Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • Proofpoint Shadow

    Softcat Limited

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Barracuda SecureEdge (SASE)

    MISCO TECHNOLOGIES LIMITED

    Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, and allows security inspection and policy enforcement in the cloud, at the branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access, Firewall-as-a-Service, web security,and fully integrated office connectivity with Secure SD-WAN.

  • Infreemation - Incidents

    Digital Interactive Ltd

    Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents

  • Security Container

    eCora

    The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.

  • SHARE

    MegaNexus Ltd

    SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.

  • Experian Data Management and Single Customer View with ExPin

    Experian

    An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.

  • Barracuda WAF-as-a-Service

    Central Networks and Technologies Ltd

    Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.

  • Laravel Development

    JBi Digital

    Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.

  • OneTrust Privacy Platform

    tmc3 Limited

    The OneTrust platform enables organisations to centrally operationalise and demonstrate accountability for UK GDPR requirements, as well as enforce the governance of these policies and principles across the organisation’s data landscape. OneTrust enables organsiations to remove the reliance on manual processes to reduce cost and simplify data protection compliance.

  • Microsoft 365 Copilot

    Atlas Cloud Ltd

    Generative AI has come to the Microsoft 365 suite. Enable Copilot to unlock powerful and intelligent shortcuts for employees, based on organisational data.

  • MooD 16 and MooD 17 Software as a Service (SaaS)

    CACI UK Ltd

    Online, cloud hosted based access to MooD Business Architect and MooD Active Enterprise components. This is a hosted service that provides a virtual repository, complete with disaster recovery, flexible licencing and scaleable collaboration.

  • MetaLearning Premium Plus Multi Language

    MetaCompliance Ltd

    MetaLearning Premium Plus Multi Language combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium Plus Multi Language provides animated and lifelike eLearning courses.

  • Portable Identity Orchestration - Cenda by Condatis

    CONDATIS GROUP LIMITED

    Decentralised identity platform, Cenda© simplifies the orchestration of decentralised identity user journeys. The platform provides Verifiable Credential and Trust Framework capabilities using industry standards, supporting integration with existing data sources, verifiable credential and identity verification service providers, eliminating vendor lock-in and future proofing deployed solutions.

  • Umbraco Cloud headless website build

    True Digital

    Building world class websites using Umbraco Cloud as a headless CMS, and creating high performing, composable digital experience platforms to answer our clients bespoke requirements.

  • CrowdStrike Falcon Exposure Management

    BT PLC

    CrowdStrike Falcon Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Netwrix Enterprise Auditor

    INTEGRITY360 LIMITED

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.

  • Micro Focus, now OpenText - ALM Octane Pro on SaaS

    MICRO FOCUS

    Micro Focus ALM Octane gives full visibility into all aspects of the software quality management process. Stakeholders are better able to identify defects in the code before the application goes into production, enabling them to assess the issues, create the solutions, and iterate on the design.

  • Proofpoint P0 Bundle

    Bytes Software Services

    Resolve your email threats across the entire attack chain, from detection to response. This includes the ability to automate abuse mailbox management by removing malicious user-reported phishing emails. This addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. bssgc

  • boxxe Tenable Vulnerability Management and Assesment

    BOXXE LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • MTI Managed Privileged Access Management (PAM)

    MTI Technology Ltd

    A fully Managed Privileged Access Management (PAM) solution to Discover, Manage, Protect and Monitor the use of Privileged account passwords for internal staff and remote third parties. PAM provides both control and visibility into who uses privileged accounts, when they can use them and their activities during recorded sessions.

  • Tenable Attack Surface Management (formerly Tenable.asm)

    Softcat Limited

    Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.

  • Cyber Security

    Altiatech Ltd

    Our endpoint and network security services protect your IT environment, manage unauthorised access and target threats to prevent them from entering your organisation’s network. To prevent malicious attacks, we provide security component architecture and implementation, with testing to uncover any vulnerabilities, threats or risks in your applications, network and infrastructure.

  • Forescout - EyeSight / EyeControl / EyeInspect

    Softcat Limited

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Proofpoint Complete Package

    Softcat Limited

    Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.

  • Internal Vulnerability Assessment Service

    Leidos Innovations UK Limited

    Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.

  • Cloud-Based Identity Assurance Solutions

    Viable Data

    Viable Data offer cloud-based identity assurance solutions, leveraging cloud-based solutions and tailoring our in-house intelligent identity verification solution, LearnID®, to meet your organisation’s specific identity assurance needs. Utilising our expertise in biometrics and security controls, we offer biometric and identity solution design, build and implementation.

  • Data Asset Management

    Pontus Vision

    System of records for a register of processes and activities (RoPA), Data Sources, Risks, and Mitigations. Enables customers to create a data catalogue about all Personal Data within an Organization.

  • Interneuron RPA - Provisioning and Leavers Automation

    Interneuron Ltd

    Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.

  • Broadcom/Symantec Mirror Gateway

    Gradian Systems Ltd

    Broadcom offers the first CASB mirror gateway, a unique and more secure, resilient method to enforce in-line visibility, data security, and threat protection over the use of any sanctioned cloud app from unmanaged endpoints

  • Xoralia Policy & Procedure Management for SharePoint, Microsoft 365, Teams

    Content Formula

    Xoralia is easy-to-use policy and procedures management software built for SharePoint, Teams and Office365. Xoralia manages the whole policy lifecycle: policy creation, policy dissemination, gathering acknowledgements, quizzes and policy reviews. Xoralia is unique because it enables you to store your policies and controlled documents inside your own SharePoint environment.