Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Centerprise Email Archiving Solution by TitanHQ

    CENTERPRISE INTERNATIONAL LIMITED

    Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit

  • Identity & Access Management (IdAM)

    Xalient Holdings Limited

    Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IdAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with  BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt.

  • e2e Vulnerability Scanning Service

    e2e-assure Ltd

    Find vulnerabilities in your external-facing services - before attackers do. Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.

  • Micro Focus, now OpenText - Voltage Fusion on SaaS

    MICRO FOCUS

    Voltage Fusion SaaS delivers data-discovery capabilities that enrich data and expose value across our Customer’s deep and rich data eco-systems. Voltage Fusion is built to help mitigate the risks associated with managing and preserving sensitive data while containing the total cost of compliance –from a single source in the cloud.

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Identity and access management (IDAM)

    ZAIZI LTD

    Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions. We provide skills and advice guiding you from discovery through to implementation.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Barracuda Cloud to Cloud Backup

    Planet IT

    Barracuda Cloud to Cloud Backup is a backup and archiving solution for Office 365. Covering email, SharePoint, One Drive for Business and Teams.

  • Armour Unity - Ultra Secure Video Conferencing for Sensitive & Higher Assurance Environments

    Armour Comms

    Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.

  • Incident Management Solution

    GET SWARMS LIMITED

    Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.

  • Email Advanced Protection

    FuseMail

    Powerful anti-spam, anti-phishing, and antivirus technology that crushes unwanted or malicious messages while increasing operational efficiency. Integrate VIPRE Email Security Cloud into any email client or server including Microsoft Outlook, Office 365, Google Apps, Lotus Notes. With the ability to use attachment sandboxing to safely validate extracted attachments.

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • Searchability NS&D Software

    SEARCHABILITY (NS&D) LIMITED

    We provide technically qualified resource, resource augmentation and SoW across a range of Service offerings.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • SafeZone

    CriticalArc Ltd

    Critical Arc, a global tech innovator, designs and delivers a distributed command and control solution, SafeZone™, which is revolutionising the way organisations manage day-to-day safety and security operations. SafeZone provides response teams with complete operational awareness, to enhance the protection of dispersed people, facilities, and assets, while delivering efficiency savings.

  • CDW Microsoft Entra ID Free

    CDW LIMITED

    Azure Active Directory (Azure AD) cloud-based identity and access management service, secures employees sign-in and access resources such as Office365, Azure portal, and thousands of other SaaS applications. Internal resources, such as applications on your corporate network and intranet, along with any cloud applications developed by your own organization.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Security Operations for CryptoSpike as a service

    Proact IT UK Limited

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Managed IT Service

    Kick ICT

    Our managed IT service delivers outstanding IT support and access to a wide range of leading technology providers, meaning we can provide a scalable, secure and modern IT environment for our customers. Service includes options for 24/7x365 support, cyber security, cloud services, datacentre, back up and disaster recovery and hardware.

  • RiskTree

    2T SECURITY LTD

    RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Data Loss Prevention (DLP) Strategy and Implementation

    LEFKE IT LIMITED

    LefkeIT offers expert Data Loss Prevention (DLP) Strategy and Implementation services. Our skilled team designs and deploys comprehensive DLP frameworks to safeguard sensitive data across your organization. From policy development to technology implementation, we ensure proactive protection against data breaches and regulatory compliance.

  • HPE Aruba Central: Wi-Fi, Networking, UXI, Fabric Orchestration, Pensando, IOT, Cloud Authentication

    Khipu Networks Limited

    HPE Aruba's Cloud Managed Networking Services offers a simple, secure and cost-effective way to deliver, manage and monitor wireless access points, mobility controllers, LAN switches, top of rack networking and security appliances, Cloud Authentication and SD-WAN. This service can be delivered in a number of flexible ways.

  • Forcepoint Cloud Web Security

    BYTES SOFTWARE SERVICES LIMITED

    Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership. bssgc

  • SolarWinds User Device Tracker (UDT) License

    Prosperon Networks Ltd

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    e2e-assure Ltd

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • CDW Microsoft Teams Phone

    CDW LIMITED

    Phone System in Office 365 gives you PBX capabilities, but without the complicated and expensive equipment. Phone System allows you to replace your existing on-premises PBX system with a set of features delivered from Office 365 that is tightly integrated into your cloud experience.

  • Identity Assurance Services

    VIABLE DATA LTD

    Experts in biometrics and security controls, Viable Data offer a range of Identity Assurance Services, covering strategy, design, development, operational support and implementation services. With digital identity industry expertise, we provide services ranging from securing digital channels to performing biographical and biometric checks, ensuring the accuracy of an identity claim.

  • Sonatype Tools Hosting (Nexus Repository, Firewall, Lifecycle, Lifecycle Cloud)

    THE SERVER LABS LTD

    Sonatype products such as Maven, Nexus and Lifeycycle (formerly CLM) and Lifecycle Cloud form the backbone of Devops. Thousands of teams choose Sonatype tools to develop and manage their software projects and artifacts. Clouds supported: AWS, Google Compute Engine, Azure, UKCloud