Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2502 results found

2502 results found in Lot 2: Cloud software in the category Security

  • SMS Reminders, Alerts

    MMG Mobile Marketing Group

    MMG offers messaging alert-services via Multi- Channel communication including: SMS, RCS, Whatapp, Apple Business Chat, Email, Voice. Alongside a Multi-Channel Campaign Manager. Renowned for security, we hold UKAS Accredited ISO-27001, ISO9001, Cyber Essentials, Cyber Essentials Plus, and Secure Digital Transactions Kitemark accreditations. MMG delivers unparalleled SMS messaging volume and reliability.

  • Tenable PCI-ASV

    BYTES SOFTWARE SERVICES LIMITED

    Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc

  • Graylog Security Cloud

    CLOUD 21 LIMITED

    Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Graylog to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Graylog Cloud Security as a service.

  • Digital IoT Tracking and Resource Management

    ISHELP.CO.UK LIMITED

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    BYTES SOFTWARE SERVICES LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom. bssgc

  • Microsoft Defender for Cloud applications

    PHOENIX SOFTWARE LIMITED

    Enterprise-grade security for cloud applications - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • Google Workspace Business Plus

    Levett Consultancy Ltd

    Google Workspace Business Plus includes everything within the Standard edition, plus you get advanced productivity tools for up to 300 users with 5 TB pooled storage for each user in your organisation, enhanced security and management controls including advanced endpoint management, Google Meets attendance tracking, and Vault eDiscovery .

  • Mimecast - Mimecast Brand Exploit Protect

    PHOENIX SOFTWARE LIMITED

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • MTI Managed Microsoft Defender for Endpoint (MDE) / (XDR)

    MTI TECHNOLOGY LIMITED

    We provide a fully Managed Microsoft Defender Service, monitored by our 24x7x365 UK SOC using SC cleared SecOps analysts. We fully configure your Microsoft Defender deployment, to prevent attacks, detect, analyse, and respond to alerts and security issues using the Defender tooling.

  • Managed PKI

    ENTRUST (EUROPE) LIMITED

    Managed PKI gives you your own high assurance, dedicated PKI, fully managed (and optionally certified) from Entrust's ultra-secure facilities, located in the UK. With Managed PKI you have a fully bespoke, PKI platform ready for all enterprise certificates, remote signing (TrustedX), eIDAS compliant Qualified Certificates etc.

  • Self-service for Custodial Institutions

    UNILINK SOFTWARE LIMITED

    Unilink's next generation self-service software enables the secure and controlled delivery of digital content and services, tailored to the specific needs of the offender/resident as well as managing every-day tasks, helping them to really engage in change and prepare for reintegration into society.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • CardEasy secure contact centre payment solutions

    ECKOH UK LIMITED

    CardEasy enables you to de-scope your contact center environment from PCI DSS, including voice and digital engagement channels. Seamless integration with your existing telephony and IT infrastructure reduces the risks and costs associated with managing compliant card payment transactions in your contact centers, whilst improving customer experience and trust

  • Okta - Identity and Access Management (IDAM)

    Xalient Holdings Limited

    Xalient will provide a fully managed Identity and Access Management service based on the Okta Identity Cloud platform. This platform allows you to orchestrate and administer your user base using Okta’s Workforce Identity toolset.

  • UK Sovereign Secure Managed Software as a Service (SaaS)

    NINE23 LTD

    Nine23 offer a fully managed private cloud infrastructure (Platform FLEX) hosted in UK Sovereign, FSC/PASF accredited datacentres, capable of hosting Tier 1 OFFICIAL (SENSITIVE) applications and fully managed service to provide SaaS services. Connections available to government networks (RLI,LECN,PSN,HSCN) and internet-connected. NCSC Cloud Security Principles, Secure-by-Design. Enables secure user-focused applications.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Rapid7 Insight AppSec

    BYTES SOFTWARE SERVICES LIMITED

    InsightAppSec is part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks that provide a richer experience and an easier path to full feature sets. bssgc

  • FireText UK Secure (Official) NHS SMS Gateway

    FireText Communications Limited

    FireText provides a secure and user-friendly web platform for two-way SMS messaging, omnichannel API messaging, RCS, and WhatsApp. Our UK-based cloud platform is accredited to ISO27001, Cyber Essentials Plus and NHS DSP Toolkit standards. We undergo annual penetration testing by a CREST and NCSC CHECK accredited company.

  • Google Workspace Enterprise Plus

    Levett Consultancy Ltd

    Google Workspace Enterprise Plus is designed for large organisations, providing a complete suite of productivity and collaboration apps, flexible storage options, and enterprise-grade video conferencing with up to 1K participants. Live-stream to 100K viewers in-domain and across trusted domains, and benefit from the most advanced enterprise-grade security and management tools.

  • Prisma Access

    LRQA

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Cylance - End Point AI Enabled Anti Virus Protection

    Grove Information Systems

    Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.

  • Check Point Harmony Browse

    INTEGRITY360 LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.

  • Web Application Development

    JBi Digital

    JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective. Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.

  • Sophos Central Intercept X for Server

    Planet IT

    Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

  • Progress MOVEit Cloud

    SOFTCAT PLC

    Secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA, and GDPR. It reduces the risk of data loss and non-compliance with a fully-auditable and managed file transfer solution.

  • ComplaintsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.

  • Certificate Authority as a Service

    Q-SOLUTION LIMITED

    A Private Certificate Authority service, hosted within public cloud, providing X.509 client certificates for users, devices and systems. Designed for use by an organisation or closed community for applications such as API messaging, server mutual TLS, VPNs, IoT devices, mobile device or laptop authentication, user access to secure systems.

  • Confirmation of Payee

    TECHNOXANDER LTD

    TechnoXander's Confirmation of Payee (CoP) solution is a name-checking service designed to reduce misdirected payments and provide greater assurance that payments are being sent, and collected from, the intended account holder. It aims to enhance customer confidence, mitigate APP Fraud risks, and assist financial institutions in fulfilling their regulatory obligations.

  • BT Managed Endpoint Security CrowdStrike

    BT PLC

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    VE3 GLOBAL LTD

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.