Search results

824 results found in Cloud software in the category Security risk management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
824 results found

iOS and Android Cybercrime Protection

Netcraft

The great majority of victims of phishing fall for the attacks while using devices such as phones and tablets. Netcraft's mobile apps for iOS and Android protect your employees against phishing and web based malware when they are using mobile devices.

Managed O365 MSP Service

Evaris Plc

Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today. By combining best-in-class apps like Excel and Outlook with powerful cloud services like OneDrive and Microsoft Teams, Office 365 lets anyone create and share anywhere on any device.

DevOps Infrastructure Automation and Continuous Delivery Server

Viewdeck Consulting Limited

Infrastructure and Application Automation for Cloud and on-Prem provides DevOps, Configuration Management, Quality Assurance, and repeatable delivery of Windows and Linux based solutions. Delivering ‘Infrastructure as Code’, enables rapid repeatable deployment of new services. Using standard Cookbook and recipes, simplifies deployment of virtualised environments.

Concepta Security Services

NVT Group

Concepta Security Services are a suite of cyber-security solutions which, when applied synchronously, provides peace of mind regarding the IT infrastructure's security status. Concepta Security Services monitors key systems and provides real time actionable alerts. It is available in three variations; Essentials, Advanced or Complete dependant on the prevailing requirements.

Marval MSM Integrated ITSM Software Support, Training & Consultancy

Marval Software Limited

Innovative IT Service Management software (MSM) empowers service delivery teams to provide a world class service to its customers. MSM is a secure & scalable, ITIL compliant, ISO/IEC20000, ISO27001 certified & cyber compatible deployed via SaaS or on-premise, enabling organisations to deliver flexible and cost-effective customer, service centric business solutions.

ServiceNow (ITSM/ITOM/CSM) - Licensing by SCC

Specialist Computer Centres plc

Our consultative approach to ServiceNow(ITSM/ITOM/CSM) Enterprise Service Management(ESM) licensing enables us to deliver IMPACT to your organisation. Via our team of highly skilled Business Analysts we will work with you to define the correct approach for your needs, leveraging our knowledge as a ServiceNow customer to maximise benefits to you.

Automated Mobile Application Security Testing

Kryptowire

Kryptowire analyzes Android and iOS mobile applications for compliance with internationally-recognized security and privacy standards such as the National Information Assurance Partnership (NIAP) Protection Profile for Application Software and the General Data Protection Regulation ( GDPR).

Nexus Managed Email Security Services

Nexus Open Systems Ltd

Nexus partner with the best of breed in Cloud Security to deliver a fully Managed Email Security Service. This gives you a critical defence to protect against advanced threats and data loss. With our comprehensive enterprise-grade email protection, you and your organisation can breathe easier.

Network and Security Configuration Monitoring

Hardenize

Continuous discovery and monitoring of network infrastructure with comprehensive coverage of network and security standards. Special focus on certificate monitoring and Certificate Transparency. The standards include: DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, and others.

Computacenter – IT Service Management Tool (ITSM)

Computacenter (UK) Ltd

Computacenter provides ITSM, through TeamUltra, a portfolio of robust cloud-based applications that automate and manage enterprise services. Our IT Service Management Tool applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades.

Data Access Request

Metadata Consulting Ltd

Different parts an organisation need to share data, but must follow a defined IG protocol. Our software provides departments with a clear process to request, track and approve data access requests through a customisable online interface.

Supply Chain Cyber Security

NQC Ltd

Cyber breaches within supply chains represent a significant and growing risk to global industry. NQC enables buyers to highlight risks to information in their supply chain, and help suppliers to understand and enhance their cyber security posture. The service can be used to analyse suppliers, contracts, sub-contractors and categories.

Backupify for G Suite via Netpremacy

Netpremacy Limited

Backupify protects your most important cloud data through secure, automatic, daily backup. Backupify allows search and restore of files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and application errors. Backs-up data in Google Mail, Drive, Calendar, Contacts, and Team Drives.

'Platform' Infrastructure Security Dashboard and Automated Operational Toolkit

Ethical Healthcare Consulting C.I.C.

Infrastructure Security Dashboard and Automated Operational Toolkit. 'Platform' automatically connects and profiles any infrastructure and application environment regardless of the environment to deliver Audit, Discovery, Scheduling, Reporting, Governance and Operational functionality, OS, COTS patching, anti-virus and firmware security updates. Dashboard, APIs and reporting metrics are easily configured to meet need.

Version Recon copy copy copy

Pen Test Partners LLP

Version Recon is an easy-to-use patch update alerting service, that emails you updates as they are released. Because it is not a patch manager it doesn't deploy patches for you, and doesnt require access or permissions to your systems or services. It supports all software and firmware!

Okta API Access Management

Avari Solutions

Your custom apps are increasingly modern with an API backend. Secure enterprise data and enable developers to focus on the user experience. Control access for any type of user or service in one place. Create, maintain and audit API access policies.

SBL Trend Micro Deep Security as a Service (DSaaS) via AWS Marketplace

Software Box Limited (SBL)

Security that's built for DevOps to automatically defend your AWS , Azure, GCP & VMware workloads and simplify compliance. Pay per instance starting at $0.01/hour. Proactive protection of elastic workloads against threats, malware and vulnerabilities.

Phishing As A Service

CyberWhite Limited

The service starts with an initial, automated employee assessment to benchmark individual users phishing recognition skills. Each user is then automatically graded, and based on performance levels, a training campaign comprised of short, staged, real-world phishing attacks is tailored to help improve the employees’ awareness of malicious email messages.

Investigation Case and Quality Management Software copy

Black Rainbow Ltd

Forensic Investigation Case Management across Digital and Traditional Forensic Sciences, from evidence submission through to evidence management and regulatory reporting. It offers an integrated Quality Management System to accelerate ISO 17025 accreditation and the maintenance of this accreditation. It automates Forensic Tools and Processes.

McAfee MVision Cloud CASB

BSI Cybersecurity and Information Resilience (Ireland) Ltd

MVision Cloud the leading cloud access security broker trusted by over 1,000 enterprises to securely enable over 25,000 cloud services, including shadow IT and sanctioned IT. Clients leverage a single cross-cloud platform to gain visibility into cloud usage and risks, meet compliance requirements, enforce security policies, and respond to threats.

Cloud Permit To Work Manager System

ITConsilium Limited

Our industry leading software provides clients with the means of a safe working environment and compliance with best practice. It offers a fully secure, traceable electronic solution which consolidates management over a spectrum of operations, including facilities, estate management, engineering, maintenance operations and health and safety.

Moebian ARQ

Moebian

Moebian ARQ is a low cost cloud service providing auditors and information security teams an easy to use comprehensive information security audit tool. Moebian ARQ is ideal for managing and implementing risk based auditing needed to meet ISACA and ISO27001 guidelines.

DXC Technology ServiceNow Subscription Service for Health

CSC Computer Science Ltd part of the DXC Technologies Group

DXC Technology's ServiceNow for Health offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades.

Microsoft Office 365

Synergi Software Limited

Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes and combining familiar Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Office, Exchange, SharePoint, and Skype for Business.

Exabeam Advanced Analytics and SIEM

CYBANETIX LIMITED

Exabeam uses data science for behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection. Exabeam's User and Entity Behavior Analytics (UEBA) provide insider threat detection, tracking anomalous behavior and suspect movements within your organization, while also securing your cloud services, machines, devices, and IoT assets.

LastLine Email Defender Cloud

Avatu Ltd

A next generation SaaS sandboxing technology that examines and reports upon the behaviour of files entering an organisation's IT estate through email traffic. Through behaviour analysis, the service is able to detect, report on and block malicious content as well as identify potential phishing attempts and shadow IT.

Integrated Security Management Platform

Diegesis Limited

Our service comprises an integrated security platform based on the Cysure Virtual Online Security Officer and the integration of other opensource and/or commercial third party cyber security products together with defines services propositions to assist customers to adopt the service.

CloudGen Web Application Firewall

Softcat Limited

Provide application security to websites and web apps in the cloud

Secure Cloud Fileshare as a Service

Viewdeck Consulting Limited

Secure GDPR compliant cloud file-store providing synchronized file repository for teams/projects. From Browser or native local directory to share documents/files, Native Desktop and Mobile clients, collaborative co-editing web interface for Word, Excel and Powerpoint. Based on industry leading opensource NextCloud and OnlyOffice solutions. Police, Education, Home Office, NHS Client base.

Internet usage monitoring & Website Blocking

PCS BUSINESS SYSTEMS

Our Web Protect service provides the ability to set policies to protect your organisation and your users. This service gives the ability to completely block illegal and untrustworthy sites. It also secures against the many websites which may push harmful programs including malware, phishing, proxies, spyware, botnets and spam.

CDW Checkpoint Sandblast Mobile

CDW Limited

SandBlast Mobile (previously MTP or Capsule) provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, up-to-date protection for smartphone and tablet users against known and unknown threats against both mobile devices and data before any damage can be caused.

BiZZdesign Enterprise Studio Online and HoriZZon Portal

Edifit Limited

BiZZdesign Enterprise Studio Online and HoriZZon Portal deliver a collaborative business design platform offering powerful, integrated modelling, analysis and reporting across multiple disciplines to enable coherent decision-making. It provides capabilities to seamlessly plan, design and execute change using a wide set of disciplines and extensible modelling languages.

Ascema Data Loss Prevention, Data Discovery and Automated Classification

Brookcourt Solutions

Ascema Data Loss Prevention, Data Discovery and Automated Classification protects and classifies sensitive information across enterprise applications e.g. GSuite, O365, Alfresco, Sharepoint and more – on premise, in the cloud and hybrid. Discovers, classifies and protects at TrueContent level in real time at scale, simple to deploy, easy to use.

Check Point CloudGuard for SaaS

Ultima Business Solutions Ltd

CloudGuard SaaS is a cloud service that prevents attacks on enterprise SaaS applications, blocks cybercriminals from taking over employee accounts and provides data security for SaaS applications.The solution supports a multitude of enterprise SaaS application including Microsoft Office 365, Google G-Suite, BOX, Citrix ShareFile and more

Endpoint 2FA

Nowcomm Limited

Passwords alone are not strong enough to protect against unauthorised use of credentials. Multi factor authentication enables users to receive SMS, telephone calls or a push notification to mobile phones.

Microsoft 365

SHI International Corp.,t/as SHI UK

Microsoft 365 is a bundle of Windows 10, Office 365 and Enterprise Mobility + Security. Microsoft 365 is the evolution of the bundles formerly known as "Secure Productive Enterprise E3 and E5." We are also able to provide components of the Microsoft 365 individually.

Cyber eLearning

Cyber Security Associates Ltd

CSA provides cyber security and data security eLearning courses designed and managed by cyber security experts. Each course provides multiple learning techniques with key facts and tips, and a knowledge test. Access is via on online login. Each course takes between 30-45 mins to complete, with PDF completion certificate.

Thycotic Secret Server Cloud Privilege Access Management

Bytes Software Services

Thycotic Secret Server Cloud is an online password manager hosted in Azure, a highly secure, available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance. bsscloud

Microsoft Enterprise Mobility + Security E3

BIST Group

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics

IRIS Intelligence: Enterprise Risk Management (ERM) Software

IRIS Intelligence Ltd.

IRIS Enterprise Risk Management Software helps organisations assess enterprise-wide risks and manage them more effectively. It facilitates increased risk identification, ensures assessment consistency, tracks mitigation action progress and delivers timely, customised reports to Management. IRIS-ERM is a highly flexible system with tailored customer processes, and ISO31000, ISO27001 and COSO support.

Osirium Privileged Access Management (PAM / PxM)

ITHealth Ltd

Osirium’s PxM suite provides Privileged Access Management & Task Automation to protect your IT infrastructure, cloud services and critical assets. By separating users from privileged credentials Osirium enforces a " least privilege" policy which controls, monitors and audits authorised employees and third-party access.

Leidos CHECK IT Health Check Services

Leidos Innovations UK Limited

Check (ITHC) services in line with NCSC (formerly CESG) requirements through partnership with trusted suppliers holding CHECK, CREST and PCI DSS accreditation. Leidos provides analysis of systems and networks to identify vulnerabilities, provide daily management throughout the engagement and detailed reporting with remediation actions upon completion.

Symantec's Cloud Access Security Broker (C.A.S.B)

Gradian Systems Ltd

Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

Computacenter - VMware Workspace One

Computacenter (UK) Ltd

Computacenter provides VMware Workspace ONE - a secure enterprise platform delivering and managing any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

Inoapps Subcontractor Management Cloud

INOAPPS LIMITED

Subcontractor Management Cloud delivers an end-to-end process in a single, fully integrated Cloud solution. The application is based on 10+ years’ experience of Oracle applications and technology. Our team also drew on its extensive Engineering & Construction sector experience to develop the application.

Symantec's Endpoint Protection with Cyber Defence Manager

Gradian Systems Ltd

Symantec Endpoint Protection 15 defines cloud-delivered endpoint security with multilayered defense, simplified single agent/single console management with AI-guided policy updates, and the broadest set of integrations available.

Event Management

SureCloud Limited

SureCloud Event Management SureCloud’s SIEM solution collects and normalises event data from network devices, computers and applications, at which point a sophisticated rules engine identifies key events such as threats, unusual user activity or system and network problems.

SBL Forcepoint Advanced Malware Detection (AMD)

Software Box Limited (SBL)

Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

Speech Analytics for Police

Business Systems (UK) Ltd

Speech Analytics solutions from Business Systems, to manage and analyse multi-channel interactions including audio, email and chat. With 30 years' Speech and Interaction Analytics experience, we offer full consultancy, project management, implementation and support services to deliver best fit Speech Analytics solutions to police forces.

Splunk Software

apto solutions limited

Apto provide SaaS for Splunk that monitors and analyzes machine data from any source to deliver Operational Intelligence to optimize your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs. We only provide Splunk Accredited Consultants to deliver this service.

Microsoft Exchange Online Protection

Bytes Software Services

Exchange Online Protection protects your cloud based or on-premises email with anti-spam and anti-malware protection. Financially backed SLAs and 99.999% network uptime, including protection of 100% of know viruses and 99% of spam. Reporting and message trace capabilities. Policy based filtering. bsscloud

Cloud Data Secure

Nowcomm Limited

Secure your preferred cloud eco system with an enterprise class cloud access security broker (CASB).

Idaptive Multi Factor Authentication

Avari Solutions

Bolster Adaptive Security with Multi-Factor Authentication Everywhere Strengthen security with context and behavior-based access controls all applications. Leverage analytics and machine learning to detect abnormal and risky user behavior while prompting an MFA challenge or blocking access in real-time. Improve security with seamless and scalable access tailored to each individual.

Strata Insight

STRATA SECURITY SOLUTIONS LIMITED

Strata Insight provides single view of the cyber security and compliance of your ICT estate across both on-premises and cloud environments. It presents this view against your chosen risk or control framework providing you a view of your business risks and the technical issues they stem from.

Leidos Cloud IT Health Check Services

Leidos Innovations UK Limited

Leidos offers Cloud Health Check services to provide a holistic review of IT services and applications, assessing configuration, performance, security and scalability of cloud infrastructure. Our expert engineers/consultants work with you to determine scope, pain points, concerns and expected outcomes, followed by detailed discovery exercises, reporting and action plans.

Prolinx Hosted Platform (PHP) - Security Incident and Event Management (SIEM) as a Service

Prolinx Ltd

SIEM as a Service from Prolinx provides 24/7 proactive management for your operational business. Reducing risks associated with today’s complex Cyber threat landscape. This service is tailored to meet your organisational requirements, available across all security classifications, Prolinx use an approved product with highly experienced security cleared staff.

Cloud Workload Assurance

Symantec (UK) Ltd

• Cloud Workload Assurance is a cloud security posture management solution for public cloud infrastructure-as-a-service (IaaS) platforms, including AWS, Microsoft Azure and Google • Cloud-native, API-driven service provides continuous security monitoring and compliance checking; deploys in minutes

'Platform' Infrastructure Security Dashboard and Automated Operational Toolkit

Ethical Services Group

Infrastructure Security Dashboard and Automated Operational Toolkit. 'Platform' automatically connects and profiles any infrastructure and application environment regardless of the environment to deliver Audit, Discovery, Scheduling, Reporting, Governance and Operational functionality, OS, COTS patching, anti-virus and firmware security updates. Dashboard, APIs and reporting metrics are easily configured to meet need.

Barrier Networks Managed Security Information and Event Management (SIEM)

Barrier Networks

Our Managed SIEM Service provides customers with first-class security expertise, advanced threat intelligence, efficiency and automation. Our cyber security experts are well placed to manage the system effectively ensuring that security incidents and breaches are handled swiftly and accordingly.

SecureAuth Multifactor Authentication & Identity Protection

Cloud Digital Limited

SecureAuth IdP provides multiple silent risk checks and evaluates credentials and innovative ways to defeat MFA methods “riskiness” of every access request. This adaptive authentication enables you to allow access for low risk requests without a MFA step, require MFA for medium risk and deny or redirect for high risk.

Microsoft Office 365 Enterprise E5 Suite

Bytes Software Services

E3 (Office apps and Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management) Phone System call management, PSTN-Conferencing, Business Intelligence, PowerBI-Pro, Delve Analytics, Personal-Org Analytics, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery. bsscloud

CAST Application Intelligence Platform

CAST Software LTD

CAST helps identify and eliminate software related issues that disrupt their business. To do this, we employ system-level analysis that finds the critical issues undetected by traditional QA methods. At CAST, we operate on the foundation that fact-based analysis introduces and maintains managerial visibility, safety, predictability and higher productivity.

Core Impact Automated Penetration Testing

Cloud Digital Limited

Core Impact enables safe, easy, and cost-effective penetration testing. Point and click and users can safely exploit vulnerabilities within their network, replicating the kind of access an intruder could achieve. Core Impact helps users prioritise remediation, validate information security and accurately evaluate the effectiveness of IDS and IPS etc.

Barrier Networks Secure Data Workflow (OPSWAT MetaAccess)

Barrier Networks

MetaAccess prevents risky devices from accessing local networks and cloud applications such as Office 365, Salesforce and Dropbox. Using OPSWAT’s industry-leading endpoint security and advanced threat prevention technologies, MetaAccess performs extensive security and compliance checks as well as remediation before allowing devices to access corporate data.

Academic Research, Education and Advisory Service (AREAS)

Research Series Limited

Our research and development team provide training (in-house and custom) in scholarly, systematic and innovative research on computational intelligence, cyber security, computer network security, enterprise architecture, security operations centres, information assurance and risk management & research methods. The team has published a number of notable articles, journals and books.

Hortor Limited Cloud Application Security Software Services

Hortor Limited

Hortor Limited provides a full set of Cloud Software Application Security Services, including scoping, UI, data import/export, application analytics/ scaling, in-transit/operational/staff security/asset protection, availability/resilience, identity/authentication support in a secure, certified and documented way, training/demonstrations as required, and ongoing support of products it builds along with its partners'/other selected products.

SBL Imperva Incapsula

Software Box Limited (SBL)

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Proofpoint Threat Protection Suite & Continuity

BSI Cybersecurity and Information Resilience (Ireland) Ltd

Proofpoint Email Protection stops malware and non-malware threats and granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats never-before-seen attacks that use malicious attachments and URLs. Business continuity keeps email flowing, even when your email fails such as Office 365.

Imperva SecureSphere Cloud WAF

Brookcourt Solutions

SecureSphere Web Application Firewall (WAF) for AWS & Azure provides the industry’s leading WAF technology to protect web apps. It combines multiple defences to accurately pinpoint and block attacks without blocking your citizens and partners.

Cloud VPN as a Service

Viewdeck Consulting Limited

A secure software-based VPN Service for mobile, laptop, desktops and servers across environments, zones. Secure, scalable service, suitable for deploying to the Cloud and joining legacy sites, users and data centres. Providing resilient connectivity remote clients to services hosted within a secure zone. Police, Education, Local Government, NHS Client base.

Board Portal

Admincontrol AS

Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.

Sophos Central Endpoint Advance

Caretower Ltd.

Sophos Central Endpoint Advanced (CEA) is a security agent running on each computer, managed by a Cloud Software control + report interface (Sophos Central). Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation, Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

Imperva SecureSphere Cloud WAF

Truststream Security Solutions

SecureSphere Web Application Firewall (WAF) for AWS & Azure provides the industry’s leading WAF technology to protect web apps. It combines multiple defences to accurately pinpoint and block attacks without blocking your citizens and partners.

Web and Mobile application development

Mars Spiders

Mars Spiders software and consultancy services with specialised knowledge of web & mobile applications and information systems. Using Agile methodologies to provide discovery, design, development, support and migration of cloud-based solutions. Expertise: .NET, C# , Core Java, iOS, Android, Technical Architecture, AWS & Azure, React JS, HTML5,PHP, NPM, Node JS.

Regulatory Change Management

HighQ

Maximise value with efficient, end-to-end contract lifecycles. Managing reg change need not be a brake on doing business. With HighQ you can keep moving forward, confident in the knowledge they’re making the right moves.

Evidence Manager A/V

i2N Ltd

Evidence Manager is a Case, Document and Media Management Solution that stores digital material in a secure cloud environment. Evidence Manager includes powerful and sophisticated bundling, case preparation and presentation tools. Evidence Manager A/V also includes the Audio-Visual Equipment (including Screens) for presentation in courts, tribunals or auditoria.

Microsoft Enterprise Mobility + Security E3

Insight

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics. See https://products.office.com/en-gb/secure-productive-enterprise

IAM (Identity & Access Management)

Sitekit Systems Limited

Sitekit IAM platform delivers identity and access management capabilities for authority staff, partners or citizens, supporting appropriate access to digital services / applications.

Crises Control Critical Mass Notification & Incident Management Platform

crises control ltd

Crises Control is a Global Mass Notification & Incident Management platform that enables you to co-ordinate your response to incidents of any nature and communicate to your audience, with a touch of your screen or via automation. Additional features include Task Manager, SOS tracking and emergency button, BCM plan builder.

SBL Forcepoint Cloud Access Security Broker (CASB)

Software Box Limited (SBL)

Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables csutomers to overcome compliance and. Information assurance restrictions on using the Cloud.

LastLine Defender

Avatu Ltd

The first native cloud security solution that delivers unmatched visibility of advanced threats in both your external and internal public cloud traffic in AWS. Secure your public cloud workloads against a range of threats: Incoming attacks targeting your servers, Misconfigured servers, Lateral movement of attackers, Unauthorized logins and data downloads

Becrypt Security Operations Centre

Becrypt Ltd

Data is ubiquitous, employees are mobile and the nature and frequency of threats is constantly evolving. To support organisations in the proactive identification of threats, and to help defend against cyber-attacks Becrypt have developed a Security Operations Centre.

Managed Website Protection

Jisc Services Ltd

The Jisc Managed Website Protection service, based on Imperva Incapsula, provides a cloud-based platform that provides enterprise-grade website security, performance and availability. The service includes best-of-breed WAF; comprehensive DDoS protection; global CDN and an application level load balancer, which are available as standalone services or as an integrated solution.

TISCreport Compliance Data Services

Nameless Media Group Ltd

For organisations wishing to monitor the compliance of their supply chain, we offer supply chain compliance assessment services through the tiscreport.org platform.

Hotdesk Performance Monitoring/Usage Analytics, Defend Against Insider Threat

adappt

Solution for many Hotdesk problems. Part of the KnowYourDay family of software . Defend your organisation from insider-threat/cyber-threat. Improve hotdesk efficiency. Auto classify hotdesk use based on team/department, monitoring file movement and protecting sensitive documents. Helps identify anomalous behaviour. AI Deep Learning Neural Networks enables analysis without capturing sensitive data.

Governance Risk & Compliance Software as a Service

MetricStream UK Limited

MetricStream provides a complete portfolio of enterprise Governance, Risk and Compliance (GRC) Applications in a SaaS model. This integrated approach leads to tremendous gains in enterprise-wide visibility of risks, strengthen compliance with multiple regulations, policies, and standards. Analytics, reporting and regulatory notifications enable you to minimize liability and optimize opportunities.

IRIS Intelligence Cyber Security Risk Management System

IRIS Intelligence Ltd.

The IRIS Cyber Security Risk Management System enables enterprises to proactively identify and manage threats and vulnerabilities concerning Cyber Security. The service facilitates collaboration of IT and Business units in managing Cyber Security risks. The service can be used to integrate best practices and policies from NIST and NCSC.

Black Duck

Softcat Limited

Black Duck discovers and manages the risks associated with using Open Source software, specifically around security vulnerabilities and Open Source licenses.

CT-100 Cyber Essentials

Crystal Thinking (Crystal Marketing Limited)

The purpose of the service is continual cyber risk management, providing; 1. Continual alignment with the Cyber Essentials framework, reporting vulnerabilities and secure configuration issues for all Windows & Linux servers and user devices. 2. Pre-preparation of IT infrastructure for streamlined Cyber Essentials assessments & renewals.

Website Security Testing

Borwell

This is a Cloud based security testing service. It allows us to test an organisation’s website for SQLi vulnerabilities, Cross Site Scripting (XSS) vulnerabilities and test for defacement. It is a fully automated scan.

Sandblast Mobile

Phoenix Software Ltd

SandBlast Mobile provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats against both mobile devices and data upon these devices before any damage can be caused.

Micro Segmentation

Axial Systems Limited

A solid foundation for workload protection and compliance is isolation and segmentation of network applications and their components. Micro-segmentation solution enables deep application dependencies mapping and policy enforcement ensuring an ongoing management process of your micro-segmentation policy. Our solution delivers the industry’s most complete and flexible solution for micro-segmentation.

Forcepoint Email Security

Bytes Software Services

Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks. bsscloud

Aquilai - Email Cyber Security

Grad Technologies Ltd

The first enterprise class solution for phishing that has been guided by UK Government and Cyber Intelligence agencies. Highly effective phishing solution, optimised for current and evolving newer threats.Detects zero day attacks for all phishing exploits. User friendly warning banners are inserted into the body of the email.

Azure Active Directory P1

Akhter Computers PLC

A full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management, role based access control, application usage monitoring, rich auditing and security monitoring and alerting

Microsoft Office 365 Subscription Purchase

MTI Technology Ltd

As a Microsoft CSP partner, MTI can enable customers to purchase Office 365 licences via the CSP programme to provide flexible billing and services

Splunk Enterprise

Softcat Limited

Splunk Enterprise monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, Splunk Enterprise is a flexible platform that scales from focused use cases to an enterprise-wide analytics backbone.

Pentesec Radware Cloud WAF (Web Application Firewall)

Pentesec Ltd

The Service offers protection from application-level web attacks. The Service automatically detects application domains, analyzes potential vulnerabilities and assigns optimal protection. The Service uses DNS to divert traffic towards the supplier’s Cloud and also includes DDoS Protection to 1Gbps in all packages, extended DDoS Protection is available as an option.

Secure Web Based Map Service

Viewdeck Consulting Limited

Secure Open Street Mapping (OSM) service providing UK, EU and global maps to digital web and mobile applications. Digital productivity aide. Cost effective, web-connected or isolated secure solution providing mapping for applications. Includes regular map updates and ability to update/augment or enhance with your own data. Local Government, Police, Education.

Cloudera Enterprise Data Hub

Cloudera, Inc.

Cloudera Enterprise software enables an Enterprise Data Hub – a scalable platform to store and analyse all your data. It includes CDH, the world’s most popular open source Hadoop-based platform, advanced system management and data management tools plus support and community advocacy from our Hadoop developers and experts.