Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2446 results found

2446 results found in Lot 2: Cloud software in the category Security

  • Mimecast Brand Exploit Protect

    QUADRIS LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.

  • Tenable Lumin

    BYTES SOFTWARE SERVICES LIMITED

    Calculate, communicate and compare your cyber risk. bssgc

  • Castlepoint Manage Information Everywhere

    CASTLEPOINT SYSTEMS LIMITED

    Castlepoint reads, registers and regulates all information in a network, in any format and any system. It uses Explainable AI to automatically detect and classify high-risk and high-value information, and track what happens to it. It provides enterprise eDiscovery, privacy and security management, audit, records management, and Generative AI governance.

  • Performance Optimization Services

    DEFENCE DATASEC LTD

    Defence DataSec provides Performance Optimization Services, enhancing the speed, efficiency, and reliability of your applications and systems.Our expert team conducts thorough performance assessments, identifies bottlenecks,and implements optimization strategies to improve response times,scalability,and resource utilization. Partner with us to maximize the performance of your IT infrastructure and deliver exceptional user experiences.

  • Akamai SIA

    ITogether

    SIA Enterprise Standard - Enables customers to on-ramp all Web traffic to the Akamai Cloud Proxy as a Secure Web Gateway. In addition to the DNS-based protections of SIA Enterprise Essentials, SIA Enterprise Standard integrates with the customer's IDP to support group and user-level Acceptable Use Policies.

  • Delinea Secret Server (Formerly Thycotic Centrify)

    ITHQ LTD

    Delinea Secret Server is a comprehensive Privileged Access Management (PAM) solution that securely manages and audits access to critical systems and data. It offers robust functionality including encrypted credential storage, session monitoring, role-based access controls, and compliance reporting, both in the cloud and on-premises. Remove complexity of legacy PAM solutions.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    GRADIAN SYSTEMS LTD

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Radware Cloud DDOS Service

    AXIANS NETWORKS LIMITED

    Radware’s Cloud DDoS Protection Service defends organizations against today’s most advanced DDoS attacks using advanced behavioral-based detection for both network-layer (L3/4) and application-layer (L7) attacks, automatic real-time signature creation to protect against zero-day attacks, unique SSL DDoS protection and flexible cloud-based and hybrid deployment options to suit every customer.

  • Forcepoint Cloud Access Security Broker (CASB)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions on using the Cloud

  • xProof: Identity Verification (proofing, onboarding & IDV)

    Daon

    xProof Identity Verification (IDV) utilises patented AI technology, including advanced OCR, for swift, precise identity verification using automated ID document processing and face biometrics. Enhanced by cutting-edge presentation attack detection and photo watchlist matching, xProof significantly reduces user friction during an onboarding process, identity proofing or within an eKYC process.

  • Nexus Mobile Device Management (MDM)

    NEXUS OPEN SYSTEMS LIMITED

    Microsoft Enterprise Mobility + Security is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. Service includes: Azure Active Directory Premium; Microsoft Cloud App Security; Microsoft Intune; Azure Information Protection and Microsoft Advanced Threat Analytics.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    INTEGRITY360 LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • CyberArk PAM Self-Hosted

    BYTES SOFTWARE SERVICES LIMITED

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics. bssgc

  • Fortinet FortiVM - Cloud-Native Network Firewall Service

    ITHQ LTD

    Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.

  • Stone Cloud Enterprise Network Security - Cisco Umbrella

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • Rapid7 InsightCloudSec

    Chess CyberSecurity Ltd t/a CyberLab

    "InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management"

  • Secure Software Development Lifecycle

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.

  • CheckPoint Harmony Email & Collaboration (Avanan)

    NOC365 LTD

    Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.

  • Google Cloud DevOps Services

    LEFKE IT LIMITED

    LefkeIT specializes in Google Cloud DevOps Services, enabling seamless collaboration between development and operations teams for efficient software delivery. Our expert consultants implement best practices, automation, and continuous integration/continuous delivery (CI/CD) pipelines on Google Cloud Platform.

  • Check Point Harmony Email and Collaboration

    SAPPHIRE TECHNOLOGIES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • EJBCA PKI SaaS

    Keyfactor

    Keyfactor EJBCA SaaS provides the full power of EJBCA Enterprise without the need for managing the underlying infrastructure. Keyfactor will manage your PKI infrastructure according to best practices and highest assurance.

  • Cloud SaaS Products

    BASEEL LTD

    Baseel Limited can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • COOLSPIRiT a Databarracks Company: Barracuda Web Application Firewall (WAF-as-a-Service)

    COOLSPIRIT LIMITED

    Barracuda Web Application Firewall blocks sophisticated web-based attacks that target the applications hosted on web servers and the sensitive or confidential data to which they have access. Placed between the Internet and web servers, scan all inbound web traffic to block attacks and outbound traffic to prevent data loss.

  • KnowBe4 PhishER Plus

    INTEGRITY360 LIMITED

    PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities to proactively block and remove active phishing attacks that have bypassed email filters BEFORE your user gets exposed to them. It saves significant budget and InfoSec time by reducing the volume of remediation efforts handled by your SOC team

  • Forescout OTSec Core

    BYTES SOFTWARE SERVICES LIMITED

    The cloud based VMs provide: visibility, assessment of any OT/IoT device on the network. bssgc

  • Forcepoint Email Security

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Location Estimation Service

    Rigr AI Limited

    Our Location Estimation tool harnesses the power of AI to analyse visual clues of photos or videos, indoors or outdoors, accurately ranking potential countries and regions the media originates from. The result is a comprehensive list of potential locations accompanied by confidence scores.

  • Computacenter - CrowdStrike Falcon Identity Threat Detection & Protection

    COMPUTACENTER (UK) LIMITED

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • boxxe Cisco Secure Access Service Edge (SASE)

    BOXXE LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Akamai DNS Security - Enterprise Threat Protector (ETP)

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.