Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2492 results found

2492 results found in Lot 2: Cloud software in the category Security

  • Password Manager & Vault App with Single-Sign On

    HOWELL TECHNOLOGY GROUP LIMITED

    Password Manager & Vault App with Single-Sign-On removes obstacles, letting you get back to the things you love most. Log in and go. Once you save a password in Keeper, you'll always have it when you need it; logging in is fast and seamless.

  • UK Sovereign Symmetric Key Agreement - Arqit

    NINE23 LTD

    UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Mimecast Web Security

    Planet IT

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • ThreatMatch - Cyber Threat Intelligence Sharing Platform

    SECURITY ALLIANCE LIMITED

    The ThreatMatch Intelligence Portal / Platform is collaborative, purpose-built for intelligence sharing. ThreatMatch Community Subscription enables the development and operation of secure, trusted communities, based on sector, geography or collaborative efforts. Quickly share intelligence across the whole community and allow members of the community to share their own intelligence.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • KPMG Cyber Risk Insights, risk quantification software

    KPMG LLP

    KPMG Cyber Risk Insights is an intuitive Cyber Risk Quantification (CRQ) SaaS product. Using a threat-led and financial modelling approach, it accurately assess the likelihood and impact of cyber-attacks. Cyber Risk Insights helps articulate your risk exposure in business terms, and prioritise defence capabilities and controls that maximise risk reduction.

  • Agile Release and Delivery Management

    I-NET SOFTWARE SOLUTIONS LTD

    I-NET provides dedicated release and delivery service which includes: Migrating from traditional development to Agile, Resource, Budget, Road map & Portfolio Management, Training and infrastructure setup following GDS standards

  • Pathlock Cloud Application Access Governance (AAG)

    RESULTING LIMITED

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Secure Application Hosting Service - OFFICIAL SENSITIVE

    SECURECLOUD+ LIMITED

    Designed for the UK Public Sector, supporting OFFICIAL/OFFICIAL-SENSITIVE, the managed environment architecture leverages public cloud technology such as AWS, Oracle and Azure and/or on-premise UK sovereign infrastructure. This enables flexible and scalable application and software hosting/consumption, including performance management and usage statistics, alongside backup and resiliency options.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    NINE23 LTD

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • EIS (Cantium) Tenable Licensing

    Cantium Business Solutions

    Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.

  • Customer Relationship Management Service

    Viewdeck Consulting Limited

    Our Customer Relationship Management Service offers a comprehensive suite of features designed to streamline your client interactions and boost productivity. With tools for contact management, task tracking, and analytics, you can effectively nurture leads, enhance communication, and drive sales. Experience enhanced efficiency and improved communication, with our customisable CRM solution.

  • Verkada CCTV and security platform provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Designed with simplicity in mind, Verkada’s six product lines — video security cameras, door-based access control, environmental sensors, alarms, intercoms, and workplace software — provide unparalleled visibility through a single cloud-based software platform.

  • Mimecast Awareness Training

    INTEGRITY360 LIMITED

    Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    BYTES SOFTWARE SERVICES LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc

  • Oracle Integration Services

    DEFENCE DATASEC LTD

    "Oracle Integration Services is a robust platform that facilitates seamless integration of diverse applications,data sources, and services.It enables organizations to automate workflows,streamline business processes, and enhance connectivity across their IT ecosystem.With features like pre-built adapters and extensive orchestration capabilities, this service empowers businesses to achieve agility,efficiency,and innovation in their operations.

  • Self-managed TAK Server

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.

  • Computacenter - Proofpoint CASB

    COMPUTACENTER (UK) LIMITED

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Cloud Security Posture Management (CSPM)

    Creative Networks

    Cloud Security Posture Management (CSPM) ensures the security of cloud infrastructure through continuous monitoring, automated remediation, policy enforcement, risk assessment, and reporting. It identifies and resolves misconfigurations, vulnerabilities, and compliance issues, providing visibility and prioritisation to safeguard against threats and maintain regulatory compliance.

  • MetaLearning Premium

    MetaCompliance Ltd

    MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.

  • Nutanix Hyper-Converged Infrastructure Implementation Service

    HYPER TALENT SOLUTIONS LTD

    Nutanix Hyper-Converged Infrastructure (HCI) Implementation Service offers a comprehensive solution for deploying and optimizing HCI systems. This service streamlines the integration of storage, computing,and networking into a single system, enhancing efficiency and scalability. It focuses on simplifying management, reducing costs, and ensuring a seamless transition to a unified, modern infrastructure.

  • Cyber Range platform / Cyber security exercises

    CYBEXER

    Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.

  • Sophos Managed Detection and Response Essentials (MDR) Endpoint

    PHOENIX SOFTWARE LIMITED

    Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service. You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • CDW Microsoft Entra ID governance

    CDW LIMITED

    Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.

  • SCC Voice for Teams

    SPECIALIST COMPUTER CENTRES PLC

    Effortlessly integrate PSTN calling into Teams across desktop and mobile. Our comprehensive solution, including SIP, contact centre, call recording, and devices is designed to replace outdated PBXs and ISDN reliance. Enjoy ongoing management automation, referenceable deployment, expert support and innovative integration for a seamless transition to cloud communications.

  • Beyondtrust Remote Support

    CYBERIAM HOLDINGS LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.

  • MTI Hybrid Datacenter- Rationalisation & Migration

    MTI TECHNOLOGY LIMITED

    MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.

  • Falcon Endpoint Detection & Response (EDR)

    COMPUTACENTER (UK) LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Focus Group Cisco Meraki Cloud Solutions & Licencing

    Focus Group

    Focus Group are a Cloud Solutions Provider allowing your organisation to benefit from license consultancy and procurement of Cisco Meraki services including cloud-controlled wired and wireless networking, SD-WAN, network security, Wireless Access Points, LAN switches and SD-WAN through our fully managed cloud dashboard