Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2472 results found

2472 results found in Lot 2: Cloud software in the category Security

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • Informatica Cloud Data Catalogue (Axon & EDC) , Data Governance,Privacy Management and Data Quality

    VE3 GLOBAL LTD

    VE3 offers a governance framework for comprehensive data management, including cataloging, compliance, privacy, democratization, and quality. It enhances understanding of data usage and manages risks, compliance, and regulations. GDPR features encompass data quality, lineage, impact assessment, and business glossary.

  • SAP GRC as a Service

    Turnkey Consulting (UK) Limited

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Censornet Security Awareness Training (SAT)

    CM Security Ltd

    Security Awareness Training aims to enhance employees' understanding of potential risks such as phishing, social engineering, malware, and data breaches. This is achieved through phishing simulations and short video-based training.

  • Ultima Mimecast Web Security

    ULTIMA BUSINESS SOLUTIONS LTD.

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Grant Thornton - Cyber Training and Awareness

    GRANT THORNTON UK LLP

    Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.

  • EIS (Cantium) Sentinel Licensing

    Cantium Business Solutions

    Sentinel Licensing with EIS (the trading arm of Cantium) is an advanced remote monitoring and security service that enhances customers' awareness of their infrastructure/ application environments. It is meticulously designed to store, analyse and triage data from various sources including infrastructure, operating systems, application logs, endpoint devices and cloud platforms.

  • Tenable One - Enterprise

    INTEGRITY360 LIMITED

    Tenable One gives you visibility across attack surface, focus efforts to prevent attacks, accurately communicate cyber-risk to support optimal business performance. Tenable One Enterprise is comprises all features in Standard plus: Attack Path Analysis for breach/attack mitigation, External Attack Surface Management allowing organizations to identify/reduce risks from attacker’s perspective.

  • Proofpoint Archive

    SOFTCAT PLC

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    TRUSTMARQUE SOLUTIONS LIMITED

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Exchange Online Modern Authentication Proxy

    PEGASUS LABS PTY LTD

    Pegasus Labs Modern Authentication Proxy allows customers to connect applications to Exchange Online via POP, IMAP or SMTP where those applications only support basic authentication.

  • TRUSTMARQUE PROOFPOINT PRODUCT SET

    TRUSTMARQUE SOLUTIONS LIMITED

    Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.

  • UK GDPR Compliance Platform

    TMC3 LIMITED

    The OneTrust platform enables organisations to centrally manage and track UK GDPR compliance activities. Enforce the governance of UK GDPR policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • Check Point CloudGuard Cloud Detection & Reponse (CDR)

    LRQA

    CloudGuard CDR Pro is Check Point's Cloud Security Threat Defense Analytics platform. With CloudGuard CDR Pro customers can detect and mitigate threats to their cloud environments as well as analyze activity and leverage user and entity behaviour analytics (UEBA) algorithms to fend off cloud attacks.

  • DevSecOps/Secure Cloud Software Development

    NAIMURI LIMITED

    We are data exploitation, national security and law enforcement experts who leverage public cloud through DevSecOps services. We operate from a List X facility. We help clients move from legacy ways of working, to secure, automated and DevSecOps enabled capabilities for cloud access and development. We create accredited DevSecOps environments.

  • ServiceNow CSM (Customer Service Management) service

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd delivers tailored ServiceNow Customer Service Management (CSM) services for government agencies. Our solutions optimize customer support processes, streamline issue resolution, and enhance citizen satisfaction. With our expertise, agencies can provide efficient, personalized service, improve response times, and foster positive citizen interactions.

  • boxxe Microsoft Exchange Workshop

    BOXXE LIMITED

    Our Exchange Workshops will assist with planning the implementation, configuration, coexistence, and migration to Exchange Online with minimal disruption while aligning to supported topologies and best practices.

  • Compliance and Archiving Solutions

    Vizst Technology

    Meet your legal, policy and compliance obligations including GDPR, Subject Access Requests and Freedom of Information. With solutions from leading vendors including Mimecast and Cryoserver, we offer comprehensive email and Microsoft Teams searching, security and archiving.

  • Forcepoint Behavioral Analytics (FBA)

    Cyberlab

    Forcepoint Behavioral Analytics (FBA) enables security teams to proactively monitor for high risk behavior inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • ITAM / SAM Technology Services

    ITAM WORX LIMITED

    We provide IT Asset Management (HAM & SAM) Technology to automatically discover organisations IT assets to provide trustworthy IT data. Whether you require a Hosted (SaaS) or On-Premise Solution, we implement, train and support our customers to enable organisations to optimise spend, maximise value and minimise risk.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • ESET Threat Intelligence, Telemetry & Intelligence Feeds

    ESET UK Limited

    ESET’s Threat Intelligence service provides global knowledge gathered by ESET experts on targeted attacks, botnet activity detection, advanced persistent threats (APTs), zero-days and botnet activities. Our comprehensive services offer real-time monitoring, threat analysis, potential risk detection, potential risk mitigation and actionable insights before they can impact your operations.

  • SPOT

    NETAPP

    Spot by NetApp is a cloud optimization SaaS platform for FinOps and DevOps. It ensures the best balance of cost, performance, reliability and security for cloud applications (virtual machines, container/Kubernetes clusters) and automates cost optimization at multiple level, across the public hyperscalers: Amazon AWS, Microsoft Azure and Google Cloud Platform.

  • Power BI Services for Educational Departments

    I-NET SOFTWARE SOLUTIONS LTD

    Our team provide consulting, implementation and ongoing support for the implementation of Microsoft’s Power BI cloud-based analytics service. We identify business challenges, needs and data requirements, ensuring the solution meets operational and management requirements.Our analysis allows development of simple, powerful visualisations and measures that support improved performance within the service

  • Tufin SecureTrack+

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Tufin SecureTrack+ offers a holistic view of network access and security configurations, centralizing network security policy management, risk mitigation and compliance monitoring across your entire enterprise.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    Grey Monarch Limited

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Radware Cloud Web Application Service

    Axians Networks Limited

    The Service offers protection from application-level web attacks. It automatically detects application domains, analyzes potential vulnerabilities and assigns optimal protection. The Service uses DNS to divert traffic towards the supplier’s Cloud and also includes DDoS Protection to 1Gbps in all packages, extended DDoS Protection is available as an option.

  • Microsoft Defender for Office 365 Plan 2

    PHOENIX SOFTWARE LIMITED

    MDO Plan2 cloud-based email filtering service. Helps protect against unknown malware and viruses by providing robust zero-day protection. Includes features to safeguard from harmful links in real time. ATP has rich reporting and URL trace capabilities to spot attacks happening in your organization. Plan2 includes Threat Intelligence.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    Charterhouse Voice & Data

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.