Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Chrome - Jamboard

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions features Chrome - Jamboard, Google's collaborative digital whiteboard solution. This service enables seamless interaction in educational settings, allowing teachers and students to engage in real-time through drawing, handwriting, and multimedia sharing. It’s designed to enhance creativity and collaboration in the classroom.

  • Fortinet Advanced Services

    IOCO SOLUTIONS LIMITED

    We provide a host of advanced Fortinet services to organizations looking to enhance their security posture. Services offered are Application Load Balancing, Email Security, Authentication, Web Application Firewalls and Sandboxing.

  • Broadcom/Symantec Endpoint Security Complete

    Gradian Systems Ltd

    Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses artificial-intelligence (AI) to optimize security decisions.

  • Information and Communications Technologies

    Clarity Tech Ltd

    Clarity Tech supplies cloud-based technologies that provide access to information through various applications and systems. Our ICT services include Development of Service Strategy, Service Design, Service Transition, Operations Management, and Continuous Service Improvement. Technical management, Application Management, Incident, and Problem Management.

  • KnowBe4: Leading Security Awareness Training & Simulated Phishing for Human Risk in UK Public Sector

    S3 Ltd

    KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks. Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.

  • KnowBe4 Security Awareness Training & Phishing Simulation

    ACTISOFT TECHNOLOGY LIMITED

    Train your users to detect Phishing emails through the comprehensive Cloud Training Platform Suite from KnowB4. Regularly schedule Phishing Simulation tests. Social Engineering training to protect your business and users from cyber threats through email.

  • Palo Alto Networks Wildfire

    NETWORK INTEGRATION TECHNOLOGIES LTD

    WildFire® utilizes near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats, keeping your organization protected.

  • CDW Crowdstrike Falcon Endpoint Detection & Response (EDR)

    CDW LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Akamai Enterprise Application Access - Akamai EAA

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Provide Zero Trust Network Access with Akamai Enterprise Application Access — identity-aware security to replace your VPN. Akamai’s Enterprise Application Access (EAA) is an Identity-Aware Proxy (IAP) in the cloud. The solution is part of Akamai’s highly scalable performance edge platform and bypasses the need for network access.

  • Backup as a Service

    Kick ICT

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.

  • BeyondTrust Password Safe Cloud

    INTEGRITY360 LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.

  • Miya Virtual Care

    Alcidion UK Ltd

    Virtual care and remote patient management provides access for clinicians to remotely manage care for patients. Our solution guides patients to participate in activities to monitor their health. The care team can quickly configure a regime for the patient and access dashboards to relevant information and integration with patient wearables.

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • Informatica Cloud Data Catalogue (Axon & EDC) , Data Governance,Privacy Management and Data Quality

    VE3 GLOBAL LTD

    VE3 offers a governance framework for comprehensive data management, including cataloging, compliance, privacy, democratization, and quality. It enhances understanding of data usage and manages risks, compliance, and regulations. GDPR features encompass data quality, lineage, impact assessment, and business glossary.

  • SAP GRC as a Service

    Turnkey Consulting (UK) Limited

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Censornet Security Awareness Training (SAT)

    CM Security Ltd

    Security Awareness Training aims to enhance employees' understanding of potential risks such as phishing, social engineering, malware, and data breaches. This is achieved through phishing simulations and short video-based training.

  • Ultima Mimecast Web Security

    ULTIMA BUSINESS SOLUTIONS LTD.

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Grant Thornton - Cyber Training and Awareness

    GRANT THORNTON UK LLP

    Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.

  • EIS (Cantium) Sentinel Licensing

    Cantium Business Solutions

    Sentinel Licensing with EIS (the trading arm of Cantium) is an advanced remote monitoring and security service that enhances customers' awareness of their infrastructure/ application environments. It is meticulously designed to store, analyse and triage data from various sources including infrastructure, operating systems, application logs, endpoint devices and cloud platforms.

  • Tenable One - Enterprise

    INTEGRITY360 LIMITED

    Tenable One gives you visibility across attack surface, focus efforts to prevent attacks, accurately communicate cyber-risk to support optimal business performance. Tenable One Enterprise is comprises all features in Standard plus: Attack Path Analysis for breach/attack mitigation, External Attack Surface Management allowing organizations to identify/reduce risks from attacker’s perspective.

  • Proofpoint Archive

    SOFTCAT PLC

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    TRUSTMARQUE SOLUTIONS LIMITED

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Exchange Online Modern Authentication Proxy

    PEGASUS LABS PTY LTD

    Pegasus Labs Modern Authentication Proxy allows customers to connect applications to Exchange Online via POP, IMAP or SMTP where those applications only support basic authentication.

  • TRUSTMARQUE PROOFPOINT PRODUCT SET

    TRUSTMARQUE SOLUTIONS LIMITED

    Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.

  • UK GDPR Compliance Platform

    TMC3 LIMITED

    The OneTrust platform enables organisations to centrally manage and track UK GDPR compliance activities. Enforce the governance of UK GDPR policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.

  • Check Point CloudGuard Cloud Detection & Reponse (CDR)

    LRQA

    CloudGuard CDR Pro is Check Point's Cloud Security Threat Defense Analytics platform. With CloudGuard CDR Pro customers can detect and mitigate threats to their cloud environments as well as analyze activity and leverage user and entity behaviour analytics (UEBA) algorithms to fend off cloud attacks.

  • DevSecOps/Secure Cloud Software Development

    NAIMURI LIMITED

    We are data exploitation, national security and law enforcement experts who leverage public cloud through DevSecOps services. We operate from a List X facility. We help clients move from legacy ways of working, to secure, automated and DevSecOps enabled capabilities for cloud access and development. We create accredited DevSecOps environments.

  • ServiceNow CSM (Customer Service Management) service

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd delivers tailored ServiceNow Customer Service Management (CSM) services for government agencies. Our solutions optimize customer support processes, streamline issue resolution, and enhance citizen satisfaction. With our expertise, agencies can provide efficient, personalized service, improve response times, and foster positive citizen interactions.

  • boxxe Microsoft Exchange Workshop

    BOXXE LIMITED

    Our Exchange Workshops will assist with planning the implementation, configuration, coexistence, and migration to Exchange Online with minimal disruption while aligning to supported topologies and best practices.