Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1691 results found

1691 results found in Lot 2: Cloud software in the category Security risk management

  • Mimecast Brand Exploit Protect

    INTEGRITY360 LIMITED

    Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.

  • OpAudit

    PERVADE SOFTWARE LIMITED

    The award-winning compliance tracking solution OpAudit centers around an intuitive and completely customizable portal-based system which can be hosted or installed onsite or in the cloud. Multiple contributors, including internal staff and external supply chain partners, can contribute to assessments.

  • Wallix Privileged Access Management (PAM)

    IP Performance Limited

    Controlling Access to target resources and applications. Monitor all user sessions. Manage and rotate account passwords. Just-In-time access and application usage. Implement zerotrust methodology

  • Palo Alto Networks from Virgin Media O2 Business

    Virgin Media Business

    Palo Alto Networks (PANW), the global cybersecurity leader, is shaping the cloud-centric future with technology that transforms the way people and organizations operate. PANW’s mission is to be the cybersecurity partner of choice, addressing the world's security challenges with continuous innovation, seizing the latest AI breakthroughs, analytics, automation, and orchestration.

  • Digital Sensitivity Review Toolset

    SVGC Limited

    Digital Sensitivity Review (DSR) Toolset processes digital files to ensure sensitive content is redacted. DSR toolset uses COTS tools with bespoke development and AI logic to pre-identify sensitivities and indicate redaction suggestions for rapid Curator review and approval before automatically packaging files with metadata for transfer to archive or consumer.

  • Integrated Governance, Risk and Compliance, (GRC) Management System

    enCircle Solutions Ltd.

    XMS (eXtensible Management System) is a fully integrated governance risk and compliance platform which helps organisations understand their residual risk and track service requests, incidents, problems, corrective actions and non-conformances, to fully understand their policies, procedures, legislative commitments and security posture in one single view.

  • BLD_Digital Close Protection

    Blue Lights Digital

    Our services fall into several subcategories, consisting of: • Physical Threat (PT) • Secure Communications (SC) • Open-Source Monitoring - Protect (OSM-P) • Close Protection Managed Devices (CPMD) • Secure Cloud hosted & monitored camera systems

  • Barracuda WAF-as-a-Service

    MISCO TECHNOLOGIES LIMITED

    Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda WAF can defeat today’s most sophisticated attacks.

  • Jamf Apple Device Management and Security Solutions for Organisations

    GBM DIGITAL TECHNOLOGIES LIMITED

    Jamf enables organisations to make an impact with Apple devices by effortlessly managing and securing their Apple ecosystem. It provides a comprehensive solution for Apple-first environments, maximising productivity and mobility with iPad. Jamf ensures enterprise security, consumer simplicity, and protection of personal privacy, empowering organisations to leverage Apple devices effectively.

  • Complete Project Management and Collaboration toolset

    adappt

    A smart and simple user-friendly application. The dynamic features of the product provide a scalable solution to several business modules. The Agile business task manager caters for an easily understandable activity management control system. An efficient time evaluator, progress tracker, enables adding multiple tasks in an organised manner.

  • Tenable Vulnerability Management (formerly Tenable.io)

    INTEGRITY360 LIMITED

    Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.

  • CDW Crowdstrike Falcon Exposure Management

    CDW Limited

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Logit.io Auditing Compliance Package

    Logit.io

    The Logit.io platform makes logging, metrics and tracing analysis easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Barrier Networks Crowdstrike Falcon Endpoint Detection & Response (EDR)

    Barrier Networks

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Google Chrome Enterprise Upgrade Licence

    Netpremacy Limited

    Google Chrome web-based device management software, per device console SaaS license. Admins can easily deploy and manage a fleet of Chrome devices (Chromebook/Chromebox/Chromebase) using the Google Chrome Enterprise Upgrade license. Policies are set in the management console and automatically enforced on any enrolled devices. Also offers kiosk mode. Reseller: Netpremacy

  • Datto Backup and Disaster Recovery As a Service (BaaS, DRaaS)

    QUADRIS LIMITED

    Quadris and Datto work together to provide an industry leading hybrid on-premise and cloud DR and backup solution. An on-premise backup appliance backups up locally, but also syncs this data to a different data centre, this same backup job can be booted live in a DR event.

  • IT Helpdesk Case Management System

    Claritas Solutions Ltd

    Empowers users to have complete control of their IT Helpdesk Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • AvePoint Cloud Governance for Microsoft 365

    Avepoint UK Ltd

    M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization.

  • CrowdStrike Falcon EDR

    BT PLC

    Falcon Insight XDR, an EDR solution, delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • CDW Sophos Managed Detection and Response Essentials (MDR) Endpoint

    CDW Limited

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • Survey, data gathering, questionnaire software (Insight4GRC 4questionnaires)

    RSM UK RISK ASSURANCE SERVICES LLP

    Questionnaire, survey and analysis software enables organisations to collect, analyse and report on data. Suitable for various tasks such as staff and stakeholder surveys, incident reporting, breach reporting and internal control questionnaires (ICOs). Creation of action plans based on a question responses through integration with the 4action module.

  • Cisco Enterprise Networking, DNA and Enterprise Agreements by ITGL

    ITGL Limited

    Services to cover all Cisco Enterprise Network Software including DNA Essentials/Advantage/Premium Software, Catalyst Centre Software, Identity Services Engine Software, Enterprise Agreements 3.0 and Cisco Spaces.

  • Microsoft Entra ID

    NAK Consulting Services Ltd

    A Microsoft Entra ID Premium (P) Licence

  • Induction Zesty Patient Engagement Portal

    Zesty Ltd

    Zesty is a patient engagement platform that transforms interactions between patients and care teams. Through integration with most leading PAS/EPR/Diagnostic systems it provides smart appointment management, paperless letters, targeted questionnaires, timely patient information, and integrated video consultations leading to clinical workflow efficiencies and enhanced patient engagement along entire care pathways.

  • Tenable PCI-ASV

    INTEGRITY360 LIMITED

    Tenable PCI ASV allows unlimited scans of your networks to identify and address vulnerabilities and ensure your organization complies with PCI-DSS. Tenable ensures vulnerabilities don't exist for more than 90days on any networks involving payment-card transactions.

  • Arctic Wolf Managed Security Operations

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • Netwrix Enterprise Auditor

    Bytes Software Services

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity. bssgc

  • Proofpoint Cloud Application Security Visibility and Control

    INTEGRITY360 LIMITED

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Microsoft Windows 10/11 Enterprise E5 Suite

    Bytes Software Services

    Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11 bssgc

  • OnDMARC

    Red Sift Ltd

    Award-winning, cloud-based DMARC, DKIM, SPF, MTA-STS and BIMI configuration, automation and management tool. Protect against phishing and BEC attacks by stopping unauthorised use of email-sending domains.