Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2492 results found

2492 results found in Lot 2: Cloud software in the category Security

  • Sophos Central Email Advanced

    SOFTCAT PLC

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption

  • Rapid7 Insight CloudSec

    BYTES SOFTWARE SERVICES LIMITED

    InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. bssgc

  • Barrier Networks Crowdstrike Falcon Cloud Security

    Barrier Networks

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • IBM Security - Randori

    IBM UNITED KINGDOM LIMITED

    IBM Security® Randori Recon is attack surface management SaaS. It monitors external attack surfaces for unexpected changes, blind spots, misconfigurations and process failures

  • CDW Proofpoint Email Fraud Defense

    CDW LIMITED

    Email Fraud Defense stops email based identity deception. Access to a reporting portal and regular meetings with a Proofpoint consultant help to implement DMARC. Risky suppliers can be identified. SPF and DKIM can be hosted by Proofpoint and there is a Secure Email Relay option.

  • OneTrust GRC and Security Assurance Software

    Oyster IMS

    OneTrust GRC and Security Assurance is a modular GRCPrivacy Management Software solution to help all organisations: map, measure and manage risk; manage third-party risk and centrally manage and streamline the execution of compliance audits.

  • CyberArk Workforce Password Management SaaS

    PHOENIX SOFTWARE LIMITED

    "The service offers a password vault for business users to store any secrets such as (business) personal usernames and passwords to unconnected (non federated) services and any secrets including file attachments.

  • Akamai Software Services

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Cyber Security Compliance and Governance Platform

    TMC3 LIMITED

    OneTrust GRC empowers public sector entities to streamline cyber security compliance and governance. Our integrated cyber security compliance and governance platform enhances operational risk management, ensures regulatory alignment, and supports proactive threat mitigation with cutting-edge AI insights and robust policy management tools.

  • Hypnos

    UK ALLIED ASSOCIATES LIMITED

    Hypnos is a software product to perform mediation---the encapsulation of lawfully intercepted(LI) network traffic and its delivery to a Law Enforcement Agency(LEA) compliant with ETSI and other delivery standards. The software activates warranted intercepts at the authorised time, delivers intercepted traffic to LEAs, and deactivates when authorised time elapses.

  • Mimecast Perimeter Defence Plan (Zone 1)

    CHESS ICT LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • SafetyNet Offender Case Management Tool

    UNILINK SOFTWARE LIMITED

    SafetyNet is a cloud-based solution for partnership working. It aims to reduce crime and ASB using information-sharing portal with Integrated Case Management (ICM) and a Neighbourhood Management System (NMS). This cost-effective tool monitors interventions and tracks offender progress to reduce re-offending while also improving care for victims and vulnerable adults.

  • Arctic Wolf Managed Security Operations

    SOFTCAT PLC

    Arctic Wolf delivers fully managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • Sophos Intercept X Server

    CHESS ICT LIMITED

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • Managed Service Desk

    SOFTSERVE SYSTEMS LTD

    SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.

  • Laravel PHP Web Development

    Creative Networks

    Laravel PHP web development offers efficient creation of dynamic web applications using the Laravel framework. It enables developers to utilise features like routing, controllers, authentication, and real-time communication, ensuring scalable and maintainable solutions for diverse business needs.

  • Concentric AI

    Gradian Systems Ltd

    Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.

  • Telephony Services For Custodial Environments

    UNILINK SOFTWARE LIMITED

    Unilink's IP telephony solution facilitates secure communication for inmates, enabling them to call approved contacts. The service is managed through an administrative portal, offering comprehensive analytics, account management, and robust security monitoring features. This helps maintain inmate well-being while ensuring regulatory compliance and operational oversight.

  • uSecure - Human Risk Management

    ITHQ LTD

    ITHQ provides uSecure's Training and Awareness Platform which focuses on reducing the Human Risk Factor in cybersecurity through integrated policy management, breach intelligence, phishing simulations, and comprehensive reporting for compliance. It educates employees, reinforces policies, and tests readiness, equipping a well-prepared workforce to combat evolving cyber threats.

  • CDW Check Point CloudGuard Cloud Detection & Response (CDR)

    CDW LIMITED

    CloudGuard CDR Pro is Check Point's Cloud Security Threat Defense Analytics platform. With CloudGuard CDR Pro customers can detect and mitigate threats to their cloud environments as well as analyze activity and leverage user and entity behavior analytics (UEBA) algorithms to fend off cloud attacks.

  • Mimecast - Mimecast Awareness Training

    PHOENIX SOFTWARE LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • IGA, PAM, CIAM Solutions as a Service

    INTRAGEN LIMITED

    Intragen's IAM consultants provide end-to-end professional services for the following solutions: Identity Governance & Administration (IGA) Access Management, Single Sign-On & Multi-Factor Authentication (SSO & MFA) Privileged Access Management (PAM) Customer Identity and Access Management (CIAM)

  • Recorded Future

    ITogether

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Anaconda Inc. Licenses

    JUMPING RIVERS LTD

    With over 25 million users worldwide and counting, Anaconda solves unique problems associated with conducting open-source data science in businesses across all industries, at scale. Anaconda empowers users of all levels to achieve their data science goals by making it easy to search and install thousands of Python/R packages.

  • Check Point Harmony Endpoint

    LRQA

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    SOFTCAT PLC

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS INTELLIGENCE LIMITED

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • Entra ID P2

    PHOENIX SOFTWARE LIMITED

    In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance

  • CDW Microsoft Purview Information Protection

    CDW LIMITED

    Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data.

  • MetaLearning Essentials

    MetaCompliance Ltd

    MetaLearning Essentials combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Essentials provides animated and lifelike eLearning courses.