Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

247 results found

247 results found in Lot 2: Cloud software in the category Network services (DNS)

  • Application Security - Imperva

    RAZOR THORN SECURITY LTD

    Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

  • Gamma Horizon

    Creative Networks

    Gamma Horizon is a cloud-based business communication service offering features like voice calls, conferencing, and messaging. It boosts productivity and connectivity by providing accessible tools for collaboration across devices, aiming to streamline and enhance communication within organisations.

  • Cloudflare Cloud Email Security

    INTEGRITY360 LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • iboss Zero Trust Secure Access Service Edge

    Communication-STEM Ltd

    iboss is a Zero Trust Edge. iboss utilises a cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS integration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and DLP.

  • Domain Tools - DNS Threat Intelligence (CTI)

    Bright Cyber (Voodoo technology LTD)

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain names, DNS and related data for cyber threat intelligence.

  • Barrier Networks DNS Detection and Response solution (InfoBlox Threat Defence)

    Barrier Networks

    DNS Detection and Response solution, detects threat activity and stops attacks occurring, using DNS threat intelligence, disrupting attacker supply chains. AI-driven analytics focuses analysts and provides insights reducing MTTR, raise ROI of existing security tools, and elevate SecOps efficiency. Domain Monitoring/Domain Takedown services enable brand protection and combat emerging threats.

  • DNS & CTI - Domain Tools

    Brookcourt Solutions

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.

  • Barrier Netowrks DNS, DHCP and IPAM (Infoblox Blox DDI)

    Barrier Networks

    Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.

  • Identity & Access Management (IAM)

    Xalient Holdings Limited

    Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with  BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt

  • Akamai Software Services

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Akamai Akamai Cloud Computing

    Softcat Limited

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Cisco Meraki

    Creative Networks

    Cisco Meraki provides cloud-managed networking and security solutions for businesses. Offering wireless access points, switches, security appliances, and mobile device management tools, all centrally managed through a user-friendly dashboard, Meraki delivers simplicity, scalability, and enhanced security for organisations of all sizes.

  • Managed WiFi, Public Wi-Fi registration portal and content filtering

    Performance Networks Ltd

    The Performance Networks Managed Wi-Fi service offers support, monitoring and management for both existing and new public WiFi and private WiFi networks, offering a guest WiFi registration captive portal, data capture, content filtering and monitoring. GDPR compliant data collection, marketing and analytics. Our service works with most WiFi vendors.

  • Identity Governance & Administration (IGA)

    Xalient Holdings Limited

    Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with  BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt

  • Netwrix Data Classification

    Softcat Limited

    Netwrix Change Tracker enables organizations of all sizes to enhance their security posture by hardening configurations, monitoring changes, and delivering superior forensic capabilities that minimize the time and effort needed to identify the cause and scope of a security breach.

  • Mobile Engineering Lab

    Ve3 Global Ltd

    We build, deploy, maintain, support, and host cost-effective iOS and Android mobile apps, hosted on a SAAS model. We offer hybrid and native mobile application development. Our user-centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop, and deliver on time and within budget.

  • Forcepoint Advanced Malware Detection (AMD)

    Gradian Systems Ltd

    Forcepoint Advanced Malware Detection leverages proven technology to detect zero-day and other advanced malware. Using Deep Content Inspection technology, AMD emulates an entire host, interacting with malware to expose and observe a malicious object's possible actions. Integrates with Forcepoint NGFW, CASB, Web and Email security solutions.

  • Cloudflare Cloud Email Security

    Cloudflare, Inc.

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • Domain Name Registration Services

    Safenames Ltd

    Managing a portfolio of domain names can be both time consuming and challenging. The Safenames’ International Domain Portal (IDP) is a platform that enables you to register and manage thousands of domains names with great efficiency and effectiveness.

  • Netwrix StealthINTERCEPT

    Softcat Limited

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Microsoft Entra Internet Access  (PREVIEW

    Phoenix Software Ltd

    Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    Nine23

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • Self-managed TAK Server

    Rowden Technologies Ltd

    Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.

  • Cloud Security Posture Management (CSPM)

    Creative Networks

    Cloud Security Posture Management (CSPM) ensures the security of cloud infrastructure through continuous monitoring, automated remediation, policy enforcement, risk assessment, and reporting. It identifies and resolves misconfigurations, vulnerabilities, and compliance issues, providing visibility and prioritisation to safeguard against threats and maintain regulatory compliance.

  • SCC Voice for Teams

    Specialist Computer Centres plc

    Effortlessly integrate PSTN calling into Teams across desktop and mobile. Our comprehensive solution, including SIP, contact centre, call recording, and devices is designed to replace outdated PBXs and ISDN reliance. Enjoy ongoing management automation, referenceable deployment, expert support and innovative integration for a seamless transition to cloud communications.

  • Focus Group Cisco Meraki Cloud Solutions & Licencing

    Focus Group

    Focus Group are a Cloud Solutions Provider allowing your organisation to benefit from license consultancy and procurement of Cisco Meraki services including cloud-controlled wired and wireless networking, SD-WAN, network security, Wireless Access Points, LAN switches and SD-WAN through our fully managed cloud dashboard

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • DXC Technology Enterprise Applications Management (Oracle)

    EntServ UK Ltd part of the DXC Technologies Group

    Management of Secure ERP solutions for Local and Government clients. Provides full stack of managed cloud services for Oracle applications. Delivered via secure cloud or hosted in secure DXC UK-based data centre.

  • Information and Communications Technologies

    Clarity Tech Ltd

    Clarity Tech supplies cloud-based technologies that provide access to information through various applications and systems. Our ICT services include Development of Service Strategy, Service Design, Service Transition, Operations Management, and Continuous Service Improvement. Technical management, Application Management, Incident, and Problem Management.

  • Backup as a Service

    Kick ICT

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.