Search results

741 results found in Cloud software in the category Secure content and threat management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
741 results found

iOS and Android Cybercrime Protection

Netcraft

The great majority of victims of phishing fall for the attacks while using devices such as phones and tablets. Netcraft's mobile apps for iOS and Android protect your employees against phishing and web based malware when they are using mobile devices.

Managed O365 MSP Service

Evaris Plc

Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today. By combining best-in-class apps like Excel and Outlook with powerful cloud services like OneDrive and Microsoft Teams, Office 365 lets anyone create and share anywhere on any device.

DevOps Infrastructure Automation and Continuous Delivery Server

Viewdeck Consulting Limited

Infrastructure and Application Automation for Cloud and on-Prem provides DevOps, Configuration Management, Quality Assurance, and repeatable delivery of Windows and Linux based solutions. Delivering ‘Infrastructure as Code’, enables rapid repeatable deployment of new services. Using standard Cookbook and recipes, simplifies deployment of virtualised environments.

Concepta Security Services

NVT Group

Concepta Security Services are a suite of cyber-security solutions which, when applied synchronously, provides peace of mind regarding the IT infrastructure's security status. Concepta Security Services monitors key systems and provides real time actionable alerts. It is available in three variations; Essentials, Advanced or Complete dependant on the prevailing requirements.

Microsoft Azure Subscription Purchase

MTI Technology Ltd

As a Microsoft CSP partner, MTI can enable customers to purchase Azure services or solutions via the CSP programme to provide flexible billing and services

ServiceNow (ITSM/ITOM/CSM) - Licensing by SCC

Specialist Computer Centres plc

Our consultative approach to ServiceNow(ITSM/ITOM/CSM) Enterprise Service Management(ESM) licensing enables us to deliver IMPACT to your organisation. Via our team of highly skilled Business Analysts we will work with you to define the correct approach for your needs, leveraging our knowledge as a ServiceNow customer to maximise benefits to you.

Nexus Managed Email Security Services

Nexus Open Systems Ltd

Nexus partner with the best of breed in Cloud Security to deliver a fully Managed Email Security Service. This gives you a critical defence to protect against advanced threats and data loss. With our comprehensive enterprise-grade email protection, you and your organisation can breathe easier.

Network and Security Configuration Monitoring

Hardenize

Continuous discovery and monitoring of network infrastructure with comprehensive coverage of network and security standards. Special focus on certificate monitoring and Certificate Transparency. The standards include: DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, and others.

Shared Care Record and Interoperability Platform

Kainos Evolve Limited

Modern Standards (HL7, FHIR) based Platform as a Service, with eform and workflow capability, hosted on AWS, supports Alerts, event sequencing notifications, activity streaming, medication, clinical portal, consent management, interoperability. User Centred Design, Agile, Open Standards, Cloud, Data Integration, Aggregation and Normalisation, Integrated Care Platform, Service Design.

Computacenter – IT Service Management Tool (ITSM)

Computacenter (UK) Ltd

Computacenter provides ITSM, through TeamUltra, a portfolio of robust cloud-based applications that automate and manage enterprise services. Our IT Service Management Tool applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades.

Symantec Data Loss Prevention Cloud Service Connector for Web Site Security Service

Bytes Software Services

The Symantec Data Loss Prevention Cloud Service Connector is a Symantec Data Loss Prevention detection service deployed in the cloud that enables you to monitor content and identify information policy violations in web traffic. bsscloud

Evolve EMR-as-a-Service

Kainos Evolve Limited

Award-winning Evolve Medical Record platform supports Digital Maturity programmes through removal of paper from the care process. Secure, audited storage and management of patient documentation, promoting paperless working through digital workflows and electronic forms. Provided as a fully managed service, delivered securely using Microsoft Azure’s cloud.

iManage Work Product Management Cloud

iManage EMEA Limited

iManage is the industry’s leading work product management application, empowering professionals to create, manage, collaborate on, govern and secure, all work product from anywhere on any device in a single user experience, turning lost time into productive time.

'Platform' Infrastructure Security Dashboard and Automated Operational Toolkit

Ethical Healthcare Consulting C.I.C.

Infrastructure Security Dashboard and Automated Operational Toolkit. 'Platform' automatically connects and profiles any infrastructure and application environment regardless of the environment to deliver Audit, Discovery, Scheduling, Reporting, Governance and Operational functionality, OS, COTS patching, anti-virus and firmware security updates. Dashboard, APIs and reporting metrics are easily configured to meet need.

Version Recon copy copy copy

Pen Test Partners LLP

Version Recon is an easy-to-use patch update alerting service, that emails you updates as they are released. Because it is not a patch manager it doesn't deploy patches for you, and doesnt require access or permissions to your systems or services. It supports all software and firmware!

SBL Trend Micro Deep Security as a Service (DSaaS) via AWS Marketplace

Software Box Limited (SBL)

Security that's built for DevOps to automatically defend your AWS , Azure, GCP & VMware workloads and simplify compliance. Pay per instance starting at $0.01/hour. Proactive protection of elastic workloads against threats, malware and vulnerabilities.

Phishing As A Service

CyberWhite Limited

The service starts with an initial, automated employee assessment to benchmark individual users phishing recognition skills. Each user is then automatically graded, and based on performance levels, a training campaign comprised of short, staged, real-world phishing attacks is tailored to help improve the employees’ awareness of malicious email messages.

Symantec Managed Endpoint Detection and Response

Symantec (UK) Ltd

Adversaries are using sophisticated and pervasive TTPs to exploit vulnerabilities within organisations. Symantec MEDR combines market-leading Symantec EDR, big data analytics, Symantec's Global Intelligence Network, and teams of highly trained Symantec SOC analysts to actively hunt, investigate, and remediate threats so you don’t have to.

VPlatform & VCode by VST Enterprises Limited

VST Enterprises Limited

VCode® represents the next generation of code scanning technology – an evolutionary leap past traditional barcodes . Utilised to authenticate and deliver bespoke, permission based content and to protect against fraud in many sectors, from document verification, identity, end-to-end supply chain management, interactive charitable giving transactions and content delivery.

Palantir Fraud Investigation Platform

Palantir Technologies UK, Ltd.

Palantir's data intelligence and management solution enables investigators to gain unique insights into a vast range of fraudulent activity, including but not limited to financial, identity, internet and voting fraud. Powerful integration and analytical tools enable the connection and investigation of disparate datasets, exposing hidden and complex fraud patterns.

Mobile Threat Defence (MTD) - App Vetting Service

Nine23

Provides real time mobile threat detection on phones, tablets and other mobile devices, as well as the networks they are on, and analyses apps for malicious activity pre-release and during use. Multiplatform protection and analysis tool for unified endpoint management. UK partner for zimperium - zIPS zIAP

Microsoft Office 365

Synergi Software Limited

Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes and combining familiar Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Office, Exchange, SharePoint, and Skype for Business.

Exabeam Advanced Analytics and SIEM

CYBANETIX LIMITED

Exabeam uses data science for behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection. Exabeam's User and Entity Behavior Analytics (UEBA) provide insider threat detection, tracking anomalous behavior and suspect movements within your organization, while also securing your cloud services, machines, devices, and IoT assets.

GeDaP SEE Plus (Secure Email for Everyone)

TeamLogic Systems Ltd

GeDaP SEE+ S/MIME Service provides digitally signed and encrypted mail which is both simple for end users and easy to install. The system uses a Qualified Trust Service Provider (GlobalSign) and KeyTalk CKMS to provide a complete and packaged solution authenticating users and encrypting data in transit.

Amazon AppStream 2.0

Amazon Web Services

Amazon AppStream 2.0 is a fully managed, secure application streaming service that allows customers to stream desktop applications from AWS to any device, without rewriting them. AppStream 2.0 provides users with instant-on access to the applications they need, and a responsive, fluid user experience running in an HTML5 web browser.https://aws.amazon.com/appstream2/resources/

LastLine Email Defender Cloud

Avatu Ltd

A next generation SaaS sandboxing technology that examines and reports upon the behaviour of files entering an organisation's IT estate through email traffic. Through behaviour analysis, the service is able to detect, report on and block malicious content as well as identify potential phishing attempts and shadow IT.

Integrated Security Management Platform

Diegesis Limited

Our service comprises an integrated security platform based on the Cysure Virtual Online Security Officer and the integration of other opensource and/or commercial third party cyber security products together with defines services propositions to assist customers to adopt the service.

CloudGen Web Application Firewall

Softcat Limited

Provide application security to websites and web apps in the cloud

Secure Cloud Fileshare as a Service

Viewdeck Consulting Limited

Secure GDPR compliant cloud file-store providing synchronized file repository for teams/projects. From Browser or native local directory to share documents/files, Native Desktop and Mobile clients, collaborative co-editing web interface for Word, Excel and Powerpoint. Based on industry leading opensource NextCloud and OnlyOffice solutions. Police, Education, Home Office, NHS Client base.

Internet usage monitoring & Website Blocking

PCS BUSINESS SYSTEMS

Our Web Protect service provides the ability to set policies to protect your organisation and your users. This service gives the ability to completely block illegal and untrustworthy sites. It also secures against the many websites which may push harmful programs including malware, phishing, proxies, spyware, botnets and spam.

CDW Checkpoint Sandblast Mobile

CDW Limited

SandBlast Mobile (previously MTP or Capsule) provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, up-to-date protection for smartphone and tablet users against known and unknown threats against both mobile devices and data before any damage can be caused.

Ascema Data Loss Prevention, Data Discovery and Automated Classification

Brookcourt Solutions

Ascema Data Loss Prevention, Data Discovery and Automated Classification protects and classifies sensitive information across enterprise applications e.g. GSuite, O365, Alfresco, Sharepoint and more – on premise, in the cloud and hybrid. Discovers, classifies and protects at TrueContent level in real time at scale, simple to deploy, easy to use.

iboss Cloud Secure Web Gateway - Core & Malware Detection

Axians Networks Limited

iboss is a cloud based Secure Web Gateway platform.  iboss utilises a containerised cloud architecture allowing customers to migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. PDNS integration and admin created GDPR Zones with dedicated UK datacentres. Includes Core Filtering & Malware detection SaaS

Check Point CloudGuard for SaaS

Ultima Business Solutions Ltd

CloudGuard SaaS is a cloud service that prevents attacks on enterprise SaaS applications, blocks cybercriminals from taking over employee accounts and provides data security for SaaS applications.The solution supports a multitude of enterprise SaaS application including Microsoft Office 365, Google G-Suite, BOX, Citrix ShareFile and more

Microsoft Exchange Load Balancer

edgeNEXUS

EdgeNEXUS Load balancers offer outstanding feature and performance whilst still being Very easy to use. As a Microsoft Gold partner we have significant experience of load balancing Microsoft products such as Exchange, Skype, Sharepoint. Available in Azure, AWS, VMware, Hyper-V, HPE supported Appliance. We offer free migration from other products.

Cyber eLearning

Cyber Security Associates Ltd

CSA provides cyber security and data security eLearning courses designed and managed by cyber security experts. Each course provides multiple learning techniques with key facts and tips, and a knowledge test. Access is via on online login. Each course takes between 30-45 mins to complete, with PDF completion certificate.

Thycotic Secret Server Cloud Privilege Access Management

Bytes Software Services

Thycotic Secret Server Cloud is an online password manager hosted in Azure, a highly secure, available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance. bsscloud

Microsoft Enterprise Mobility + Security E3

BIST Group

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics

Leidos CHECK IT Health Check Services

Leidos Innovations UK Limited

Check (ITHC) services in line with NCSC (formerly CESG) requirements through partnership with trusted suppliers holding CHECK, CREST and PCI DSS accreditation. Leidos provides analysis of systems and networks to identify vulnerabilities, provide daily management throughout the engagement and detailed reporting with remediation actions upon completion.

Symantec's Cloud Access Security Broker (C.A.S.B)

Gradian Systems Ltd

Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

Secure Gitlab Server as a Service

Viewdeck Consulting Limited

Secure distributed cloud based enterprise code development environment that supports code management and configuration control in a DevOps implementation using Git Repository. Also provides capability to plan and manage code development, test and assure, package releases and monitor releases.

Computacenter - VMware Workspace One

Computacenter (UK) Ltd

Computacenter provides VMware Workspace ONE - a secure enterprise platform delivering and managing any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

Symantec's Endpoint Protection with Cyber Defence Manager

Gradian Systems Ltd

Symantec Endpoint Protection 15 defines cloud-delivered endpoint security with multilayered defense, simplified single agent/single console management with AI-guided policy updates, and the broadest set of integrations available.

SBL Forcepoint Advanced Malware Detection (AMD)

Software Box Limited (SBL)

Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

Splunk Software

apto solutions limited

Apto provide SaaS for Splunk that monitors and analyzes machine data from any source to deliver Operational Intelligence to optimize your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs. We only provide Splunk Accredited Consultants to deliver this service.

Automatic CSE / CSAE Image and Video Detection and Categorisation

VigilAI

Vigil AI's core service automatically detects and categorises Child Sexual Exploitation CSE / CSAE images and videos. Based on state-of-the-art Deep Learning technology and built in the UK, this pioneering technology can be used by law enforcement and industry to detect illegal content at scale to UK and international standards.

Microsoft Exchange Online Protection

Bytes Software Services

Exchange Online Protection protects your cloud based or on-premises email with anti-spam and anti-malware protection. Financially backed SLAs and 99.999% network uptime, including protection of 100% of know viruses and 99% of spam. Reporting and message trace capabilities. Policy based filtering. bsscloud

Cloud Data Secure

Nowcomm Limited

Secure your preferred cloud eco system with an enterprise class cloud access security broker (CASB).

Idaptive Multi Factor Authentication

Avari Solutions

Bolster Adaptive Security with Multi-Factor Authentication Everywhere Strengthen security with context and behavior-based access controls all applications. Leverage analytics and machine learning to detect abnormal and risky user behavior while prompting an MFA challenge or blocking access in real-time. Improve security with seamless and scalable access tailored to each individual.

Strata Insight

STRATA SECURITY SOLUTIONS LIMITED

Strata Insight provides single view of the cyber security and compliance of your ICT estate across both on-premises and cloud environments. It presents this view against your chosen risk or control framework providing you a view of your business risks and the technical issues they stem from.

Leidos Cloud IT Health Check Services

Leidos Innovations UK Limited

Leidos offers Cloud Health Check services to provide a holistic review of IT services and applications, assessing configuration, performance, security and scalability of cloud infrastructure. Our expert engineers/consultants work with you to determine scope, pain points, concerns and expected outcomes, followed by detailed discovery exercises, reporting and action plans.

Prisoner Messaging, Secure Video Visits and Money Deposits Solution – Direct2inmate

Core Systems

Prisoners are able to securely communicate with family, friends and legal teams via prisoner messaging and video visits. Over 24,5 million messages were sent by the end of 2018 using the prisoner messaging solution. Direct2inmate’s money deposits portal allows friends and family to securely deposit funds to a prisoner’s account.

Prolinx Hosted Platform (PHP) - Security Incident and Event Management (SIEM) as a Service

Prolinx Ltd

SIEM as a Service from Prolinx provides 24/7 proactive management for your operational business. Reducing risks associated with today’s complex Cyber threat landscape. This service is tailored to meet your organisational requirements, available across all security classifications, Prolinx use an approved product with highly experienced security cleared staff.

'Platform' Infrastructure Security Dashboard and Automated Operational Toolkit

Ethical Services Group

Infrastructure Security Dashboard and Automated Operational Toolkit. 'Platform' automatically connects and profiles any infrastructure and application environment regardless of the environment to deliver Audit, Discovery, Scheduling, Reporting, Governance and Operational functionality, OS, COTS patching, anti-virus and firmware security updates. Dashboard, APIs and reporting metrics are easily configured to meet need.

Barrier Networks Managed Security Information and Event Management (SIEM)

Barrier Networks

Our Managed SIEM Service provides customers with first-class security expertise, advanced threat intelligence, efficiency and automation. Our cyber security experts are well placed to manage the system effectively ensuring that security incidents and breaches are handled swiftly and accordingly.

Microsoft Office 365 Enterprise E5 Suite

Bytes Software Services

E3 (Office apps and Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management) Phone System call management, PSTN-Conferencing, Business Intelligence, PowerBI-Pro, Delve Analytics, Personal-Org Analytics, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery. bsscloud

Core Impact Automated Penetration Testing

Cloud Digital Limited

Core Impact enables safe, easy, and cost-effective penetration testing. Point and click and users can safely exploit vulnerabilities within their network, replicating the kind of access an intruder could achieve. Core Impact helps users prioritise remediation, validate information security and accurately evaluate the effectiveness of IDS and IPS etc.

Virtual Data Room

Admincontrol AS

Virtual Data Rooms (VDRs) from Admincontrol are custom-designed to streamline and support due diligence processes. In the data room institutions can share confidential documentation and perform Q&A rounds in an intuitive and secure environment. A Virtual Data Room ensures rapid, transparent and secure information sharing.

Barrier Networks Secure Data Workflow (OPSWAT MetaAccess)

Barrier Networks

MetaAccess prevents risky devices from accessing local networks and cloud applications such as Office 365, Salesforce and Dropbox. Using OPSWAT’s industry-leading endpoint security and advanced threat prevention technologies, MetaAccess performs extensive security and compliance checks as well as remediation before allowing devices to access corporate data.

EQUINITI Toplevel - Open Design Studio

Toplevel

Open Design Studio is a cloud-hosted visual design toolkit that enables multi-skilled development teams to collaborate to create, design and update digital interactive services from any device or location. A powerful user-friendly way to build case workflows, business processes, documents, forms and templates without programming skills.

Academic Research, Education and Advisory Service (AREAS)

Research Series Limited

Our research and development team provide training (in-house and custom) in scholarly, systematic and innovative research on computational intelligence, cyber security, computer network security, enterprise architecture, security operations centres, information assurance and risk management & research methods. The team has published a number of notable articles, journals and books.

Hortor Limited Cloud Application Security Software Services

Hortor Limited

Hortor Limited provides a full set of Cloud Software Application Security Services, including scoping, UI, data import/export, application analytics/ scaling, in-transit/operational/staff security/asset protection, availability/resilience, identity/authentication support in a secure, certified and documented way, training/demonstrations as required, and ongoing support of products it builds along with its partners'/other selected products.

SBL Imperva Incapsula

Software Box Limited (SBL)

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Proofpoint Threat Protection Suite & Continuity

BSI Cybersecurity and Information Resilience (Ireland) Ltd

Proofpoint Email Protection stops malware and non-malware threats and granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats never-before-seen attacks that use malicious attachments and URLs. Business continuity keeps email flowing, even when your email fails such as Office 365.

Imperva SecureSphere Cloud WAF

Brookcourt Solutions

SecureSphere Web Application Firewall (WAF) for AWS & Azure provides the industry’s leading WAF technology to protect web apps. It combines multiple defences to accurately pinpoint and block attacks without blocking your citizens and partners.

Cloud VPN as a Service

Viewdeck Consulting Limited

A secure software-based VPN Service for mobile, laptop, desktops and servers across environments, zones. Secure, scalable service, suitable for deploying to the Cloud and joining legacy sites, users and data centres. Providing resilient connectivity remote clients to services hosted within a secure zone. Police, Education, Local Government, NHS Client base.

Check Point CloudGuard SaaS

SJG Digital

CloudGuard SaaS is a plug-in service for SaaS platforms such as Office 365, Dropbox, Slack, Gmail, Google Drive. It provides THE best security technologies across cloud services with a customisable policy to ensure that granular control is provided to organisations using it.

Board Portal

Admincontrol AS

Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.

Barracuda Web Application Firewall

COOLSPIRiT

Barracuda Web Application NextGen Firewall, highly scaleable security solution protects applications from both targeted and automated attacks both on-prem or in the cloud with Amazon Web Services, Azure and Google Cloud Platform. Security is integrated into various firewall technologies as web filtering, malware, intrusion prevention, threat protection & anti-spam protection

Sophos Central Endpoint Advance

Caretower Ltd.

Sophos Central Endpoint Advanced (CEA) is a security agent running on each computer, managed by a Cloud Software control + report interface (Sophos Central). Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation, Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

Imperva SecureSphere Cloud WAF

Truststream Security Solutions

SecureSphere Web Application Firewall (WAF) for AWS & Azure provides the industry’s leading WAF technology to protect web apps. It combines multiple defences to accurately pinpoint and block attacks without blocking your citizens and partners.

OnINBOX - OnINBOX - Personalised phishing protection

Red Sift Ltd

Phishing attacks are increasingly using impersonation to bypass traditional defence mechanisms. OnINBOX brings a user facing risk assessment to the user inside every email to stop creative attacks in their tracks and assist the recipient with clear instructions about how to interact with an email dependent on its risk profile.

Exchange Online Plan 2

Civica UK Limited

Email, contact management and calendaring with unlimited storage, anti-malware and spam filtering, data leakage protection (DLP), and legal hold. Access using Outlook client, tablet / phone apps and browsers. Interact with Shared & Group Mailboxes, Public Folders, OneDrive, Office, 3rd party apps. Via Civica. See https://products.office.com/en-gb/exchange/compare-microsoft-exchange-online-plans

Barracuda Essentials for Microsoft Office 365

COOLSPIRiT

Barracuda Total Email Protection combines Barracuda's complete email protection portfolio in a single solution. featured areas include: all-in-one email security, backup and archiving for O365. A.I based protection from spear phishing, account takeover and business email threats. This also includes Anti-phishing training (and simulation), Barracuda Forensics and Incident Response

Microsoft Enterprise Mobility + Security E3

Insight

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics. See https://products.office.com/en-gb/secure-productive-enterprise

SBL Forcepoint Cloud Access Security Broker (CASB)

Software Box Limited (SBL)

Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables csutomers to overcome compliance and. Information assurance restrictions on using the Cloud.

LastLine Defender

Avatu Ltd

The first native cloud security solution that delivers unmatched visibility of advanced threats in both your external and internal public cloud traffic in AWS. Secure your public cloud workloads against a range of threats: Incoming attacks targeting your servers, Misconfigured servers, Lateral movement of attackers, Unauthorized logins and data downloads

Becrypt Security Operations Centre

Becrypt Ltd

Data is ubiquitous, employees are mobile and the nature and frequency of threats is constantly evolving. To support organisations in the proactive identification of threats, and to help defend against cyber-attacks Becrypt have developed a Security Operations Centre.

Compliance Management Software

Pulsion Technology Limited

We provide a platform that supports multi-functional public sector organisations mobilise their field workforce. Our service simplifies how your field workforce manages and processes complex data gathering from multiple locations and improves communications between your field operations and back-office systems. Compatible with iOS and Android devices.

Managed Website Protection

Jisc Services Ltd

The Jisc Managed Website Protection service, based on Imperva Incapsula, provides a cloud-based platform that provides enterprise-grade website security, performance and availability. The service includes best-of-breed WAF; comprehensive DDoS protection; global CDN and an application level load balancer, which are available as standalone services or as an integrated solution.

Hotdesk Performance Monitoring/Usage Analytics, Defend Against Insider Threat

adappt

Solution for many Hotdesk problems. Part of the KnowYourDay family of software . Defend your organisation from insider-threat/cyber-threat. Improve hotdesk efficiency. Auto classify hotdesk use based on team/department, monitoring file movement and protecting sensitive documents. Helps identify anomalous behaviour. AI Deep Learning Neural Networks enables analysis without capturing sensitive data.

Governance Risk & Compliance Software as a Service

MetricStream UK Limited

MetricStream provides a complete portfolio of enterprise Governance, Risk and Compliance (GRC) Applications in a SaaS model. This integrated approach leads to tremendous gains in enterprise-wide visibility of risks, strengthen compliance with multiple regulations, policies, and standards. Analytics, reporting and regulatory notifications enable you to minimize liability and optimize opportunities.

Probation Self-Service Portal – Direct2probationer

Core Systems

Probation Self-Service portal, Direct2probationer is the leading software for Community Rehabilitation Companies. It allows users on probation to access communications, information, and services. It’s the perfect tool for probationer reintegration. It can integrate with biometrics and other types of verification apps or hardware.

Digital Evidence Management Platform

Hitachi Vantara

The Hitachi Digital Evidence Management (HDEM) platform ingests all types of digital evidence including video from all sources, applying MoPi, Disclosure management rules. The service manages evidential integrity, and allows democratisation of key functionality. Video editing, clipping, redaction are core functionality together with a map agnostic visualisation engine.

IRIS Intelligence Cyber Security Risk Management System

IRIS Intelligence Ltd.

The IRIS Cyber Security Risk Management System enables enterprises to proactively identify and manage threats and vulnerabilities concerning Cyber Security. The service facilitates collaboration of IT and Business units in managing Cyber Security risks. The service can be used to integrate best practices and policies from NIST and NCSC.

The Board Intelligence Platform

Board Intelligence

The Board Intelligence Platform is a digital board information tool. It allows for the efficient and secure creation and publishing board and committee packs. It also provides an iOS and Windows 10 Apps, providing readers with instant, secure access to their library of board papers.

Black Duck

Softcat Limited

Black Duck discovers and manages the risks associated with using Open Source software, specifically around security vulnerabilities and Open Source licenses.

CT-100 Cyber Essentials

Crystal Thinking (Crystal Marketing Limited)

The purpose of the service is continual cyber risk management, providing; 1. Continual alignment with the Cyber Essentials framework, reporting vulnerabilities and secure configuration issues for all Windows & Linux servers and user devices. 2. Pre-preparation of IT infrastructure for streamlined Cyber Essentials assessments & renewals.

Hashicorp Enterprise Suite

CloudOps Ltd

The end to end DevOps lifecycle process can – at a high level - be defined through a series of steps, which can be broken down as Build, Test, Package, Provision, Secure, Deploy and Monitor. The Hashicorp suite of tools provides distinct functionality to increase delivery velocity.

Symantec Data Loss Prevention Cloud Service Connector for Cloud Access Security Broker (CASB)

Bytes Software Services

The Symantec Data Loss Prevention Cloud Service Connector is a Symantec Data Loss Prevention detection service deployed in the cloud that enables you to monitor content and identify information policy violations in cloud applications. bsscloud

Website Security Testing

Borwell

This is a Cloud based security testing service. It allows us to test an organisation’s website for SQLi vulnerabilities, Cross Site Scripting (XSS) vulnerabilities and test for defacement. It is a fully automated scan.

Sandblast Mobile

Phoenix Software Ltd

SandBlast Mobile provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats against both mobile devices and data upon these devices before any damage can be caused.

Micro Segmentation

Axial Systems Limited

A solid foundation for workload protection and compliance is isolation and segmentation of network applications and their components. Micro-segmentation solution enables deep application dependencies mapping and policy enforcement ensuring an ongoing management process of your micro-segmentation policy. Our solution delivers the industry’s most complete and flexible solution for micro-segmentation.

Forcepoint Email Security

Bytes Software Services

Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks. bsscloud

Azure Active Directory P1

Akhter Computers PLC

A full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management, role based access control, application usage monitoring, rich auditing and security monitoring and alerting

Microsoft Office 365 Subscription Purchase

MTI Technology Ltd

As a Microsoft CSP partner, MTI can enable customers to purchase Office 365 licences via the CSP programme to provide flexible billing and services

Splunk Enterprise

Softcat Limited

Splunk Enterprise monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, Splunk Enterprise is a flexible platform that scales from focused use cases to an enterprise-wide analytics backbone.

Arcturus

Avari Solutions

Applicare application performance management (APM) solution that monitors improves enterprise application performance, stability and availability. Early detection of problems, significantly reducing mean time to repair preventing/eliminating outages. Applicare warns of system downtime symptoms and probable causes. Know exactly who is impacted, why, when and how to find the precise solutions.

Pentesec Radware Cloud WAF (Web Application Firewall)

Pentesec Ltd

The Service offers protection from application-level web attacks. The Service automatically detects application domains, analyzes potential vulnerabilities and assigns optimal protection. The Service uses DNS to divert traffic towards the supplier’s Cloud and also includes DDoS Protection to 1Gbps in all packages, extended DDoS Protection is available as an option.

Secure Web Based Map Service

Viewdeck Consulting Limited

Secure Open Street Mapping (OSM) service providing UK, EU and global maps to digital web and mobile applications. Digital productivity aide. Cost effective, web-connected or isolated secure solution providing mapping for applications. Includes regular map updates and ability to update/augment or enhance with your own data. Local Government, Police, Education.