis Cyber Protect (Backup, Security, Management) - Per Device Model

    MISCO TECHNOLOGIES LIMITED

    Acronis Cyber Protect offers a revolutionary approach to cyber protection by integrating data protection with cybersecurity. This integrated method eliminates complexity challenges, delivers better protection against today’s threats, and maximizes efficiency by saving time and money. Features include Backup, Disaster Recovery, Security, Vulnerability & Patching, email security, data loss prevention

  • CheckPoint - CloudGuard Cloud Security Posture Management

    VE3 GLOBAL LTD

    VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.

  • Netwrix Endpoint Protector

    BYTES SOFTWARE SERVICES LIMITED

    oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.  bssgc

  • Purple OS - Secure Operating System and app management solution

    Made Purple Ltd

    An advanced operating system and application manager designed for prisons and secure hospitals. Whether you're streaming on-demand TV like BBC iPlayer, using Purple-Play for secure YouTube access, providing safe online shopping, secure web browsing, or accessing educational resources and internal information, Purple-OS ensures it's delivered with the highest secure standards.

  • Nutanix Datacenter Modernization Consulting service

    HYPER TALENT SOLUTIONS LTD

    Nutanix Datacenter Modernization Consulting Service offers expert guidance for upgrading and optimizing data center infrastructures. It focuses on streamlining operations, enhancing agility, and reducing costs. This service tailors modernization strategies to meet specific business needs, ensuring seamless transitions to efficient, scalable, and future-ready data center environments.

  • TryHackMe: AWS Cloud Security Training

    TRYHACKME LTD

    TryHackMe offers online Cloud Security training to businesses, government and educational organisations. With gamified modules available 24/7, users can expand their cybersecurity skills while enhancing their cloud security expertise. TryHackMe offers these training opportunities for people using a variety of real-world scenarios.

  • Palo Alto Cortex XSOAR

    PHOENIX SOFTWARE LIMITED

    "Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs."

  • Portnox

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.

  • Proofpoint Essentials

    PHOENIX SOFTWARE LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

  • Enterprise Password Management - in partnership with Bitwarden

    QNETIX LTD

    A majority of hacking-related breaches succeed through stolen or weak passwords. Empower employees to generate strong, unique passwords and share them securely whilst keeping all business passwords and other sensitive information in an end-to-end encrypted vault.

  • FourNet (4net) SOCaaS

    4net Technologies Ltd

    FourNet's SOCaaS (Security Operations Centre as a Service) provides comprehensive cybersecurity monitoring and management. It delivers real-time threat detection, incident response and continuous security analysis, leveraging FourNet’s advanced technologies. This service is designed to enhance an organisation's security posture while minimising the operational complexities of managing security internally.

  • OKTA

    INTEGRITY360 LIMITED

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • CDW Proofpoint P0 Bundle

    CDW LIMITED

    Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.

  • Mimecast Cyber Resilence Pro Plan

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Computacenter - CrowdStrike Falcon Data Protection

    Computacenter (UK) Ltd

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • MTI Firewall Managed Service

    MTI TECHNOLOGY LIMITED

    MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times. The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.

  • Tenable One (Standard and Enterprise)

    Khipu Networks Limited

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Enterprise option include tools for breach & attack mitigation and insight into the external attack surface. Includes other Tenable point products.

  • Requirement Traceability Matrix (RTM) Creation

    LEFKE IT LIMITED

    LefkeIT excels in Requirement Traceability Matrix (RTM) Creation, ensuring alignment between stakeholders, development, and testing teams. Through meticulous documentation and tracking, we facilitate traceability, verification, and validation of requirements throughout the project lifecycle, ensuring transparency and accountability in project delivery.

  • MLL VoiceLine+

    MLL Telecom Ltd.

    MLL’s Voiceline+ service offers a direct replacement for analogue and digital ISDN30. A competitively priced hosted VoIP solution providing an alternative to legacy single-line PSTN landlines, Voiceline+ allows Buyers to continue to use existing telephone handsets, with the advantage of adding a soft client any smart device.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Microsoft 365

    Kick ICT

    Take advantage of our Microsoft 365 managed service to deploy and support the full range of Microsoft 365 apps across your organisation. Benefit from Teams, SharePoint, OneDrive, Outlook and more, all hosted within a robust, secure and compliant cloud-based environment

  • boxxe Enterprise Mobility + Security E3

    BOXXE LIMITED

    Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics