Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1538 results found

1538 results found in Lot 2: Cloud software in the category Secure content and threat management

  • Palo Alto Prisma SaaS

    PHOENIX SOFTWARE LIMITED

    The appeal of SaaS applications, such as Office 365, GSuite is growing; but so are the hidden threats in SaaS offerings: costly data-leaks, regulatory noncompliance, malware propagation, etc. The Prisma SaaS service complements your existing security tools and delivers data-classification, data-leakage prevention, and threat detection, helping you secure SaaS applications.

  • Hicomply - ISMS Cyber Assessment Framework (CAF) & NIS2, ISO27K, GDPR, Privacy Management

    HICOMPLY LTD

    GDPR, Cyber Assessment Framework CAF and NIS2 platform for risk and compliance management. Privacy, GDPR, CAF, NIS2, ISO27001, other frameworks. Centralised GRC and ISMS solution. Configurable tools, automation, and integrations enhance risk management, monitoring, and compliance. Ensure alignment with CAF, ISO 27001, and NIS regulations for a proactive security posture.

  • CrowdStrike Falcon Data Protection

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Proofpoint Essentials

    INTEGRITY360 LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

  • Proofpoint Shadow

    SOFTCAT PLC

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Barracuda SecureEdge (SASE)

    MISCO TECHNOLOGIES LIMITED

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, and allows security inspection and policy enforcement in the cloud, at the branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access, Firewall-as-a-Service, web security,and fully integrated office connectivity with Secure SD-WAN.

  • Infreemation - Incidents

    DIGITAL INTERACTIVE LIMITED

    Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents

  • Security Container

    eCora

    The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.

  • SHARE

    MEGANEXUS LTD

    SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.

  • Experian Data Management and Single Customer View with ExPin

    EXPERIAN LIMITED

    An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.

  • Barracuda WAF-as-a-Service

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.

  • Laravel Development

    JBi Digital

    Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.

  • Experian Email Risk Assessment and Identity Verification

    EXPERIAN LIMITED

    Email Risk Assessment is available to support account opening (originations), Account Management and Transaction Validation. Algorithms assess the risk level associated with a customer’s email address, in real time. A risk score is generated to help decide the right action for a customer application.

  • CrowdStrike Falcon Exposure Management

    BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY

    CrowdStrike Falcon Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Netwrix Enterprise Auditor

    INTEGRITY360 LIMITED

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.

  • Proofpoint P0 Bundle

    BYTES SOFTWARE SERVICES LIMITED

    Resolve your email threats across the entire attack chain, from detection to response. This includes the ability to automate abuse mailbox management by removing malicious user-reported phishing emails. This addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. bssgc

  • boxxe Tenable Vulnerability Management and Assessment

    BOXXE LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • CDW Check Point CloudGuard Network Security (CGNS)

    CDW LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    SOFTCAT PLC

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • Cyber Security

    ALTIATECH LTD

    Our endpoint and network security services protect your IT environment, manage unauthorised access and target threats to prevent them from entering your organisation’s network. To prevent malicious attacks, we provide security component architecture and implementation, with testing to uncover any vulnerabilities, threats or risks in your applications, network and infrastructure.

  • Forescout - EyeSight / EyeControl / EyeInspect

    SOFTCAT PLC

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Proofpoint Complete Package

    SOFTCAT PLC

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Internal Vulnerability Assessment Service

    LEIDOS INNOVATIONS UK LTD

    Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.

  • Sophos Intercept X Mobile

    PHOENIX SOFTWARE LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Wordpress support

    SPINDOGS LTD

    Support for mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • BeyondTrust Remote Support

    INTEGRITY360 LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.

  • MTI Trend Micro Cloud Application Security -CAS

    MTI TECHNOLOGY LIMITED

    Trend Micro Cloud App Security protects incoming and internal emails from Microsoft 365 and Gmail™ against advanced malware and other threats. It also enforces compliance on other cloud filesharing and collaboration services, including Box, Dropbox, Google Drive™, Microsoft SharePoint online, Microsoft OneDrive for business, and Microsoft Teams.

  • Sophos Security

    NOC365 LTD

    Sophos provides security to protect Windows, Mac and Linux systems against malware and advanced threats. The Sophos Central platform provides one unified console to manage the suite of security solutions which includes: Sophos Intercept X, Sophos Endpoint Protection, Sophos Email Scanning, Sophos XG Firewall, Sophos Cloud Optix, Sophos Mobile Security

  • Dot™

    SAPPHIRE TECHNOLOGIES LIMITED

    Dot™ conducts asset discovery and vulnerability management to generate a comprehensive picture of your operational technology networks. Through the use of security-by-design and safety-critical scanning technology, our solution supports both modern and legacy networks, and leverages exclusive active scanning software.

  • Proofpoint CASB

    SOFTCAT PLC

    Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,