Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1537 results found

1537 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Neo Technology Cloud Management Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Cloud Management Service offers comprehensive support for your cloud infrastructure, covering applications, databases, and platforms. Our highly-experienced Application Managed Service (AMS) team ensures optimal performance, freeing up internal resources and delivering exceptional value. We support both Open Source and proprietary stacks across IaaS, PaaS, and SaaS environments.

  • NQM Secure Remote Access

    NquiringMinds Ltd

    NQM Secure Remote Access provides administrative level remote access to systems, using highly secure frameworks.

  • CloudCover Guardian for Azure

    virtualDCS Ltd

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Palo Alto Prisma SaaS

    Phoenix Software Ltd

    The appeal of SaaS applications, such as Office 365, GSuite is growing; but so are the hidden threats in SaaS offerings: costly data-leaks, regulatory noncompliance, malware propagation, etc. The Prisma SaaS service complements your existing security tools and delivers data-classification, data-leakage prevention, and threat detection, helping you secure SaaS applications.

  • CrowdStrike Falcon Data Protection

    BT PLC

    Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Proofpoint Essentials

    INTEGRITY360 LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

  • Proofpoint Shadow

    Softcat Limited

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Barracuda SecureEdge (SASE)

    MISCO TECHNOLOGIES LIMITED

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, and allows security inspection and policy enforcement in the cloud, at the branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access, Firewall-as-a-Service, web security,and fully integrated office connectivity with Secure SD-WAN.

  • Infreemation - Incidents

    Digital Interactive Ltd

    Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents

  • Security Container

    eCora

    The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.

  • SHARE

    MegaNexus Ltd

    SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.

  • Experian Data Management and Single Customer View with ExPin

    Experian

    An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.

  • Barracuda WAF-as-a-Service

    Central Networks and Technologies Ltd

    Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.

  • Laravel Development

    JBi Digital

    Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.

  • Experian Email Risk Assessment and Identity Verification

    Experian

    Email Risk Assessment is available to support account opening (originations), Account Management and Transaction Validation. Algorithms assess the risk level associated with a customer’s email address, in real time. A risk score is generated to help decide the right action for a customer application.

  • CrowdStrike Falcon Exposure Management

    BT PLC

    CrowdStrike Falcon Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Netwrix Enterprise Auditor

    INTEGRITY360 LIMITED

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.

  • Proofpoint P0 Bundle

    Bytes Software Services

    Resolve your email threats across the entire attack chain, from detection to response. This includes the ability to automate abuse mailbox management by removing malicious user-reported phishing emails. This addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. bssgc

  • boxxe Tenable Vulnerability Management and Assesment

    BOXXE LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • CDW Check Point CloudGuard Network Security (CGNS)

    CDW Limited

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    Softcat Limited

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • Cyber Security

    Altiatech Ltd

    Our endpoint and network security services protect your IT environment, manage unauthorised access and target threats to prevent them from entering your organisation’s network. To prevent malicious attacks, we provide security component architecture and implementation, with testing to uncover any vulnerabilities, threats or risks in your applications, network and infrastructure.

  • Forescout - EyeSight / EyeControl / EyeInspect

    Softcat Limited

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Proofpoint Complete Package

    Softcat Limited

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Internal Vulnerability Assessment Service

    Leidos Innovations UK Limited

    Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.

  • Sophos Intercept X Mobile

    Phoenix Software Ltd

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Wordpress support

    Spindogs Ltd

    Support for mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Interneuron RPA - Provisioning and Leavers Automation

    Interneuron Ltd

    Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.

  • Broadcom/Symantec Mirror Gateway

    Gradian Systems Ltd

    Broadcom offers the first CASB mirror gateway, a unique and more secure, resilient method to enforce in-line visibility, data security, and threat protection over the use of any sanctioned cloud app from unmanaged endpoints

  • BeyondTrust Remote Support

    INTEGRITY360 LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.