Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2502 results found

2502 results found in Lot 2: Cloud software in the category Security

  • Barracuda Cloud to Cloud Backup

    Planet IT

    Barracuda Cloud to Cloud Backup is a backup and archiving solution for Office 365. Covering email, SharePoint, One Drive for Business and Teams.

  • Armour Unity - Ultra Secure Video Conferencing for Sensitive & Higher Assurance Environments

    Armour Comms

    Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.

  • Incident Management Solution

    GET SWARMS LIMITED

    Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.

  • Email Advanced Protection

    FuseMail

    Powerful anti-spam, anti-phishing, and antivirus technology that crushes unwanted or malicious messages while increasing operational efficiency. Integrate VIPRE Email Security Cloud into any email client or server including Microsoft Outlook, Office 365, Google Apps, Lotus Notes. With the ability to use attachment sandboxing to safely validate extracted attachments.

  • Check Point CloudGuard Web Application Firewall as a Service (WAFaaS)

    SOFTCAT PLC

    Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)

  • Searchability NS&D Software

    SEARCHABILITY (NS&D) LIMITED

    We provide technically qualified resource, resource augmentation and SoW across a range of Service offerings.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • SafeZone

    CriticalArc Ltd

    Critical Arc, a global tech innovator, designs and delivers a distributed command and control solution, SafeZone™, which is revolutionising the way organisations manage day-to-day safety and security operations. SafeZone provides response teams with complete operational awareness, to enhance the protection of dispersed people, facilities, and assets, while delivering efficiency savings.

  • CDW Microsoft Entra ID Free

    CDW LIMITED

    Azure Active Directory (Azure AD) cloud-based identity and access management service, secures employees sign-in and access resources such as Office365, Azure portal, and thousands of other SaaS applications. Internal resources, such as applications on your corporate network and intranet, along with any cloud applications developed by your own organization.

  • Palo Alto Networks Cortex XSOAR

    Khipu Networks Limited

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Security Operations for CryptoSpike as a service

    Proact IT UK Limited

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Managed IT Service

    Kick ICT

    Our managed IT service delivers outstanding IT support and access to a wide range of leading technology providers, meaning we can provide a scalable, secure and modern IT environment for our customers. Service includes options for 24/7x365 support, cyber security, cloud services, datacentre, back up and disaster recovery and hardware.

  • RiskTree

    2T SECURITY LTD

    RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.

  • CDW CrowdStrike Falcon Cloud Security

    CDW LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Data Loss Prevention (DLP) Strategy and Implementation

    LEFKE IT LIMITED

    LefkeIT offers expert Data Loss Prevention (DLP) Strategy and Implementation services. Our skilled team designs and deploys comprehensive DLP frameworks to safeguard sensitive data across your organization. From policy development to technology implementation, we ensure proactive protection against data breaches and regulatory compliance.

  • HPE Aruba Central: Wi-Fi, Networking, UXI, Fabric Orchestration, Pensando, IOT, Cloud Authentication

    Khipu Networks Limited

    HPE Aruba's Cloud Managed Networking Services offers a simple, secure and cost-effective way to deliver, manage and monitor wireless access points, mobility controllers, LAN switches, top of rack networking and security appliances, Cloud Authentication and SD-WAN. This service can be delivered in a number of flexible ways.

  • Forcepoint Cloud Web Security

    BYTES SOFTWARE SERVICES LIMITED

    Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership. bssgc

  • SolarWinds User Device Tracker (UDT) License

    Prosperon Networks Ltd

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    e2e-assure Ltd

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • CDW Microsoft Teams Phone

    CDW LIMITED

    Phone System in Office 365 gives you PBX capabilities, but without the complicated and expensive equipment. Phone System allows you to replace your existing on-premises PBX system with a set of features delivered from Office 365 that is tightly integrated into your cloud experience.

  • Sonatype Tools Hosting (Nexus Repository, Firewall, Lifecycle, Lifecycle Cloud)

    THE SERVER LABS LTD

    Sonatype products such as Maven, Nexus and Lifeycycle (formerly CLM) and Lifecycle Cloud form the backbone of Devops. Thousands of teams choose Sonatype tools to develop and manage their software projects and artifacts. Clouds supported: AWS, Google Compute Engine, Azure, UKCloud

  • Barrier Networks Crowdstrike Falcon Identity Threat Detection & Protection

    Barrier Networks

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • Salesforce Analytics and Reporting Services

    DEFENCE DATASEC LTD

    "Defence DataSec specializes in Salesforce Analytics and Reporting Services customized for government departments. We empower government entities with powerful data analysis and reporting tools. Our services enhance decision-making processes, offer actionable insights, and facilitate data-driven strategies. We ensure that governmental objectives are met with precision and efficiency.

  • Cisco Umbrella

    NOC365 LTD

    Cisco Umbrella is used as the first layer defense for security against threats before they happen. Our Managed Cisco Umbrella service works at the DNS layer to protect all devices connected to a network, both on and off the corporate network.

  • Chrome - Zotero

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions offers Chrome - Zotero, a powerful research tool that helps students and educators collect, organize, cite, and share research sources. This service integrates seamlessly with Chromebooks, enhancing academic writing and research by simplifying the management of bibliographic data and related materials.

  • Entra ID P1

    PHOENIX SOFTWARE LIMITED

    In addition to the Free features, P1 lets your hybrid users access both on-premises and cloud resources, supports advanced administration, such as dynamic groups, self-service group management, Microsoft Identity Manager (an on-premises identity and access management suite) and cloud write-back capabilities, which allow self-service password reset for your on-premises users.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • Biometric self service, case management and operational services for custodial environments

    UNILINK SOFTWARE LIMITED

    Unilink's software boosts efficiency in prisons, hospitals, youth-custody, detention and immigration centres by enabling inmates, patients and detainees to self-serve. Case management, biometrics and operational features integrate with national systems via APIs improving communication via 'emailaprisoner' fosters better overall outcomes.

  • Mimecast DMARC Analyzer

    CHESS ICT LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • Microsoft 365 Business Process Automation

    CLOUD COVER IT SERVICES LTD T/A Flyte

    Microsoft Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today . Empower your team - get the toolkit you need for easy collaboration, improved compliance, and advanced security. Cloud Cover IT provide a complete Microsoft Solution including training and support