Search results

2460 results found

2460 results found in Lot 2: Cloud software in the category Security

  • Check Point Harmony Endpoint

    SEP2 LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Wallix Trustelem

    INTEGRITY360 LIMITED

    WALLIX Bastion is a leading PAM solution that delivers robust security and oversight over privileged access to critical IT infrastructure. Through your digital transformation, WALLIX Bastion can be seamlessly deployed from on-premise to private and public cloud infrastructures.

  • Ultima Mimecast Pervasive Defence Plan (Zone 1+2+3)

    Ultima Business Solutions Ltd

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • IBM API Connect On Cloud Reserved Instance (Dedicated)

    IBM United Kingdom Ltd

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • iProov Face Verifier

    iProov Limited

    iProov Face Verifier uses Genuine Presence Assurance to securely authenticate a person’s face against a pre-enrolled biometric template. Assuring it is the right person (and not an imposter), a real person (using liveness detection), authenticating right now (using a one-time biometric). Contactless cloud-based solution, no requirement for specific hardware.

  • E-Sign UK Ltd - Electronic Signatures

    E-Sign UK ltd

    E-Sign is a leading provider of eIDAS compliant, secure electronic signatures and digital document management solutions. The electronic signature platform enables users to create, e-signature, send documents, negotiate contracts, accept payments, and create automated workflows. E-Sign offers a range of e-signature services, supporting unified digitalisation and simplified document transaction management.

  • Trend Micro One

    Softcat Limited

    Cloud-delivered, powered by over 250 million global sensors, Trend Micro One discovers dynamic attack surface, assesses risk, helps you respond with the right security at the right time. Built-in support for a Zero Trust strategy and executive risk dashboards enable you to be more confident in security strategy, all-in-one solution

  • Check Point Harmony Email & Collaboration Email & Apps Complete

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language

  • TRUSTMARQUE FORCEPOINT DATA GAURD

    Trustmarque Solutions Limited

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Micro Focus - ArcSight - Security Incident and Event Management (SIEM) - SaaS

    MICRO FOCUS

    Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.

  • Nerdio Manager for Azure

    Howell Technology Group Limited

    Nerdio for Azure empowers MSPs to quickly deliver successful Microsoft Azure cloud services. From IaaS to DaaS to full-on ITaaS, you’re able to automatically provision a complete environments in just two hours and manage all your clients in a single pane of glass admin portal in three clicks or less

  • Virtual First Horizon Telephony

    VIRTUAL FIRST LTD

    Virtual First Horizon is a Gamma Provided Cloud PBX providing an array of features to suit the needs of organisations. It is operated through a choice of devices; handset, mobile or desktop. Web interfaces allow real time access and changes to the many services available on user basis.

  • SMS: Not-for-Profit (Charity) messaging platform

    Mobisoft Corporation Ltd.

    A British government approved messaging system, designed ground up in conjunction with Embassies, global international organisations and corporate multi-nationals. Used by: FCO, Embassies, DFID, UN, EU, NHS, Banks local and central government

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    INTEGRITY360 LIMITED

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Observatory

    Cubelus Limited

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • AI Analyst for CTI

    Elemendar - AI for Cyber Threat Intelligence (CTI)

    Elemendar supplies an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. Our AI makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.

  • Microsoft Office 365 Advanced eDiscovery

    Bytes Software Services

    Advanced eDiscovery reduces your eDiscoverycosts by using machine learning to analyse relevant data, to allow more efficient document review and data reduction decisions. You can work with data stored in Exchange Online, SharePoint Online, OneDrive for Business, and Teams for Business. bss13

  • Computacenter - Microsoft Enterprise Mobility + Security (EMS)

    Computacenter (UK) Ltd

    Enterprise Mobility + Security (EMS) is a mobility management and security platform that helps protect and secure your organization and empower your employees.

  • Globalscape EFT Arcus

    Pro2col Ltd

    EFT Arcus is a SaaS MFT solution for organisations needing the agility, elasticity and cost savings the cloud provides. Reduce the complexity of your file transfer infrastructure, increase operational efficiency and protect your most important data using our secure managed file transfer cloud service. EFT Arcus has SOC 2 certification.

  • Exchange Online Kiosk

    NEXUS ASSOCIATES (ICT) LIMITED

    Exchange Online Kiosk is suited for deskless workers to provide business class email, contact management and calendaring services with up to 2Gb per user. Includes anti-malware and spam filtering. Access is also provided to Shared Mailboxes and Group Mailboxes.

  • CDW CrowdStrike Falcon Platform – Endpoint Security

    CDW Limited

    Falcon Platform, a cloud native, SaaS based endpoint protection platform is built to stop advanced cyber threats. With its modular approach, Falcon Platform can be flexible to your endpoint security needs. Powered by crowdsourced data, machine learning and AI, Falcon delivers via a single, lightweight sensor and single management UI.

  • B-SAFE Data Incidents and IT Risks Management System

    BONDAP LTD

    B-SAFE is a web-based system that supports Data Incident reporting and investigation, IT risks management of any types with unlimited causes, consequences, control measures, different Risk Evaluation Matrices and Appetite Levels for different risks/risk types, Quantitative Analysis by any method, Bow-tie analysis, Mitigating Actions management, implementation and evaluation.

  • Netwrix Stealth Intercept

    INTEGRITY360 LIMITED

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • SIEM as a Service - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    SecurityHQ

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.

  • 2FA / OTP / SMS / HLR / Email

    MMG Mobile Marketing Group

    Messaging alert services. SMS, Email, Voice and HLR , Multi-Channel Campaign Manager. The most highly accredited SMS provider for Security. UKAS Accredited ISO-27001, ISO9001, Cyber Essentials, Cyber Essentials Plus & Secure Digital Transactions Kitemark accredited. MMG delivers more SMS messages for UK Central and Local Government than any other provider

  • BeyondTrust Password Safe Cloud

    INTEGRITY360 LIMITED

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.

  • Microsoft Office 365 Customer Lockbox

    Bytes Software Services

    Customer Lockbox gives customers explicit control over in the very rare instances when a Microsoft engineer may need access to customer content to resolve a customer issue. This is in addition to in-built Role Based Access Control (RBAC) Lockbox process that provides just-in-time, limited and time-bound authorised access. bss13

  • Microsoft 365

    CLIMB GLOBAL SOLUTIONS LTD

    Microsoft 365 Enterprise is a complete, intelligent solution that empowers everyone to be creative and work together securely. Microsoft 365 Enterprise consists of: Office 365 Enterprise; Windows 10 Enterprise; and Enterprise Mobility + Security (EMS). There are three plans to choose from: E3, E5 and F1.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    Gradian Systems Ltd

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Third Party Risk Management

    Orpheus Cyber

    Orpheus' platform delivers continuous monitoring of cyber risk in your Third Parties and Supply Chain. We use accredited Threat Intelligence and award-winning Machine Learning to continuously monitor and assess each of your Third Parties' cyber risk. We alert you to severe vulnerabilities in your supply chain likely to be exploited.