Search results

1263 results found

1263 results found in Lot 1: Cloud hosting in the category Infrastructure and platform security

  • Cloudflare One Secure Access Service Edge (SASE)

    Cloudflare, Inc.

    Cloudflare SASE, Cloudflare One, is a Zero Trust network-as-a-service platform that dynamically connects users to enterprise resources, with identity-based security controls delivered close to users. Replace expensive, proprietary circuits with a single Anycast global network built for ZTNA with DDoS mitigation, network firewalling, and traffic acceleration.

  • Insight Azure Dedicated HSM


    Your hardware security module (HSM) in the cloud.

  • VMware Tanzu - Kubernetes Runtime & Manage

    Phoenix Software Ltd

    VMware Tanzu provides a simplified, consistent approach to container deployment, scaling, and management. Tools, automation, and data-driven insights supports infrastructure and application modernization. Tanzu simplifies multi-cloud Kubernetes deployment, centralizing management and governance for clusters and teams across on-premises, public-clouds, and edge. Price packages starts with Tanzu Basic Edition

  • Insight Amazon Macie


    Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. Amazon Macie automates the discovery of sensitive data at scale and lowers the cost of protecting your data.

  • Cloud Gateway SASE Platform

    Cloud Gateway

    Cloud Gateway offers flexible networking and security solutions that act as a secure transit broker, rapidly connecting you to multiple cloud providers, the HSCN, PSN and internet. We build and manage your bespoke SASE solution. As a trusted public sector provider we hold Cyber Essentials Plus, ISO27001 and ISO9001 accreditations.

  • Cloud and Infrastructure Hosting Provision, Migration and Support


    Coopers&Lloyds offers robust and best in class cloud hosting to develop, test and run your services on secure and cost effective cloud infrastructure. Designed to be flexible, for easy migration of applications and services. We support on-Cloud / Hybrid cloud hosting, Azure, AWS, Google Cloud all in UK data centres.

  • Fully Managed Backup with Air Gap

    CSI Limited

    CSI can build a scalable, resilient, robust and cost-efficient infrastructure solution for backup and recovery. Provisioned in a private, public or hybrid approach we offer; long term archival; fast disaster recovery with pre-defined recovery and restore SLAs; data tiering; air gap, physically isolating your backup data from potential cyber-security threats.

  • Cloud Native Access Service

    Anson Resolution

    Cloud Native Access Node provides a flexible method of accessing your cloud. Development, Testing and Production enclaves by using an internet-facing Cloud-Native Zero Trust environment.

  • Azure IaaS


    Details of Microsoft Azure are available from Microsoft at

  • CyberArk Privilege Cloud

    Integrity360 Ltd

    Satisfy fundamental privileged access security requirements by utilizing CyberArk’s expertise to manage the underlying infrastructure. With CyberArk Privilege Cloud, organisations can empower security and IT operations to focus on high-level tasks critical to the organisation’s security posture.

  • Healthcare Secure Remote Access Service

    Redcentric Solutions Limited

    Redcentric’s Secure Remote Access (SRA) service offers a robust, scalable, flexible and secure way for healthcare professionals to access the HSCN network whilst away from their usual work location. Software on the user’s device communicates with the remote access platform across any Internet connection and a secure tunnel is established.

  • Google Cloud Platform (GCP) - Storage

    Cloud Technology Solutions Ltd

    Google Cloud Platform offers many storage services. Google Cloud Storage provides public and private multi regional object storage with a Content Delivery Network (CDN) to serve application traffic at scale. Local SSDs offer unprecedented disk performance with high performance network SSD and HDD options available for virtual machines.

  • VMware SASE


    Secure Access Service Edge (SASE) provides Cloud Web Security (CWS) functionality to protect users while access Web based services and applications. Access to CWS is achieved via SD-WAN and Secure Access (VPN) to provide a consistent secure Internet experience determined by user location and device posture.

  • Cloud Asset Inventory


    Cloud Asset Inventory is a metadata inventory service that allows you to view, monitor, analyze and understand all your GCP and Anthos assets across projects and services in one place.

  • Fully Managed Backup and Recovery Service - Helix Enterprise

    CSI Limited

    Designed for the needs of complex regulated organisations, Helix Enterprise allows you to out-task to a fully managed service where we manage your data backups in a secure, flexible and compliant way. Utilising advanced reporting, monitoring and analytics of a backup infrastructure with access to our community and knowledge database.

  • Fortinet - Secure Access Service Edge (SASE) and Zero Trust Platform

    Softcat Limited

    SASE extends networking and security capabilities beyond where they have typically been available, allowing users, regardless of location, to take advantage of firewall as a service (FWaaS), secure web gateway (SWG), zero-trust network access (ZTNA), and a medley of other threat detection functions.

  • Datacenta - Managed Container Hosting


    Provision of secure environments on shared hosts in which Customers can develop, test, run and administer Docker or other container-based applications, with Datacenta taking care of infrastructure management functions to enable the rapid porting across divers environments that makes containerization so powerful.

  • Cloud Data Loss Prevention


    The Google Data Loss Prevention API helps you understand and manage sensitive data. It provides fast, scalable classification and optional redaction for sensitive data elements like credit card numbers, names, social security numbers, passport numbers, US and selected international driver's licence numbers, phone numbers, and more.

  • Iaas - Infrastructure as a service

    Leicestershire Health Informatics Service

    LHIS IaaS provides a fully managed best in class enterprise offering. The service provides fully managed server instances delivered to the customer preconfigured with a range of operating systems, antivirus, critical patches installed and back up routines in place. This is complemented by fast resilient HSCN and internet network links.

  • Remote Access as a Service

    Exponential-e Ltd

    Organisations require Secure Remote Access (SRA) mechanisms connecting users to infrastructure, applications and networks aligning to Government and Industry standards .We provide Remote Access (RAS) Encryption, Identity Management and Data flow controls using; Encryption, Admission Control, 2 Factor Authentication Certificate Authority URL verification Connectivity to Internet, Cloud, WAN and HSCN

  • Managed Firewall

    Cyberfort Ltd

    Cyberfort’s Managed Firewall Service draws on our experience and depth of knowledge in perimeter security and is a fully-managed service that ensures best practices are employed in the initial setup and ongoing management of your firewall rules and policies.

  • Smart Building Monitoring, Control and Compliance


    Cloud based low-power IoT ORION network delivering secure real time smart building monitoring for assets and sensors, including compliance reporting (legionella, fire, safe place, energy & waste) etc. Works up to 10 miles from a single ORION gateway.

  • boxxe Trend Micro One


    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Built-in support for a Zero Trust strategy and executive risk dashboards enable you to be more confident.

  • Managed Cloud Services


    We provide hosting services for any kind of applications to various cloud solutions like AWS, Azure, Google Cloud etc.

  • Fortinet Web Application Firewall (WAF)


    Leveraging FortiWeb VM, Container and SaaS based technologies to protect hosted web applications from attacks that target known and unknown exploits. Using AI enhanced multilayer and correlated detection methods, FortiWeb defends applications from known vulnerabilities and from zero-day threats, along with providing DDoS and Load-balancing capability for applications.

  • Managed Umbraco Website Hosting

    Just After Midnight

    Full specialist Umbraco Cloud Hosting, from DevOps to Managed Cloud, IAAS or PAAS, AWS or Azure, Public, Private or a Hybrid. Consultancy, infrastructure, security, migration, scalability, DR. We can manage everything from design and build to procurement and ongoing management, maintenance and patching including 24 hour "eyes on" monitoring service.

  • TRAX/TRIK Platform as-a-service

    SNC Mission Systems UK

    Sierra Nevada Corporation’s (SNC) Tactical Radio Application eXtension (TRAX)® Enabled Tactical Radio Integration Kit (TRIK) hardware kit was developed to support C5ISR missions at the Strategic, Operational, and Tactical levels, including non traditional ISR to use for enterprise and austere locations where network extensions are needed to execute the mission.

  • Varonis Data Security Platform


    Varonis specialize in software for data security, governance, compliance, classification, and analytics. Varonis detects insider threats and external cyberattacks like ransomware by analyzing cloud data stores and monitoring user behavior, mitigating risk in M365, Teams, Salesforce, Slack, Box and on-premise file servers by locking down sensitive data and remediating access.

  • DDOS Mitigation Service

    Redcentric Solutions Limited

    Distributed Denial of Service (DDoS) attacks are characterised by the delivery of very large volumes of traffic to the targeted system, overwhelming infrastructure and making it inaccessible. The DDoS Mitigation Service addresses this by filtering out attack traffic while sending as much legitimate traffic to the Customer’s systems as possible.

  • Boundary Security Protection (BSP)

    UBDS IT Consulting Ltd

    Security boundary protection that mitigates risks of DoS, data exfiltration, enumeration, exploitation. Security protections that can be customised for your environment. Technology based on NCSC principles (ROSA). Ability to integrate with SIEM products such as SPLUNK and ELASTIC.