Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    INTEGRITY360 LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • CyberArk PAM Self-Hosted

    BYTES SOFTWARE SERVICES LIMITED

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics. bssgc

  • Fortinet FortiVM - Cloud-Native Network Firewall Service

    ITHQ LTD

    Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.

  • Stone Cloud Enterprise Network Security - Cisco Umbrella

    Stone Technologies Limited trading as Converge Technology Solutions

    Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.

  • NHS Notification Services

    MMG Mobile Marketing Group

    MMG's SMS services for the NHS offer secure, efficient communication. High deliverability ensures prompt messages to patients and staff. Personalized messaging boosts engagement and attendance rates. Analytics optimize strategies, while automation streamlines scheduling. Two-way communication handles queries. Integration ensures system cohesion, and security protects patient data.

  • Rapid7 InsightCloudSec

    Cyberlab

    "InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. Strengths include: - Multi-Cloud security & compliance - Container & Kubernetes security - Cloud Vulnerability Management"

  • Rapid7 InsightIDR

    CYBERLAB CONSULTING LTD

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

  • Secure Software Development Lifecycle

    TMC3 LIMITED

    Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.

  • Microsoft 365

    Planet IT

    Microsoft Office 365 is a cloud-based service that is designed to help meet your organisation's needs for robust security, reliability, and user productivity.Office 365 is available with subscriptions that can include premium apps like Word, Excel, PowerPoint, OneNote, Outlook, Publisher, and Access. These apps can be installed on multiple devices.

  • CheckPoint Harmony Email & Collaboration (Avanan)

    NOC365 LTD

    Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.

  • Google Cloud DevOps Services

    LEFKE IT LIMITED

    LefkeIT specializes in Google Cloud DevOps Services, enabling seamless collaboration between development and operations teams for efficient software delivery. Our expert consultants implement best practices, automation, and continuous integration/continuous delivery (CI/CD) pipelines on Google Cloud Platform.

  • Check Point Harmony Email and Collaboration

    SAPPHIRE TECHNOLOGIES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • EJBCA PKI SaaS

    Keyfactor

    Keyfactor EJBCA SaaS provides the full power of EJBCA Enterprise without the need for managing the underlying infrastructure. Keyfactor will manage your PKI infrastructure according to best practices and highest assurance.

  • Cloud SaaS Products

    BASEEL LTD

    Baseel Limited can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • COOLSPIRiT a Databarracks Company: Barracuda Web Application Firewall (WAF-as-a-Service)

    COOLSPIRiT, a Databarracks company

    Barracuda Web Application Firewall blocks sophisticated web-based attacks that target the applications hosted on web servers and the sensitive or confidential data to which they have access. Placed between the Internet and web servers, scan all inbound web traffic to block attacks and outbound traffic to prevent data loss.

  • KnowBe4 PhishER Plus

    INTEGRITY360 LIMITED

    PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities to proactively block and remove active phishing attacks that have bypassed email filters BEFORE your user gets exposed to them. It saves significant budget and InfoSec time by reducing the volume of remediation efforts handled by your SOC team

  • Forescout OTSec Core

    BYTES SOFTWARE SERVICES LIMITED

    The cloud based VMs provide: visibility, assessment of any OT/IoT device on the network. bssgc

  • Forcepoint Email Security

    SAPPHIRE TECHNOLOGIES LIMITED

    Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

  • Location Estimation Service

    Rigr AI Limited

    Our Location Estimation tool harnesses the power of AI to analyse visual clues of photos or videos, indoors or outdoors, accurately ranking potential countries and regions the media originates from. The result is a comprehensive list of potential locations accompanied by confidence scores.

  • Computacenter - CrowdStrike Falcon Identity Threat Detection & Protection

    Computacenter (UK) Ltd

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.

  • boxxe Cisco Secure Access Service Edge (SASE)

    BOXXE LIMITED

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Akamai DNS Security - Enterprise Threat Protector (ETP)

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Purple MDM Staff Mobile Device Management System

    Made Purple Ltd

    Purple MDM, accredited by Android Enterprise and fortified by Knox, offers robust mobile device management for staff in prisons and secure hospitals. It delivers admin applications to complement Purple MDM resident users but also provides a secure and closed environment for you to deliver any staff required application securely.

  • Brivo Cloud Access Control provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Brivo access control is a traditional access control solution hosted in the cloud. Providing app integration, multiple access control methods and integration with Eagle Eye Networks VMS

  • CDW Microsoft Enterprise Mobility + Security E5

    CDW LIMITED

    Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security

  • Cisco Duo

    Creative Networks

    Cisco Duo is a multi-factor authentication (MFA) and secure access solution that secures networks, applications, and data. Cisco Duo is designed to prevent unauthorised access to sensitive information and resources, particularly in the context of remote access and cloud applications.

  • Oracle Cloud BAU Support

    VE3 GLOBAL LTD

    VE3 provides BAU support for Oracle Cloud, facilitating the Programme-BAU transition and assisting end-users and the Business/Operations team with Oracle Cloud Functional and Technical incidents. We oversee BAU Service desk, including incident triaging, and manage entire Incident to Deployment lifecycle. Collaborating closely with Business ensures robust enablement throughout the process.

  • Trustmarque Logpoint Converged SIEM and SOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to monitor, detect and alert on security events/incidents within an IT environment. It provides a comprehensive/centralised view of infrastructure security posture, activities and automated playbooks in response to events.

  • ProofPoint Email Fraud Defence

    SOFTCAT PLC

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • CDW Proofpoint Tessian Enterprise Data Loss Prevention

    CDW LIMITED

    Proofpoint Enterprise Data Loss Prevention (DLP) protects your organization against data loss that originates with your people. It brings together our solutions for email, cloud and endpoint DLP. The product combines content, behavior and threat telemetry from these channels to address the full spectrum of people-centric data-loss scenarios.