Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • boxxe Cloudflare Cloud Email Security

    BOXXE LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • CDW Sophos Intercept X Advanced with XDR

    CDW LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Backupify for Google Workspace via Netpremacy

    Netpremacy Limited

    Backupify protects your most important cloud data through secure, automatic, daily backup. Backupify allows search and restore of files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and application errors. Backs-up data in Google Mail, Drive, Calendar, Contacts, and Shared Drives.

  • Proofpoint DLP Transform Package

    INTEGRITY360 LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Sophos Managed Risk

    PHOENIX SOFTWARE LIMITED

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity

  • Computacenter - IBM WatsonX.Governance

    COMPUTACENTER (UK) LIMITED

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.

  • Workforce Analytics

    MeVitae

    Helping organisations hire smarter, faster and fairer, by mitigating unconscious and algorithmic bias. Improving diversity and inclusion typically involves three stages: identifying areas for improvement, selecting appropriate interventions, and assessing their impact. MeVitae’s analytics assists you throughout each of these stages, whilst seamlessly integrating with 20+ ATS' and HR tools.

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Powered by Neo: Offline Functionalities and Mobile App

    NEO TECHNOLOGY LIMITED

    Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.

  • CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    SOFTCAT PLC

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    COMPUTACENTER (UK) LIMITED

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • Proofpoint P1 Bundle

    BYTES SOFTWARE SERVICES LIMITED

    Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc

  • MIRACL MFA and DVS

    Grove Information Systems

    MIRACL Trust Proof is a service using the Designated Verifier Signature (DVS) digital signature scheme that allows the signing of any digital transaction, user action, data transfer or Machine-Machine interaction to make it irrefutable. Authenticity of action can be proven due to the immutable and cryptographic nature of the signatures.

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Rapid7 - Insight AppSec

    SOFTCAT PLC

    InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • SAS® Fraud Insights

    SAS SOFTWARE LIMITED

    SAS® Fraud Insights on G-Cloud provides an innovative way of joining massive amounts of data to visualise new patterns and trends across complex fraud and audit typologies. SAS uses its powerful visualisation, data quality and machine learning technologies together with speed-of-thought analysis to find and detect fraud fast at scale.

  • Totalmobile Major Infrastructure Logistics Management

    TotalMobile

    Totalmobile is the market leader in construction logistics harnessing its enterprise digital platform supporting major construction/infrastructure programmes to achieve excellence in operational efficiencies and compliance monitoring. Key aspects of our platform include; logistics tracking, lone working, asset/inventory management, delivery management, appointment booking, integrated routing/visual maps, navigation/location APIs and real-time analytics.

  • Powered by Neo: Refund Management Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Refund Management Solutions streamline the process of issuing refunds in the housing sector. Our system automates refund requests, tracks refund statuses, and facilitates timely reimbursements to tenants. With built-in reporting and communication tools, landlords can efficiently manage refunds while maintaining transparency and compliance.

  • Check Point Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Kentico web content management system

    SPINDOGS LTD

    Kentico web content management system. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Powered by Neo: Voids Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Voids Management Solution optimises the process of managing vacant properties in the housing sector. Leveraging advanced case management and task assignment features, it streamlines workflows, reduces turnaround times, and enhances operational efficiency, ensuring swift property occupancy and tenant satisfaction.

  • Equine, Livestock and Companion Animal Border Control Service

    EQUINE REGISTER LIMITED

    Enables organisations exchange data and record the arrival and departure of an equine, livestock, companion animals (including dogs and cats) also check the biosecurity status of an animal in advance of its arrival. Supports recording of double ended movements and communications between organisations and users to manage biosecurity and risk.

  • SAP Concur Invoice Professional Edition

    Concur

    Concur Invoice allows you to capture and automate paper and electronic invoices, then integrate those payments into a single system for managing all of your spending. You’ll literally be able to track every penny in one, simple AP system and access it anytime, anywhere with the Concur mobile app.

  • CDW AvePoint Policies for Microsoft 365

    CDW LIMITED

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Threat Intelligence Services

    LEFKE IT LIMITED

    LefkeIT delivers comprehensive Threat Intelligence Services. Our expert team monitors global threats, analyzes trends, and provides actionable insights tailored to your organization's risk profile. With proactive threat detection and response measures, we help fortify your defenses against evolving cyber threats, ensuring resilience and protection of your assets.

  • Identity and Access Management (IAM) Advanced

    SAPPHIRE TECHNOLOGIES LIMITED

    An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).

  • Cloud Software Deployment & In-life Management

    ISx4

    ISx4 specialises in the implementation of analytics and AI solutions on cloud infrastructure. Options include Azure, AWS, SAS, Watsonx, Posit, Anaconda and bespoke solutions. ISx4 can host and own the cloud environment or deploy to the client cloud environment . In-life management and support is part of the service offering.