Search results

1072 results found

1072 results found in Cloud software in the category Secure content and threat management

  • Sophos Central Mobile Advanced

    CHESS ICT LIMITED

    Sophos Mobile's a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Only UEM that integrates natively with leading next-gen endpoint security platform, manages and secures iOS, Android, ChromeOS, Windows10 and macOS devices.

  • ExtraHop Reveal (x) - Cloud Native Network Detection and Response

    CyberWhite Limited

    Reveal(x) providies unparalleled Visibility, Anomaly & Threat Detection and Response. It is compatible with major cloud providers plus on-premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats and anomalous behaviours, provides 360-degree visibility of network traffic, fast investigation workflows and response automation.

  • Micro Segmentation

    Axial Systems Limited

    A solid foundation for workload protection and compliance is isolation and segmentation of network applications and their components. Micro-segmentation solution enables deep application dependencies mapping and policy enforcement ensuring an ongoing management process of your micro-segmentation policy. Our solution delivers the industry’s most complete and flexible solution for micro-segmentation.

  • Wordpress CMS

    Spindogs Ltd

    Development of mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.

  • Domain Tools

    Brookcourt Solutions

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.

  • Phoenix

    Softcat Limited

    Phoenix is a SaaS service which allows organisations to backup and protect their file, database and Vm data, such as Vmware, SQL or NAS utilising the cloud. Customers are able to configure, administer and manage their backup estate utilising a single cloud based console.

  • CyberArk CorePAS

    Blue Cube Security Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Idaptive B2C App Access copy

    Avari Solutions

    Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

  • Blue Lights Decypher Communications Data Cleansing, Processing & Analytics

    Blue Lights Digital

    DECYPHER creates a management report & Dashboard - single point of interaction to streamline the process of communications data records (CDR) analysis turning complex, unstructured data into standardised, automated, evidentially robust output focusing on the critical issues faced in criminal and commercial investigations. Pay as you go or enterprise purchase.

  • Vulnerability Self-Assessment Tool

    Digi2al Limited

    VSAT is a flexible online cyber and physical security risk self-assessment software solution. Enabling security audits at scale to UK Government and internationally recognised standards. Ideally suited to organisations that need to conduct multiple forms of security audit across multiple sites. It enables risk based decision making & security investment.

  • Raidiam Connect

    RAiDiAM Services Limited

    An Identity, API and Authentication accelerator platform designed to help orchestrate any identity end to end solution to provide a range of benefits when implementing trust frameworks and opening opportunities in the Connected API economy.

  • Secure Identity and Access Management Service

    Viewdeck Consulting Limited

    Secure Identity Management Service for Web, Desktop, Mobile applications, providing federated secure OAUTH2, OpenID and SAML based services to applications. Options to support High Availability, Mobile and many patterns. Private service for secure workloads. Provides standard token based, stateless session authentication.

  • Ascema Sensitive Data Discovery and Extraction, Data Loss Prevention and Automated Classification

    Brookcourt Solutions

    The Ascema platfom supports two solutions: Ascema Sensitive Data Discovery and Extraction; Ascema Data Loss Prevention and Automated Classification. Ascema locates, protects, extracts, classifies and remediates sensitive information across enterprise applications, including O365, GSuite, Atlassian (Confluence) and Alfresco, PCs/laptops (windows/Mac/Linux), cloud applications, servers and S3 buckets in real time.

  • OKTA

    Sapphire

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for cloud based applications and on premise applications.

  • Intellego XT - Monitoring Centre

    SS8

    Intellego XT Monitoring Centre is the foundation platform and provides voice and data reconstruction. Allows for data to easily be sort and analyse data, the create link chart showing relationships between callers / callees. Analysts can create and map iDossier records which including names, devices, addresses of Subject of Interest.

  • PROFix - Secure - PACE compliant - Digital Interview Recording Solution

    VoiceScript Technologies Ltd.

    PROFix solution is an automated, PACE compliant, Digital Interview Recording solution. PROFix securely records a multi-person, multi-language meeting (Witness / Suspect) and provides a tamperproof, verbatim, and court-ready transcript. Each utterance is time-indexed and speaker tag-identified. Compliant to MG15 and ROTI standards.

  • Falcon X Threat Intelligence Solution

    Softcat Limited

    CrowdStrike FALCON X provides actionable threat intelligence capability using a holistic approach so entire organizations may understand adversaries, motivation, tradecraft, tooling, with analytical features to be used by security and intelligence teams. Features include indicators of compromise, adversary profiles, intelligence reports, sandboxes, malware searching, and more.

  • SaaS Cloud Monitoring with Elasticsearch, Logstash & Kibana (ELK)

    Logit.io

    Logit provides a fully managed realtime cloud log monitoring SaaS platform built on Elasticsearch, Logstash and Kibana (ELK) which is auto scalable, secure and compliant. Use the Logit platform for container monitoring, cloud observability, logging, metrics, APM, SIEM and much more. All services are ISO27001 certified.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bsscloud

  • Atos Engage ESM: ServiceNow Software

    Atos IT Services UK Ltd

    ServiceNow offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades. ITSM, HRSD, ITOM, SecOps, CSM and more

  • Enterprise Office 365 Solution with Backup & AV

    AMDH Services Limited

    Our solution is based upon Microsoft 365 E3 and is targeted at large Enterprises with over 300 users. It provides the Office suite, desktop and mobile management, password management tool, antivirus and backup for Office 365

  • Managed File Transfer

    WIZUDA

    The Wizuda MFT solution provides a centralised hub through which data transfers are automated and managed securely and compliantly giving full end-to-end accountability. From real-time streaming to scheduled transfers, Wizuda MFT ensures your data gets to where it needs to be, when it needs to be, and within SLA timeframes.

  • Forcepoint Advanced Malware Detection (AMD)

    CHESS ICT LIMITED

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • WordPress CMS

    Pulsion Technology Limited

    We specialise in responsive website design, using the WordPress Content Management System (CMS). We create WordPress websites with a mobile first design strategy, ensuring a quality and consistent user experience on all platforms and devices. Our WordPress CMS experts will ensure your website is cost-effective, highly scalable and easily maintained.

  • Virtual Support Platform

    One Plus One

    Virtual Support Platform is a virtual content space to support our clients' users remotely 24/7. The platform allows users to upload content, publish comments on posts and book a live chat. We offer usage analysis and walled garden privacy feature, that warrants no visibility across the net if required.

  • Thycotic Secret Server Cloud Privilege Access Management

    ProofID Ltd

    Thycotic Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance.

  • LogPoint CORE SIEM

    CHESS ICT LIMITED

    LogPoint's modern Security Incident and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure and enables enterprise security professionals to view activities within their environment.

  • CMS

    Spindogs Ltd

    Mobile optimised, accessible open source content management system development. Spindogs' open source CMS platform provides bespoke templates for content editors. GDPR compliant CMS has an easy to use admin interface and flexible content editing features. The content management system is open-source, user friendly, and fully customisable.

  • Microsoft SharePoint Electronic Document and Records Management (EDRM)

    TECHNOLOGY SERVICES GROUP

    TSG have successful experience delivering EDRM projects using Microsoft SharePoint. Electronic document and records management solutions are designed to store documents & records using associated metadata, which is then categorised within a classification scheme and enabled for search optimisation for all users to retrieve records. Linked to HMS systems,

  • ExtraHop Reveal(x) – Cloud Native Network Detection and Response

    Cisilion Limited

    Reveal(x) is a market leading Cloud Cyber Security Platform, providing unparalleled Visibility, Anomaly & Threat Detection and Response. Compatible with all major cloud providers, including AWS, MS Azure and Google Cloud Platform as well, on premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats.