Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1500 results found

1500 results found in Lot 2: Cloud software in the category Security risk management

  • Wallix Trustelem

    INTEGRITY360 LIMITED

    WALLIX Bastion is a leading PAM solution that delivers robust security and oversight over privileged access to critical IT infrastructure. Through your digital transformation, WALLIX Bastion can be seamlessly deployed from on-premise to private and public cloud infrastructures.

  • Detect for M365 + AWS (Vectra M365)

    Wizard Cyber

    Provide a SaaS Hosted threat detection & response platform for M365 and/or AWS

  • IBM API Connect On Cloud Reserved Instance (Dedicated)

    IBM United Kingdom Ltd

    IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.

  • iProov Face Verifier

    iProov Limited

    iProov Face Verifier uses Genuine Presence Assurance to securely authenticate a person’s face against a pre-enrolled biometric template. Assuring it is the right person (and not an imposter), a real person (using liveness detection), authenticating right now (using a one-time biometric). Contactless cloud-based solution, no requirement for specific hardware.

  • IRIS Intelligence Asset Management Software

    IRIS Intelligence Ltd.

    IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.

  • Trend Micro One

    Softcat Limited

    Cloud-delivered, powered by over 250 million global sensors, Trend Micro One discovers dynamic attack surface, assesses risk, helps you respond with the right security at the right time. Built-in support for a Zero Trust strategy and executive risk dashboards enable you to be more confident in security strategy, all-in-one solution

  • TRUSTMARQUE FORCEPOINT DATA GAURD

    Trustmarque Solutions Limited

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Micro Focus - ArcSight - Security Incident and Event Management (SIEM) - SaaS

    MICRO FOCUS

    Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.

  • Statement Reconciliation (Delve)

    GLANTUS UK LIMITED

    Delve reconciles vendor statements to AP transactional data and enables the digital capture of statements in paper, PDF, or Excel formats. It creates an automated side-by-side comparison of supplier invoices and payment activity to customer AP transactions.

  • Forcepoint Zero Trust Content Disarm and Reconstruction (ZTCDR)

    INTEGRITY360 LIMITED

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • Observatory

    Cubelus Limited

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • AI Analyst for CTI

    Elemendar - AI for Cyber Threat Intelligence (CTI)

    Elemendar supplies an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. Our AI makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.

  • Microsoft Office 365 Advanced eDiscovery

    Bytes Software Services

    Advanced eDiscovery reduces your eDiscoverycosts by using machine learning to analyse relevant data, to allow more efficient document review and data reduction decisions. You can work with data stored in Exchange Online, SharePoint Online, OneDrive for Business, and Teams for Business. bss13

  • 4me (ITSM/SIAM/ESM) - Licensing by SCC

    Specialist Computer Centres plc

    4me is the Complete Service Management platform enabling departments, like IT&HR, to work together seamlessly, including external service providers where services are outsourced. Automate requests from customer or citizens to interact with the right service providers within your organisation. 4me supports ITIL and fully integrates knowledge-management, time-tracking and project-management capabilities.

  • Experian Tracing Solutions for Police and Law Enforcement with Investigator Online

    Experian

    Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime

  • Tenable.io

    INTEGRITY360 LIMITED

    A cloud-based vulnerability management solution

  • Netwrix Stealth Intercept

    INTEGRITY360 LIMITED

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • SIEM as a Service - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    SecurityHQ

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.

  • Microsoft Office 365 Customer Lockbox

    Bytes Software Services

    Customer Lockbox gives customers explicit control over in the very rare instances when a Microsoft engineer may need access to customer content to resolve a customer issue. This is in addition to in-built Role Based Access Control (RBAC) Lockbox process that provides just-in-time, limited and time-bound authorised access. bss13

  • AvePoint Migration Service

    PACE-XL LTD

    Discover, analyse, consolidate and migrate enterprise email, files, and collaboration from on-premises or cloud-based Legacy systems, file shares, previous SharePoint versions, Exchange, and more into Office 365.

  • Third Party Risk Management

    Orpheus Cyber

    Orpheus' platform delivers continuous monitoring of cyber risk in your Third Parties and Supply Chain. We use accredited Threat Intelligence and award-winning Machine Learning to continuously monitor and assess each of your Third Parties' cyber risk. We alert you to severe vulnerabilities in your supply chain likely to be exploited.

  • CyberSmart - Cyber Essentials Compliance Platform

    Cantarus

    CyberSmart - A platform to continuously monitor your Cyber Essentials compliance and help protect your business from cyber attacks.

  • Barrier Networks Centri for Endpoint Protection, Detection and Response (EDR)

    Barrier Networks

    We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behavior analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users.

  • Automated Vulnerability and Penetration Testing Solution

    MEDICARE NETWORK LIMITED

    Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.

  • BeyondTrust Privileged Password Management

    Bytes Software Services

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts. bss13

  • Mimecast DMARC Analyzer

    QUADRIS LIMITED

    Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC authentication.

  • Datto Backup and Disaster Recovery As a Service (BaaS, DRaaS)

    QUADRIS LIMITED

    Quadris and Datto work together to provide an industry leading hybrid on-premise and cloud DR and backup solution. An on-premise backup appliance backups up locally, but also syncs this data to a different data centre, this same backup job can be booted live in a DR event.

  • Proofpoint Threat Protection Suite

    INTEGRITY360 LIMITED

    Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.

  • Cloud Security Elements Collaboration for Microsoft 365 - Anti-Virus AV for Office 365

    Frazer-Nash Consultancy LTD

    VIMA provides WithSecure Elements Collaboration for M365 to: Protect your business from advanced email threats Easy deployment with the highest possible detection rate for business security, complements the email security capabilities of Office 365 to bring you a comprehensive protection against the most sophisticated phishing, malicious content, and targeted attacks.

  • Frama Rmail for Local Government

    FRAMA (UK) LIMITED

    Frama Rmail is an email encryption service that plugs-in to your existing Outlook or Gmail solution. It allows you to encrypt sensitive or confidential information with a click, and ensures GDPR compliance in the dissemination of important data. It has a wealth of features designed to keep your data safe.