Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1750 results found

1750 results found in Lot 2: Cloud software in the category Security risk management

  • Avigilon Alta Aware (Video)

    Motorola Solutions UK Limited

    Avigilon Alta Aware is a cloud-based video surveillance solution that brings full AI video analytics and operational insights to your existing cameras and systems. Aware supports Avigilon cloud cameras, select 3rd party video surveillance cameras and integrates with supported API enabled systems such as access control solutions.

  • IRIS Intelligence Internal Audit Management System

    IRIS Intelligence Ltd.

    IRIS Intelligence Audit Management System supports the internal audit function to plan, test, assess and report on the design and operational effectiveness of internal controls. Customisable workflows promote team coordination, while detailed analytics support decision making and drive continuous improvement.

  • Netskope SSE

    ITHQ LTD

    Netskope Intelligent Security Service Edge (SSE) consolidates business critical security services within the Netskope One platform, ensuring secure access to the web, cloud services, and private apps from any location. Intelligent SSE empowers enterprises to safely enable their hybrid workforce by applying a cloud-delivered and AI-powered data-centric approach to security.

  • AvePoint Insights for Microsoft 365

    Bytes Software Services

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive. bssgc

  • Rapid7 Cloud Risk Complete: Hybrid Security and Risk Management

    ITHQ LTD

    Rapid7 Cloud Risk Complete is an integrated security platform that manages risks across cloud, on-premises infrastructure, and web applications. It provides comprehensive vulnerability management, dynamic application security testing, and automated workflows to enhance security postures efficiently.

  • IBM Security Randori on Cloud Service

    Responsiv Solutions Ltd

    IBM Security Randori Recon helps organizations continuously identify external facing assets that may be visible to attackers, both on-premises and in the cloud, and prioritizes potential exposures which pose the greatest risk. The Client may select from the following available offerings.

  • Nexus Fusion Droplet NeverTrust™ containers

    NEXUS FUSION LIMITED

    Nexus Fusion provides Droplet NeverTrust™ containers cloud technology to ensure secure delivery of x86 apps to supported OS on any cloud. With trust in none, all inbound traffic is blocked, safeguarding clients' app layers and achieving top cyber accreditation, even with outdated software.

  • CDW iBoss Zero Trust Secure Access Service Edge

    CDW Limited

    iboss is a Zero Trust Edge.  iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres.

  • MTI Managed Microsoft Sentinel SIEM/SOAR/SOC service

    MTI Technology Ltd

    MTI Managed SIEM (Security Information and Event Management)/SOAR/SOC Service provides centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, staffed with SC Cleared SecOps analysts is fully integrated with Microsoft Sentinel and offers 24*7*365 monitoring, response and assurance.

  • Insider Threat Management - Proofpoint

    Brookcourt Solutions

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly.

  • Falcon Complete MDR

    Phoenix Software Ltd

    Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.

  • Identity Verification as a Service (IDVaaS)

    Entrust Datacard (Europe) Limited

    IDVaaS is a mobile digital enrolment and identity verification service. IDVaaS uses common smartphone technology and app to guide applicants through a private, secure and convenient self-service process 100% remotely. IDVaaS incorporates realtime biometric and document authentication checks, liveness detection and works with all common forms of machine-readable ID documents.

  • Chronicle Systems by JML Software Solutions Ltd

    JML Software Solutions Limited

    Captures occupational and operational competency against defined skills sets in highly regulated environments. Supports strategic threat & risk assessment and ensures capacity and capability meets demand. Access to Firearms and high value assets can be managed virtually or physically based on accreditation against a defined role or skill set.

  • boxxe Delinea Platform

    BOXXE LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Darktrace Cyber Security

    Central Networks and Technologies Ltd

    Darktrace leverages AI to detect and respond to emerging cyberthreats in real time across the entire digital estate.

  • Microsoft Defender for Office 365 Plan 1

    Ve3 Global Ltd

    Microsoft Defender for Office 365 Plan 1 is a cloud-based email filtering service. Helps protect against unknown malware and viruses by providing robust zero-day protection. Includes features to safeguard from harmful links in real time. MDO has rich reporting and URL trace capabilities to spot attacks happening in your organization.

  • Check Point CloudGuard Network Security

    Charterhouse Voice & Data

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Includes Advance threat preventions – IPS, Identity Awareness, App Control, Anti-Virus, Anti-Bot, URL Filtering, VPN, threat emulation, and threat extraction

  • boxxe Delinea Privileged Account Management

    BOXXE LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Computacenter - Palo Alto Prisma Access

    Computacenter (UK) Ltd

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • KnowBe4 Security Awareness Training Licences

    MONDAS CONSULTING LTD

    Purchase KnowBe4 Security Awareness Training licences to upskill your staff by utilising the KnowBe4 AI powered security awareness training and phishing simulations, to protect against Cyber Security threats. The KnowBe4 tool can be purchased in silver, platinum, gold or diamond. Our SOC team can run regular KnowBe4 exercises.

  • Computacenter - Cisco Full Stack Observability

    Computacenter (UK) Ltd

    Full-Stack Observability by Cisco moves beyond domain monitoring into full-stack visibility, insights, and actions, transforming siloed data into actionable insights that provide shared context for your IT teams, giving you the power to prioritise your actions so you can deliver flawless customer experiences that drive revenue while accelerating digital transformation.

  • IBM Cloud Pak Service

    Responsiv Solutions Ltd

    IBM Cloud Paks provide enterprise container software that is pre-integrated for cloud use cases in production-ready configurations. Quickly build new cloud- native applications deployed to Kubernetes based container orchestration platforms. Modernize/extend existing applications, and deploy middleware in a consistent manner across multiple clouds. Software installed on Buyer suppler Kubernetes environments.

  • Law Enforcement Information Asset Register (IAR) & Record of Processing Activity (RoPA)

    COALESCENT LIMITED

    Dapian provides an Information Asset Register (IAR) and Record of Processing Activity (RoPA), which is auto-updated from Data Protection Impact Assessment (DPIA) data, as well as manual entries, to ensure it remains accurate. Dapian is based on ICO templates and other best practice from police forces and national bodies.

  • Barrier Networks Web Application Firewall (WAF) (Fortinet FortiWAF)

    Barrier Networks

    Leveraging FortiWeb VM, Container and SaaS based technologies to protect hosted web applications from attacks that target known and unknown exploits. Using AI enhanced multilayer and correlated detection methods, FortiWeb defends applications from known vulnerabilities and from zero-day threats, along with providing DDoS and Load-balancing capabilities for applications.

  • Stratiam

    Intergence Systems Limited

    Stratiam connects to all of your organisation's data via our proprietary API connectors. It then securely stores this data in a data warehouse from which this data can be queried. Best-in-class customisable data visualisations and dashboards are built against these datasets. AI machine learning can be layered for predictive analytics.

  • CDW Sophos Intercept X Advanced

    CDW Limited

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.

  • Silobreaker Online

    Silobreaker Ltd

    Silobreaker helps business and security professionals make sense of the overwhelming amount of data on the web. Users save time by working efficiently through big data-sets and improve their knowledge from analysing and contextualising data more easily. Customers represent OSINT use-cases for cyber-intelligence, geopolitics, physical security, and industry/market intelligence.

  • MooD 16 and MooD 17 Licence Support

    CACI UK Ltd

    MooD Software Support Service is to deliver incident and problem management, technical support and free Software version upgrades. The service can be accessed via a dedicated e-mail inbox and telephone support line, with all interactions tracked and managed by a customer service ticketing system.

  • Tenable Identity Exposure (formerly Tenable.ad)

    INTEGRITY360 LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Vulnerability Scanning Service

    NETWORK INTEGRATION TECHNOLOGIES LTD

    ITogethers automated penetration platform is built on one of the world leaders for Vulnerability Scanning. Our service is designed to minimise the risk of infection through regular scanning, producing reports to alerting the customer to any vulnerabilities detected.