Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2446 results found

2446 results found in Lot 2: Cloud software in the category Security

  • Akamai Enterprise Application Access - Akamai EAA

    ITogether

    Provide Zero Trust Network Access with Akamai Enterprise Application Access — identity-aware security to replace your VPN. Akamai’s Enterprise Application Access (EAA) is an Identity-Aware Proxy (IAP) in the cloud. The solution is part of Akamai’s highly scalable performance edge platform and bypasses the need for network access.

  • Backup as a Service

    KICK ICT GROUP LIMITED

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.

  • BeyondTrust Password Safe Cloud

    INTEGRITY360 LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.

  • Miya Virtual Care

    ALCIDION UK LIMITED

    Virtual care and remote patient management provides access for clinicians to remotely manage care for patients. Our solution guides patients to participate in activities to monitor their health. The care team can quickly configure a regime for the patient and access dashboards to relevant information and integration with patient wearables.

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    TURNKEY CONSULTING (UK) LIMITED

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • Informatica Cloud Data Catalogue (Axon & EDC) , Data Governance,Privacy Management and Data Quality

    VE3 GLOBAL LTD

    VE3 offers a governance framework for comprehensive data management, including cataloging, compliance, privacy, democratization, and quality. It enhances understanding of data usage and manages risks, compliance, and regulations. GDPR features encompass data quality, lineage, impact assessment, and business glossary.

  • SAP GRC as a Service

    TURNKEY CONSULTING (UK) LIMITED

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Censornet Security Awareness Training (SAT)

    CM SECURITY LTD

    Security Awareness Training aims to enhance employees' understanding of potential risks such as phishing, social engineering, malware, and data breaches. This is achieved through phishing simulations and short video-based training.

  • Ultima Mimecast Web Security

    ULTIMA BUSINESS SOLUTIONS LTD.

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Grant Thornton - Cyber Training and Awareness

    GRANT THORNTON UK LLP

    Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.

  • EIS (Cantium) Sentinel Licensing

    CANTIUM BUSINESS SOLUTIONS LIMITED

    Sentinel Licensing with EIS (the trading arm of Cantium) is an advanced remote monitoring and security service that enhances customers' awareness of their infrastructure/ application environments. It is meticulously designed to store, analyse and triage data from various sources including infrastructure, operating systems, application logs, endpoint devices and cloud platforms.

  • Tenable One - Enterprise

    INTEGRITY360 LIMITED

    Tenable One gives you visibility across attack surface, focus efforts to prevent attacks, accurately communicate cyber-risk to support optimal business performance. Tenable One Enterprise is comprises all features in Standard plus: Attack Path Analysis for breach/attack mitigation, External Attack Surface Management allowing organizations to identify/reduce risks from attacker’s perspective.

  • Proofpoint Archive

    SOFTCAT PLC

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    TRUSTMARQUE SOLUTIONS LIMITED

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Exchange Online Modern Authentication Proxy

    PEGASUS LABS PTY LTD

    Pegasus Labs Modern Authentication Proxy allows customers to connect applications to Exchange Online via POP, IMAP or SMTP where those applications only support basic authentication.

  • TRUSTMARQUE PROOFPOINT PRODUCT SET

    TRUSTMARQUE SOLUTIONS LIMITED

    Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.

  • UK GDPR Compliance Platform

    TMC3 LIMITED

    The OneTrust platform enables organisations to centrally manage and track UK GDPR compliance activities. Enforce the governance of UK GDPR policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • Check Point CloudGuard Cloud Detection & Reponse (CDR)

    LRQA

    CloudGuard CDR Pro is Check Point's Cloud Security Threat Defense Analytics platform. With CloudGuard CDR Pro customers can detect and mitigate threats to their cloud environments as well as analyze activity and leverage user and entity behaviour analytics (UEBA) algorithms to fend off cloud attacks.

  • DevSecOps/Secure Cloud Software Development

    NAIMURI LIMITED

    We are data exploitation, national security and law enforcement experts who leverage public cloud through DevSecOps services. We operate from a List X facility. We help clients move from legacy ways of working, to secure, automated and DevSecOps enabled capabilities for cloud access and development. We create accredited DevSecOps environments.

  • ServiceNow CSM (Customer Service Management) service

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd delivers tailored ServiceNow Customer Service Management (CSM) services for government agencies. Our solutions optimize customer support processes, streamline issue resolution, and enhance citizen satisfaction. With our expertise, agencies can provide efficient, personalized service, improve response times, and foster positive citizen interactions.

  • boxxe Microsoft Exchange Workshop

    BOXXE LIMITED

    Our Exchange Workshops will assist with planning the implementation, configuration, coexistence, and migration to Exchange Online with minimal disruption while aligning to supported topologies and best practices.

  • Compliance and Archiving Solutions

    VIZST TECHNOLOGY LTD

    Meet your legal, policy and compliance obligations including GDPR, Subject Access Requests and Freedom of Information. With solutions from leading vendors including Mimecast and Cryoserver, we offer comprehensive email and Microsoft Teams searching, security and archiving.

  • Forcepoint Behavioral Analytics (FBA)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepoint Behavioral Analytics (FBA) enables security teams to proactively monitor for high risk behavior inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • ITAM / SAM Technology Services

    ITAM WORX LIMITED

    We provide IT Asset Management (HAM & SAM) Technology to automatically discover organisations IT assets to provide trustworthy IT data. Whether you require a Hosted (SaaS) or On-Premise Solution, we implement, train and support our customers to enable organisations to optimise spend, maximise value and minimise risk.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • ESET Threat Intelligence, Telemetry & Intelligence Feeds

    ESET UK Limited

    ESET’s Threat Intelligence service provides global knowledge gathered by ESET experts on targeted attacks, botnet activity detection, advanced persistent threats (APTs), zero-days and botnet activities. Our comprehensive services offer real-time monitoring, threat analysis, potential risk detection, potential risk mitigation and actionable insights before they can impact your operations.

  • SPOT

    NETAPP UK LTD

    Spot by NetApp is a cloud optimization SaaS platform for FinOps and DevOps. It ensures the best balance of cost, performance, reliability and security for cloud applications (virtual machines, container/Kubernetes clusters) and automates cost optimization at multiple level, across the public hyperscalers: Amazon AWS, Microsoft Azure and Google Cloud Platform.

  • Power BI Services for Educational Departments

    I-NET SOFTWARE SOLUTIONS LTD

    Our team provide consulting, implementation and ongoing support for the implementation of Microsoft’s Power BI cloud-based analytics service. We identify business challenges, needs and data requirements, ensuring the solution meets operational and management requirements.Our analysis allows development of simple, powerful visualisations and measures that support improved performance within the service

  • Tufin SecureTrack+

    ITogether

    Tufin SecureTrack+ offers a holistic view of network access and security configurations, centralizing network security policy management, risk mitigation and compliance monitoring across your entire enterprise.