Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2502 results found

2502 results found in Lot 2: Cloud software in the category Security

  • Armis Centrix

    INTEGRITY360 LIMITED

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.

  • Armis Centrix

    Communication-STEM Ltd

    Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.

  • Rapid7 Insight AppSec

    CYBERLAB CONSULTING LTD

    Providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.

  • Privacy Management platform

    GET SWARMS LIMITED

    Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.

  • Managed Microsoft 365

    XEROX (UK) LIMITED

    As a Direct-Bill Cloud Service Provider, Xerox's managed service of Microsoft's cloud-based office productivity, collaboration and security suite of applications. ISO27001 hosted MS Azure Applications include, Exchange, Outlook, Teams, OneDrive, SharePoint, Defender, Autopilot, Intune and much more. Project work and ongoing support is available as part of this service.

  • OKTA SSO and Identity Management Software License and Deployment Service

    AVELLA SECURITY LIMITED

    Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA

  • BeyondTrust Identity Security Insights

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc

  • Google Workspace Marketplace via Netpremacy

    Netpremacy Limited

    Netpremacy provides Google Workspace Marketplace applications to integrate into your domain. Google Workspace Marketplace offers a wide range of quality enterprise apps: CRM, Task Management and Admin tools that add functionality and features to your native Workspace apps. Includes Recommended for Google Workspace, Google Drive, Gmail, Communications and Utilities.

  • Sophos Central Intercept X Endpoint

    Planet IT

    Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

  • CrowdStrike Falcon Identity Protection

    BT PLC

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..

  • Microsoft Office 365

    Synergi Software Limited

    Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.

  • CheckPoint Harmony Browse

    BYTES SOFTWARE SERVICES LIMITED

    Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc

  • KnowBe4 Security Awareness Training and Phishing Simulation

    LINEAL SOFTWARE SOLUTIONS LIMITED

    Lineal provide Phishing Campaign design and execution services for customers followed by management reporting and end user training to support real business change and develop improved awareness of modern cyber security risks. We also provide full support and are a Microsoft Gold and KnowBe4 partner providing licensing and support.

  • CDW Cisco Secure Access Service Edge (SASE)

    CDW LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Mimecast Cybergraph

    QUADRIS LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • BMC Helix Operations Management with AIOps

    Fusion Business Solutions (UK) Limited

    BMC Helix Operations Management is a turnkey solution that provides a comprehensive view of how key services are performing, so IT knows immediately if customer experiences may be impacted. Recognised by Gigacom & Forrester as a Market Leader for AIOps

  • Varonis SaaS Data Security Posture Management (DSPM)

    SOMERFORD ASSOCIATES LIMITED

    Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.

  • Check Point CloudGuard Web Application Firewall (WAF)

    INTEGRITY360 LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)

  • CDW Microsoft Intune Suite

    CDW LIMITED

    Unify critical advanced endpoint management and security solutions. Simplify your endpoint management experience, improves security posture, and keeps people at the centre with exceptional user experiences. Empower IT and security teams with data science and AI to increase automation, move from reactive to proactive in addressing endpoint and security challenges.

  • Google Cloud Cost Management and Optimization

    LEFKE IT LIMITED

    LefkeIT specializes in Google Cloud Cost Management and Optimization, helping businesses maximize their cloud investment while minimizing expenses. Our expert consultants analyze your usage patterns, identify cost-saving opportunities, and implement strategic optimization measures.

  • Property Management Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of their property management cases. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • CDW Rubrik

    CDW LIMITED

    Rubrik provides a zero trust data protection platform across all data and applications whether located on premises or in the public, private or hybrid cloud. Rubrik provides Identity Recovery, Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane

  • Barrier Networks Crowdstrike Falcon Exposure Management

    Barrier Networks

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Business Technology Platform

    VE3 GLOBAL LTD

    SAP Cloud Platform (VCP) is a platform-as-a-service (PaaS) product offering a development and environment for cloud applications. Built on SAP HANA in-memory database technology, SCP utilizes open source and open standards, enabling independent software vendors, startups, and developers to build and test cloud applications based on VE3 in-memory database technology.

  • IBM Security - Guardium

    IBM UNITED KINGDOM LIMITED

    IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilties and protects sensitive on-premises and cloud data.

  • Sophos Central Intercept X Advanced for Server

    Central Networks and Technologies Ltd

    Central Intercept X Advanced for Server includes multiple policies, control capabilities (Web, Peripheral, Application, DLP), and threat cases. Cloud Security Posture Management (CSPM) service for AWS, Azure, and Google Cloud includes Inventory of cloud resources, identification of insecure workload configuration, suspicious access events, and unusual network traffic vulnerabilities.

  • Becrypt Managed Desktop Services, including EUC and Desktop Deployment

    BECRYPT LIMITED

    Aimed at Public Sector departments or projects that are ‘cloud-based’ or infrastructure free, this service helps organisations deploy quickly, scale users and maintaining security thus gaining maximum value from the desktop estate. Helping organisations align, and more importantly stay aligned, with the End User Device Guidance for Windows and macOS.

  • Microsoft 365 (O365)

    Epiq Systems Ltd

    Microsoft 365 is a cloud based integrated Enterprise productivity application that helps transform the way organisations work. It enables employees to connect to people, collaborate, share content and information from any device and anywhere, whilst securely safeguarding organisations’ assets with intelligent security.

  • SolarWinds Hybrid Cloud Observability License

    Prosperon Networks Ltd

    SolarWinds® Hybrid Cloud Observability (HCO) is a comprehensive, integrated, and full-stack observability solution designed to integrate data from across the IT ecosystem, including networks, servers, applications, databases, and more. Our platform includes built-in intelligence to help customers optimize performance, ensure availability, and reduce remediation time across on-premises and multi-cloud environments.