Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2446 results found

2446 results found in Lot 2: Cloud software in the category Security

  • Salesforce Mobile App Development

    DEFENCE DATASEC LTD

    "Defence DataSec specializes in Salesforce Mobile App Development, tailored for government departments. Our expert developers create secure, user-friendly mobile apps to enhance government operations, citizen engagement, and data accessibility. We ensure seamless integration with Salesforce, enabling efficient on-the-go functionality for government entities and their constituents. "

  • Proofpoint Essentials

    PHOENIX SOFTWARE LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

  • Enterprise Password Management - in partnership with Bitwarden

    Qnetix Ltd

    A majority of hacking-related breaches succeed through stolen or weak passwords. Empower employees to generate strong, unique passwords and share them securely whilst keeping all business passwords and other sensitive information in an end-to-end encrypted vault.

  • FourNet (4net) SOCaaS

    4NET TECHNOLOGIES LTD

    FourNet's SOCaaS (Security Operations Centre as a Service) provides comprehensive cybersecurity monitoring and management. It delivers real-time threat detection, incident response and continuous security analysis, leveraging FourNet’s advanced technologies. This service is designed to enhance an organisation's security posture while minimising the operational complexities of managing security internally.

  • OKTA

    INTEGRITY360 LIMITED

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • CDW Proofpoint P0 Bundle

    CDW LIMITED

    Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.

  • Mimecast Cyber Resilence Pro Plan

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Computacenter - CrowdStrike Falcon Data Protection

    COMPUTACENTER (UK) LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • MTI Firewall Managed Service

    MTI TECHNOLOGY LIMITED

    MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times. The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.

  • Tenable One (Standard and Enterprise)

    KHIPU NETWORKS LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Enterprise option include tools for breach & attack mitigation and insight into the external attack surface. Includes other Tenable point products.

  • Requirement Traceability Matrix (RTM) Creation

    LEFKE IT LIMITED

    LefkeIT excels in Requirement Traceability Matrix (RTM) Creation, ensuring alignment between stakeholders, development, and testing teams. Through meticulous documentation and tracking, we facilitate traceability, verification, and validation of requirements throughout the project lifecycle, ensuring transparency and accountability in project delivery.

  • MLL VoiceLine+

    MLL TELECOM LTD.

    MLL’s Voiceline+ service offers a direct replacement for analogue and digital ISDN30. A competitively priced hosted VoIP solution providing an alternative to legacy single-line PSTN landlines, Voiceline+ allows Buyers to continue to use existing telephone handsets, with the advantage of adding a soft client any smart device.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    BYTES SOFTWARE SERVICES LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc

  • Microsoft 365

    KICK ICT GROUP LIMITED

    Take advantage of our Microsoft 365 managed service to deploy and support the full range of Microsoft 365 apps across your organisation. Benefit from Teams, SharePoint, OneDrive, Outlook and more, all hosted within a robust, secure and compliant cloud-based environment

  • boxxe Enterprise Mobility + Security E3

    BOXXE LIMITED

    Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics

  • Stone Enterprise Network Security - Cisco Duo

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Duo to provide Two Factor Authentication. Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known vulnerabilities and/or exploits.

  • boxxe Sophos Network Detection and Response

    BOXXE LIMITED

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating

  • Mimecast Perimeter Defence Plan (Zone 1)

    Chess CyberSecurity Ltd t/a CyberLab

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • UK Sovereign Secure Intune Migration - EBF

    NINE23 LTD

    The Platform FLEX / EBF Onboarder service enables efficient migration from one EMM or MDM Platform to another. Flex Onboarder replaces the manual process of migrating a Device with an automated User notification and a guidance process supported by a central Administration Console.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    CHESS ICT LIMITED

    "Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications."

  • IRIS: Incident Command software for front-line first responders

    UNBLUR SL

    Unblur helps front-line first responders (Fire Service, Law Enforcement, Civil Protection, SAR...)to make safer and faster decisions in the field. IRIS Core, our Incident Command software provides greater Situation Awareness supporting the decision making, team coordination, and easy & transparent post-incident reporting.

  • Database application

    OMDA HEALTH ANALYTICS LIMITED

    Cloud-based database web application for medical studies, trials and registers.

  • Business Operations Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Google Cloud Cost Management and Optimization

    DEFENCE DATASEC LTD

    Defence DataSec specializes in Google Cloud Cost Management and Optimization, helping businesses maximize their cloud investment while minimizing expenses.Our expert consultants analyze your usage patterns, identify cost-saving opportunities,and implement strategic optimization measures.Trust us to streamline your cloud spending, ensuring optimal resource allocation and budget compliance without compromising performance or scalability.

  • Forcepoint Next Generation Firewall (NGFW)

    SAPPHIRE TECHNOLOGIES LIMITED

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • SEP2.security Managed Detection & Response (MDR)

    SEP2 LIMITED

    SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.

  • Static Application Security Testing (SAST)

    TMC3 LIMITED

    Veracode Static Analysis (SAST) is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Static Analysis provides fast, automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance to fix issues fast.

  • KnowBe4 PhishER

    SOFTCAT PLC

    PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns. PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities

  • HYDRAX Secure Mobile Device Management Service

    PHONEHUB IO LTD

    Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.

  • Logit.io Logging as a Service and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.