Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Sophos Central Intercept X for Server

    Planet IT

    Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

  • Progress MOVEit Cloud

    SOFTCAT PLC

    Secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA, and GDPR. It reduces the risk of data loss and non-compliance with a fully-auditable and managed file transfer solution.

  • ComplaintsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.

  • Certificate Authority as a Service

    Q-SOLUTION LIMITED

    A Private Certificate Authority service, hosted within public cloud, providing X.509 client certificates for users, devices and systems. Designed for use by an organisation or closed community for applications such as API messaging, server mutual TLS, VPNs, IoT devices, mobile device or laptop authentication, user access to secure systems.

  • Confirmation of Payee

    TECHNOXANDER LTD

    TechnoXander's Confirmation of Payee (CoP) solution is a name-checking service designed to reduce misdirected payments and provide greater assurance that payments are being sent, and collected from, the intended account holder. It aims to enhance customer confidence, mitigate APP Fraud risks, and assist financial institutions in fulfilling their regulatory obligations.

  • BT Managed Endpoint Security CrowdStrike

    BT PLC

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    VE3 GLOBAL LTD

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.

  • Armis Centrix

    INTEGRITY360 LIMITED

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.

  • Armis Centrix

    Communication-STEM Ltd

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.

  • Rapid7 Insight AppSec

    CYBERLAB CONSULTING LTD

    Providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.

  • Privacy Management platform

    GET SWARMS LIMITED

    Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.

  • Managed Microsoft 365

    XEROX (UK) LIMITED

    As a Direct-Bill Cloud Service Provider, Xerox's managed service of Microsoft's cloud-based office productivity, collaboration and security suite of applications. ISO27001 hosted MS Azure Applications include, Exchange, Outlook, Teams, OneDrive, SharePoint, Defender, Autopilot, Intune and much more. Project work and ongoing support is available as part of this service.

  • OKTA SSO and Identity Management Software License and Deployment Service

    AVELLA SECURITY LIMITED

    Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA

  • BeyondTrust Identity Security Insights

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc

  • Google Workspace Marketplace via Netpremacy

    Netpremacy Limited

    Netpremacy provides Google Workspace Marketplace applications to integrate into your domain. Google Workspace Marketplace offers a wide range of quality enterprise apps: CRM, Task Management and Admin tools that add functionality and features to your native Workspace apps. Includes Recommended for Google Workspace, Google Drive, Gmail, Communications and Utilities.

  • Sophos Central Intercept X Endpoint

    Planet IT

    Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

  • CrowdStrike Falcon Identity Protection

    BT PLC

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..

  • Microsoft Office 365

    Synergi Software Limited

    Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.

  • CheckPoint Harmony Browse

    BYTES SOFTWARE SERVICES LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc

  • KnowBe4 Security Awareness Training and Phishing Simulation

    LINEAL SOFTWARE SOLUTIONS LIMITED

    Lineal provide Phishing Campaign design and execution services for customers followed by management reporting and end user training to support real business change and develop improved awareness of modern cyber security risks. We also provide full support and are a Microsoft Gold and KnowBe4 partner providing licensing and support.

  • CDW Cisco Secure Access Service Edge (SASE)

    CDW LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Mimecast Cybergraph

    QUADRIS LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • BMC Helix Operations Management with AIOps

    Fusion Business Solutions (UK) Limited

    BMC Helix Operations Management is a turnkey solution that provides a comprehensive view of how key services are performing, so IT knows immediately if customer experiences may be impacted. Recognised by Gigacom & Forrester as a Market Leader for AIOps

  • Varonis SaaS Data Security Posture Management (DSPM)

    SOMERFORD ASSOCIATES LIMITED

    Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.

  • Check Point CloudGuard Web Application Firewall (WAF)

    INTEGRITY360 LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)

  • CDW Microsoft Intune Suite

    CDW LIMITED

    Unify critical advanced endpoint management and security solutions. Simplify your endpoint management experience, improves security posture, and keeps people at the centre with exceptional user experiences. Empower IT and security teams with data science and AI to increase automation, move from reactive to proactive in addressing endpoint and security challenges.

  • Google Cloud Cost Management and Optimization

    LEFKE IT LIMITED

    LefkeIT specializes in Google Cloud Cost Management and Optimization, helping businesses maximize their cloud investment while minimizing expenses. Our expert consultants analyze your usage patterns, identify cost-saving opportunities, and implement strategic optimization measures.

  • Property Management Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of their property management cases. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • CDW Rubrik

    CDW LIMITED

    Rubrik provides a zero trust data protection platform across all data and applications whether located on premises or in the public, private or hybrid cloud. Rubrik provides Identity Recovery, Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane