Search results

1211 results found

1211 results found in Cloud software in the category Security risk management

  • Cloud Vulnerability Management and Scanning

    EITEC LTD

    EITEC provides a Vulnerability Management solution powered by F-Secure. F-Secure Vulnerability Management - Radar

  • Forcepoint Big Button/Sureview

    Bytes Software Services

    An analytical platform that provides dashboarding, user-driven analysis, data alerting, and federated searching across an organization's data sets. The highly customized interfaces can align to multiple business process from across an organization providing both proactive and reactive analysis through linkages in both known and unknown relationships.bsscloud

  • Egress Prevent

    EGRESS SOFTWARE TECHNOLOGIES LTD

    Egress Prevent uses contextual machine learning and DLP policies to deeply understand employee email patterns, spot abnormal behaviour, and prevent an accidental or malicious email security breach before it happens. Egress Prevent is part of our intelligent email security platform that also stops sophisticated phishing attacks.

  • Microsoft Office 365 E5

    BIST Group

    Office 365 E5 - includes all the features of Office E3 plus higher advanced features, such as Teams/Skype Business Dial-in Conferencing and Meeting Broadcast, Power BI Pro, Delve Analytics, and advanced security and compliance features, such as Advanced eDiscovery, Advanced Security Management, Advanced Threat Protection, and Customer Lockbox.

  • Sophos Central Mobile Advanced

    CHESS ICT LIMITED

    Sophos Mobile's a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Only UEM that integrates natively with leading next-gen endpoint security platform, manages and secures iOS, Android, ChromeOS, Windows10 and macOS devices.

  • ExtraHop Reveal (x) - Cloud Native Network Detection and Response

    CyberWhite Limited

    Reveal(x) providies unparalleled Visibility, Anomaly & Threat Detection and Response. It is compatible with major cloud providers plus on-premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats and anomalous behaviours, provides 360-degree visibility of network traffic, fast investigation workflows and response automation.

  • Network Capacity & Scenario Planning Service

    Geode Networks Ltd

    Validate proposed network designs and predict capacity requirements. Model the intended network infrastructure design to validate resilience and predict traffic growth - using state-of-the-art predictive analytic tools to understand current usage patterns and predicting future bandwidth requirements and their likely impact on the network.

  • SaaSGuard Govern

    Ampliphae

    SaaS Management platform that: Automates regular SaaS discovery, deriving the balance between risk and reward of using SaaS (SaaS Balance); Presents an ongoing view of SaaS Balance, offering counsel on deciding SaaS usage policies ; Provides a conduit for collaboration between business/governance teams to better gain net benefit from SaaS.

  • Paradox Edge Hosted Management Service

    Becrypt Ltd

    Paradox is a secure Cloud Access desktop platform, developed with and widely deployed across UK Government for securely accessing Cloud based services. Paradox provides an intuitive hosted end user platform for accessing Public or Private Cloud resources, supporting identity management and segregation between infrastructure management and business service delivery.

  • Micro Segmentation

    Axial Systems Limited

    A solid foundation for workload protection and compliance is isolation and segmentation of network applications and their components. Micro-segmentation solution enables deep application dependencies mapping and policy enforcement ensuring an ongoing management process of your micro-segmentation policy. Our solution delivers the industry’s most complete and flexible solution for micro-segmentation.

  • Cisco Duo Multi Factor Authentication (MFA) Cloud Service from Nowcomm

    Nowcomm Limited

    Secure all on-premise and cloud applications for office and remote workers with Cisco Duo MFA, regardless of end user device type. Duo integrates application technology vendors to extend security controls across cloud applications and services including Microsoft Office 365, Cisco AnyConnect, Amazon Web Services, Microsoft Azure and Google Cloud Platform.

  • Domain Tools

    Brookcourt Solutions

    DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.

  • CyberArk CorePAS

    Blue Cube Security Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Idaptive B2C App Access copy

    Avari Solutions

    Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

  • Vulnerability Self-Assessment Tool

    Digi2al Limited

    VSAT is a flexible online cyber and physical security risk self-assessment software solution. Enabling security audits at scale to UK Government and internationally recognised standards. Ideally suited to organisations that need to conduct multiple forms of security audit across multiple sites. It enables risk based decision making & security investment.

  • Raidiam Connect

    RAiDiAM Services Limited

    An Identity, API and Authentication accelerator platform designed to help orchestrate any identity end to end solution to provide a range of benefits when implementing trust frameworks and opening opportunities in the Connected API economy.

  • iboss Cloud Secure Web Gateway - Core & Malware Detection

    Bytes Software Services

    iboss is a cloud based Secure Web Gateway platform.  iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. Packages include Core Filtering, Malware detection and Data Loss Prevention all delivered as SaaS. bsscloud

  • Secure Identity and Access Management Service

    Viewdeck Consulting Limited

    Secure Identity Management Service for Web, Desktop, Mobile applications, providing federated secure OAUTH2, OpenID and SAML based services to applications. Options to support High Availability, Mobile and many patterns. Private service for secure workloads. Provides standard token based, stateless session authentication.

  • Ascema Sensitive Data Discovery and Extraction, Data Loss Prevention and Automated Classification

    Brookcourt Solutions

    The Ascema platfom supports two solutions: Ascema Sensitive Data Discovery and Extraction; Ascema Data Loss Prevention and Automated Classification. Ascema locates, protects, extracts, classifies and remediates sensitive information across enterprise applications, including O365, GSuite, Atlassian (Confluence) and Alfresco, PCs/laptops (windows/Mac/Linux), cloud applications, servers and S3 buckets in real time.

  • OKTA

    Sapphire

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for cloud based applications and on premise applications.

  • Falcon X Threat Intelligence Solution

    Softcat Limited

    CrowdStrike FALCON X provides actionable threat intelligence capability using a holistic approach so entire organizations may understand adversaries, motivation, tradecraft, tooling, with analytical features to be used by security and intelligence teams. Features include indicators of compromise, adversary profiles, intelligence reports, sandboxes, malware searching, and more.

  • IRIS Intelligence Strategic and Enterprise Risk Management (ERM) Software

    IRIS Intelligence Ltd.

    IRIS Enterprise Risk Management Software helps organisations assess enterprise-wide risks and manage them more effectively. It facilitates increased risk identification, ensures assessment consistency, tracks mitigation action progress and delivers timely, customised reports to Management. IRIS-ERM is a highly flexible system with tailored customer processes, and ISO31000, ISO27001 and COSO support.

  • SaaS Cloud Monitoring with Elasticsearch, Logstash & Kibana (ELK)

    Logit.io

    Logit provides a fully managed realtime cloud log monitoring SaaS platform built on Elasticsearch, Logstash and Kibana (ELK) which is auto scalable, secure and compliant. Use the Logit platform for container monitoring, cloud observability, logging, metrics, APM, SIEM and much more. All services are ISO27001 certified.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bsscloud

  • Atos Engage ESM: ServiceNow Software

    Atos IT Services UK Ltd

    ServiceNow offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades. ITSM, HRSD, ITOM, SecOps, CSM and more

  • Enterprise Office 365 Solution with Backup & AV

    AMDH Services Limited

    Our solution is based upon Microsoft 365 E3 and is targeted at large Enterprises with over 300 users. It provides the Office suite, desktop and mobile management, password management tool, antivirus and backup for Office 365

  • The Splunk Platform

    NETbuilder Ltd

    Splunk monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, artificial intelligence, packaged applications and open APIs, alongside Phantom for security operations, VictorOps (DevOps) for incident management and SignalFX for application performance monitoring.

  • Forcepoint Advanced Malware Detection (AMD)

    CHESS ICT LIMITED

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • Governance, risk management and compliance software (Insight4GRC)

    RSM UK RISK ASSURANCE SERVICES LLP

    Governance Risk and Compliance (GRC) software from RSM. Insight4GRC is a cost-effective governance, risk and compliance software suite that provides management teams with the tools to assess organisational risk, track assigned actions, facilitate company policy acceptance and a survey management tool to collect, analyse and report on data.

  • Thycotic Secret Server Cloud Privilege Access Management

    ProofID Ltd

    Thycotic Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance.