Search results

744 results found in Cloud software in the category Secure content and threat management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
744 results found

Cloudera Enterprise Data Hub

Cloudera, Inc.

Cloudera Enterprise software enables an Enterprise Data Hub – a scalable platform to store and analyse all your data. It includes CDH, the world’s most popular open source Hadoop-based platform, advanced system management and data management tools plus support and community advocacy from our Hadoop developers and experts.

Imperva Incapsula

Brookcourt Solutions

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Cybereason - Third Generation Cyber-Security End-Point Protection and Detection Software

AiM Ltd

Cybereason is a third generation cyber security platform that uses AI to not only protect and detect cyber breaches, but to also predict and report vulnerabilities The platform incorporates the Cybereason Hunting Engine using advanced statistical analysis and behavioural analysis to detect (in real time) the widest range of attacks.

e-Share - Data Privacy, Data Protection and Secure Collaboration

Grad Technologies Ltd

E-Share encrypts data on the client side when using public cloud platforms such as O365, GoogleDrive, Dropbox, Box, Microsoft Teams or Slack. Sender can set graular permissions such as setting a time limit for how long data can be seen for. This mitigates against data being lost on third-party servers.

Virtual Cyber Security Operations Centre (vSOC)

Research Series Limited

vSOC service is designed to support organisations requirement for Cyber Security & Security Monitoring. Allowing for requirements gathering, design, handover and training of staff to operate the Cyber security operations centre. The vSOC service – CSOCs, SSOCs, SIEM allows protective monitoring logs, threat intelligence feeds, CERT and vulnerability information fusion.

iovation FraudForce

TransUnion

iovation FraudForce detects fraudulent behavior across all internet devices. When a user interacts with a site, iovation recognises and assesses risk factors for the device, including associations with fraud. iovation evaluates the interaction according to business rules subscribers have defined, returning an "Allow", "Review", or "Deny" result for the transaction.

'EPAS' User Password Analytics, policy enforcement and quality assurance

PalisadeSECURE Ltd

EPAS is designed to automatically perform scheduled powerful password attack simulations in a highly secure and tamperproof environment, numerically measuring the resilience of each password versus potential attacks, and using this data to engage security team end users to create truly resilient passwords across the organisation

Azure Information Protection

Civica UK Limited

Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data. Via Civica. See http://www.microsoft.com/en-us/cloud-platform/azure-information-protection-features

Website design & build

Createful Ltd

We specialise in the design and development, support and maintenance of open source CMS driven websites. Our user centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop and deliver on time and within budget. All work undertaken from our studio in Bournemouth, Dorset.

ServiceNow

Fujitsu Services Limited

ServiceNow offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades

Malflare

Longhorn Consulting

Malflare scans and detect threats in files uploaded by your users. Malflare provides a REST API that integrates with your websites and digital services. Sign-up quickly and easily for a free, fully functional 30-day trial

Stone Microsoft 365 Licensing Services

Stone Computers Limited

Microsoft 365 license procurement with licensing and product consultation. A complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely.

Avast Endpoint and Network Security Solutions

Avast Business

An easy-to-use cloud or on-premise platform accessible from anywhere with any device to quickly deploy Avast Business Antivirus products to multiple endpoints, provide continuous monitoring, and get the insight needed to deliver superior protection with in-depth reports, easy maintenance and real-time notifications,

Application Design and Development

Pulsion Technology Limited

We provide application design and development services which transform the user experience and integrate with your existing business systems. Our application design and development solutions are built using open source, PHP and Microsoft technologies, and are delivered using various methodologies to meet your design and development requirements.

VMware Workspace ONE

Phoenix Software Ltd

VMware Workspace ONE is the secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

Microsoft SharePoint Electronic Document and Records Management (EDRM)

TECHNOLOGY SERVICES GROUP

TSG have successful experience delivering EDRM projects using Microsoft SharePoint. Electronic document and records management solutions are designed to store documents & records using associated metadata, which is then categorised within a classification scheme and enabled for search optimisation for all users to retrieve records.

Intelligent Automation and Service Management - Intuition

Celerity Limited

Intuition provides end-to-end visibility of your IT infrastructure and business services via a single pane view. The tools perform initial discovery to build an inventory of all elements with intelligent automation, provisioning, updating, patching, alerting and reacting to events to prevent service disruption.

Amazon WorkSpaces Application Manager

Amazon Web Services UK Branch

Amazon WorkSpaces Application Manager (Amazon WAM) offers a fast, flexible, and secure way for you to deploy and manage applications for Amazon WorkSpaces. Amazon WAM accelerates software deployment, upgrades, patching, and retirement by packaging Microsoft Windows desktop applications into virtualized application containers.

Zscaler Security from BT

BT PLC

Zscaler cloud security provides an architectural approach to secure IT transformation, in which software-defined policies, not networks, securely connect the right user to the right app or service. It provides real-time scanning of inbound/outbound web traffic from all users with comprehensive security, access control and data leakage prevention services.

Barracuda

Complete IT Systems

Barracuda Networks: IT Security & Data Protection Solutions

Cyber Simulation Training Service

SecureCloud+ Limited

Cyber Simulation Training Service is available at OFFICIAL with a handling caveat of SENSITIVE,MISSION SECRET,TOP SECRET provides a next generation gaming platform to practice skills and hone tactics. Artificial intelligence combined with virtual machine orchestration converts rapidly real-time threat intelligence into new missions within in an immersive environment.

Secure Code Development SaaS Training

Capgemini UK plc

Cloud-based platform that can provide fun gamified learning for developers to write secure code. Capgemini’s online service can offer interactive training, assessments, real-time code coaching and tournaments to help drive culture change, engage and train developers to improve their secure coding skills, gain real-time advice and monitor skill development.

Forcepoint Cloud Access Security Broker

Bytes Software Services

Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the. bsscloud

iovation ClearKey

TransUnion

iovation's ClearKey service enables you to register devices with your user's accounts and later verify that users are logging in from the same devices. You can use the devices themselves as additional factors of authentication, in turn eliminating high-friction authentication steps. ClearKey includes iovation business rules, APIs, and reports.

Microsoft Enterprise Mobility + Security E5

BIST Group

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security

Secure Browse Service

SecureCloud+ Limited

Secure Browse service provides safe remote browsing from/across classified government networks including Internet, RLI, SLI, PSN, N3, GCF and Coalition Partner Gateways. This service allows information to be safely ingested into a native desktop and shared, viewed or stored for later retrieval providing cross domain interoperability.

Citrix Workspace Services

Coffee Cup Solutions

Coffee Cup Solutions are one of the UK's leading Cloud and Virtualisation service providers. We offer a wide range of technology and services with a proficiency around Citrix technologies including Citrix Digital Workspace, Networking and Analytics.

Workspace ONE - Enterprise Mobility Management - UEM - Workspace ONE (Airwatch)

Nine23

Mobility management provided as a service using VMWare Workspace ONE/Airwatch/MDM software. Deployed on-prem, from VMWare/Airwatch cloud, FLEX private cloud and managed as a service for you to administer devices from a single console, or have the service fully managed for you. App Store,PSN remote working, EMM migration. UK Hosted Offical-sensitive

Microsoft Office 365

Avoira Ltd

Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today. By combining best-in-class apps like Excel and Outlook with powerful cloud services like OneDrive and Microsoft Teams, Office 365 lets anyone create and share anywhere on any device.

Sophos Central Intercept-X

Caretower Ltd.

Cloud-managed Next-Generation Endpoint Security providing Exploit Prevention technology, Ransomware Protection + Recovery, Sophos Clean (Advanced Remediation + restoration) as well as Sophos Root Cause Analysis to provide detail source of infection information + visualisation

IBM Security Guardium Analyzer Database Classification for GDPR

IBM United Kingdom Ltd

Guardium helps organisations efficiently identify the risk associated with personal and sensitive personal data that falls under the E.U.'s General Data Protection Regulation (GDPR). The service applies next generation data classification, as well as vulnerability scanning, to uncover risks associated with such data in cloud based and on premise databases.

CDW iboss Cloud Secure Web Gateway - Core

CDW Limited

iboss is a cloud based Secure Web Gateway platform, utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances & maintains 100% dedicated IP address space in the cloud. This allows PDNS intergration, admin created GDPR Zones with dedicated UK-datacentres.  Includes Core Filtering, Malware detection and Data-Loss-Prevention

iboss Cloud Secure Web Gateway - Core

Axians Networks Limited

iboss is a cloud based Secure Web Gateway platform.  iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres.

Check Point Capsule Cloud

Phoenix Software Ltd

Check Point Capsule Cloud solves security dilemmas by using a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.

Password Compliance as a Service

CyberWhite Limited

The Authlogics solution improves password security making it easier for users to access information whilst ensuring passwords are NIST SP800-63 compliant. Authlogics also provides Multi-Factor Authentication technologies with 100% offline functionality. Authlogics can also transition you away from passwords to remove the problem entirely, further increasing your security posture.

Valimail Enforce

Gradian Systems Ltd

A typical enterprise has 30 to 50 applications sending emails. With no means to authoritatively identify the sender, anyone can easily impersonate these emails. Valimail is the only fully automated, FedRAMP-authorized DMARC anti-phishing solution that provides an authoritative approach to eliminating deception-based email attacks, including BEC.

Cloud Threat Monitor and Protect

Nowcomm Limited

This system collects and analyses NetFlow from your routers, switches, and firewalls. It then delivers comprehensive visibility at the network core, edge, data centre, and cloud. With the combination of network visibility and security context, you can detect threats faster and more comprehensively.

Varonis

Tectrade

Tectrade provide data security and analytics, working with Varonis who specialise in software for data security, governance, compliance, classification, and analytics. Detection of insider threat and cyberattacks to prevent attacks such as ransomware. Tectrade then provides support in terms of zero-day recovery from ransomware providing an end-to-end security solution.

Idaptive Mac & PC Management Service

Avari Solutions

Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

Microsoft Cloud App Security

Insight

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Cloud Managed Advanced Endpoint Protection / Antivirus (Sophos)

NOC365 LTD

Sophos Central Endpoint Advanced (CEA) is a security agent running on each computer, managed by a Cloud Software control + report interface (Sophos Central). Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation, Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.

CenturyLink Adaptive Network Security

CenturyLink Communications UK Limited

Adaptive Network Security is a network based firewall solution. You can choose to deploy services against any number of the 31 gateways deployed globally to build private and public network connectivity for both internal and external users. It minimises complexity by centralising your security functions without sacrificing performance.

Trend Micro InterScan Web Security

MTI Technology Ltd

MTI's InterScan Web Security as a Service is based on Trend Micro and dynamically protects against cyber threats in the cloud, before they reach your users or network. It also delivers real-time visibility and control of employee Internet usage.

Azure Active Directory P2

Akhter Computers PLC

A full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management, role based access control, application usage monitoring, rich auditing and security monitoring and alerting. See https://www.microsoft.com/en-us/cloud-platform/azure-active-directory-features

CyberArk CorePAS Privileged Access Management (PAM)

Armadillo Managed Services

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

Symantec Email Security.cloud (ESS)

Caretower Ltd.

Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data.

BMC Helix Discovery

Fusion Business Solutions

BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.

IAM Cloud

IAM Technology Group Limited

IAM Cloud is a cloud-based identity and access management platform that helps organisations to manage the access and security of their users and the cloud. IAM Cloud also has a cloud storage integration system 'Cloud Drive Mapper', and a cloud migration software service.

Barrier Networks Secure Data Workflow (OPSWAT MetaDefender)

Barrier Networks

MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.

Microsoft Enterprise Mobility + Security E5

Insight

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

Cyber Security Education Training and Services

Templar Executives

Award winning, international SME providing holistic Cyber Security consultancy to governments/private sector. Services include Strategy; Board-level engagement; Competency development; GCHQ Certified Training/eLearning for NEDS, Boards, SIROs, CISOs, IAOs, Clinical roles, Cyber Security Awareness, GDPR, NISD; Business/Threat Intelligence; Audits; Incident Response; Red Teaming; Technical and Policy Reviews; Cyber resilience development.

Viewdeck Single View of Data as a Service

Viewdeck Consulting Limited

Providing a single view of data sets, via open source componentry, from a variety of sources enabling information analysis across a variety of databases, including legacy. Delivering unprecedented levels of analysis and visualisation capability to identify trends and patterns in the data. Police, Education, Local Government, NHS Client base.

Barracuda CloudGen Firewall - AWS & Azure

Softcat Limited

Barracuda's Cloud Generation Firewalls redefines the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, helps organizations transform their business. Suitable for deployment in Azure, AWS & Google Cloud environments.

Symantec Web Isolation

Bytes Software Services

Symantec Web Isolation cloud service provides an isolation layer that protects users from threats from uncategorized websites or URLs with potentially unsafe risk profiles. Web isolation eliminates web threats and solves the challenge of providing secured access to the uncategorized and potentially risky web. bsscloud

Gemini Enterprise - Autonomous Data Cloud

Converging Data

Gemini Enterprise enables data availability across all enterprise data so that AI can be used across diverse data sets. It understands the complexity of underlying data silos, so you don’t have to, allowing you to focus on data analysis, including AI and ML.

CDW VMware Workspace ONE

CDW Limited

VMware Workspace ONE is the secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

Microsoft Cloud Software Subscriptions

Pygmalion Solutions Ltd

Provision of subscriptions for the full range of Microsoft cloud software and services

Digital Doorman

Worldline

With Digital Doorman, sensitive environments (factories / industrial sites) benefit from the new generation of Digital Services. A connectivity hub, Digital Doorman allows the production manager or plant IT to easily and securely manage all remote users and IoT/analytics platforms; maintaining full transparency and control over accessed data and machines.

LastLine Analyst

Avatu Ltd

A SaaS platform for any suspicious file (email attachment, download, etc...) to be manually submitted to an online portal. This portal will execute/open the file in a sandbox environment and monitor and examine the file's behaviour. Intelligence on the file behaviour, payload, origin and risk are then reported.

Idaptive App Access Service

Avari Solutions

Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

Web Collaboration and Wiki Service

Viewdeck Consulting Limited

A collaboration, Wiki, and enterprise project website ideal for intranets, extranets or cross organisational working. The power of the Wiki allows teams to share content across domains and locations in a flexible secure way. Ideal for developing portals to existing applications. Increasing productivity. Police, Education, Local Government, Health.

CDW Proofpoint Security Awareness Training

CDW Limited

Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

Cloud Search Platform

Google

Cloud Search Platform enables companies to quickly, easily and securely search for information across their business. Cloud Search utilizes machine learning to bring instant query suggestions and surface the most relevant results across different content systems — in over 100 different languages.

Automation, Continuous Delivery and Integration Services

Viewdeck Consulting Limited

Technical Design, Project Management and strategic delivery of CI/CD and Automation capabilities using DevOps for Cloud and ICT transformation. Helping simplify and reduce your development and infrastructure pipelines, through automated build, virtualisation and DevOps. Reduce your change delivery costs. Implementing Continuous Delivery, and Continuous Deployment in Cloud services.

Domain Tools

Brookcourt Solutions

DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.

Safenet Authentication Service from Gemalto

MTI Technology Ltd

MTI provide robust cloud based authentication services with the Gemalto Safenet Authentication Service. The service delivers fully automated str​ong Two-Factor Authentication from the cloud, enabling organisations to protect cloud-based and on-premises applications, from any device with user-friendly hardware and software / mobile application 2FA & MFA token options.

Idaptive Identity Platform

Avari Solutions

Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

MarkLogic Enterprise NoSQL Database Server (UK Government Edition)

MarkLogic Corporation

MarkLogic Server (inc. Semantics Search + Advanced. Security + Tier Storage + X-Query + XA Trans. + Advanced Geospatial) is the only Enterprise NoSQL database delivering a unified software platform/database with built-in search/alerting & integrated application services. MarkLogic's XML/RDF-centric, schema-agnostic, No-ETL, secure, ACID-compliant, real-time, mission-critical, enterprise-scalable, data-management solutions.

'Platform' Infrastructure Security Dashboard and Automated Operational Toolkit

PalisadeSECURE Ltd

Infrastructure Security Dashboard and Automated Operational Toolkit. 'Platform' automatically connects and profiles any infrastructure and application environment regardless of the environment to deliver Audit, Discovery, Scheduling, Reporting, Governance and Operational functionality, OS, COTS patching, anti-virus and firmware security updates. Dashboard, APIs and reporting metrics are easily configured to meet need.

Forcepoint Next Generation Firewall (NGFW)

Sapphire

"Forcepoint Next Generation Firewall (NGFW) - Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware. Immediately see and understand what’s happening in networks with an interactive, visual interface"

Symantec Endpoint Protection Cloud (SEP Cloud)

Caretower Ltd.

Symantec Endpoint Protection Cloud (SEP Cloud) is an easy to use security-as-a-service that protects and manages PC, Mac, mobile devices and servers from a single console,making it the ideal solution for organizations with limited IT security resources

AppCheck-NG Vulnerability Scanning as a Service

CyberWhite Limited

AppCheck is a leading cloud web application and external infrastructure vulnerability scanner built by CHECK and Crest accredited Penetration Testers. AppCheck NG deploys both lexical and browser based analysis of each assessed application component to ensure modern JavaScript heavy and Flash based applications are fully explored for vulnerabilities.

Forcepoint User Entity Behaviour Analytics (UEBA)

NETconnection System Ltd

EUBA enables security teams to proactively monitor for high risk behaviour inside the enterprise. The security analytics platform provides unparalleled context by fusing structured and unstructured data to identify and disrupt malicious, compromised, and negligent users uncovering critical problems such as compromised accounts, corporate espionage, intellectual property theft and fraud.

Sophos

Complete IT Systems

Centralize Your Network Security with Sophos. Next-Gen Endpoint Security with Advanced Threat Prevention, Always-On Encryption, UTM Firewall Appliances, Mobile Management, Web and Email Gateway Appliances, Wireless Access Points, Server Virtualization and Network Scanning for Ransomware

CDW iboss Cloud Secure Web Gateway - Core & Malware Detection

CDW Limited

iboss is a cloud based Secure Web Gateway platform, utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances & maintains 100% dedicated IP address space in the cloud. This allows PDNS intergration, admin created GDPR Zones with dedicated UK-datacentres. Includes Core Filtering, Malware detection and Data-Loss-Prevention

Security Information and Event Management (SIEM) as a Service

Managed Enterprise Technologies Ltd

The CYBERShark Service utilises BlackStratus proven Security Incident Event Management (SIEM) technology to collect and analyse data generated from a Buyer’s IT infrastructure. True multi-tenancy delivers the ability to segregate log information contained in a single, shared database and report against; customer, region, division, department or user-groups.

SOA Enterprise Message Service Bus (Message Orientated Middleware)

Viewdeck Consulting Limited

Enterprise scale ESB solution for non-stop mission critical messaging. Supporting Apache ServiceMix or RabbitMQ, provides reliable messaging across applications and environments. Wide range of protocols and SOA patterns, delivers scalable, distributed application processing, and system integration to join your legacy, hybrid and cloud solutions together. AWS, Azure, UKCloud.

Dark Web Stolen Credentials Monitoring

Wem Technology Ltd

Dark Web Internet Credentials monitoring with a comprehensive policy and compliance report as part of your protective monitoring obligations. Identify compromised login credentials that can be used to exploit employees and networks. Focuses on real threats. Automate security, fraud and incident response.

Infreemation - Incidents

Digital Interactive Ltd

Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents

DMARC Processing and Visualisation

Netcraft

DMARC is part of a portfolio of tools recommended by the NCSC that improves email security and can prevent your domains being spoofed. Netcraft’s DMARC service will provide the information you need to confidently move to a reject policy to prevent abuse, whilst not interfering with legitimate mail delivery.

Virtualised Vulnerability Scanner

Viewdeck Consulting Limited

Cloud based Vulnerability Scanner as a Service provides ongoing comprehensive and powerful penetration testing/ITHC and vulnerability management solution. Includes subscription to live network and application tests. Virtualised security assessment appliance that you can run to ensure ongoing compliance and hardening of services.

Mvine for Cyber-Secure Collaboration Portal

Mvine Limited

Mvine for Cyber-Secure Collaboration Portal helps connect people, content and processes – across multiple departments, organisations and applications. Cloud software for Central and Local Government, and Devolved Administrations aligning their digital services to the Government Transformation Strategy. Available today for procurement from the Digital Marketplace under G-Cloud 10 framework.

ProfileTailor™ Dynamics

Grey Monarch Limited

ProfileTailor™ Dynamics provides continuous security monitoring, audit and controls of your SAP systems. Cleanse authorizations, sensitive activity and Segregation of Duties (SoD) violations. Control SAP access. Detect potential fraud, data theft (GDPR) and cyber attack. Automate security processes such as Joiner, Mover, Leaver and Emergency Access.

Symantec Email Threat Isolation

Caretower Ltd.

Symantec Email Threat Isolation stops advanced email attacks by insulating users from spear phishing, credential theft, and ransomware attacks by isolating malicious links and downloads. It stops credential theft by rendering webpages in read-only mode by virtualizing browsers in a highly-scalable and secure, disposable container, creating a secure execution environment.

Barrier Networks Cloud Security for Symantec Information Protection (DLP & ICS)

Barrier Networks

Safeguard your most confidential data through secure access and keep your employees productive, wherever they are.

Lexis Diligence - Enhanced Due Diligence solution

LexisNexis

Lexis Diligence brings into one, simple online tool the intelligence to conduct global enhanced due diligence and comply with legislation for anti-money laundering (AML), anti-bribery & corruption (ABC). The solution enables checks on individual or company backgrounds (KYC), negative news, sanctions and politically exposed persons (PEPs) and company litigation history.

Forcepoint Email Security

Softcat Limited

Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.

Secure Application Server Service

Viewdeck Consulting Limited

Secure managed application hosting, providing management and delivery of an extensive range of native or 3rd party applications in a patched, secured, contained service. Supports a wide range of technologies under a fully configured DevOps environment, with integrated Monitoring, Event Management and Service Management Functions.

Unified Endpoint Management

Cloudtexo Ltd

Our proven service allows you to manage, secure and automate devices, apps (mobile & web) and data/content for Apple IOS, Google Android, MacOS & Windows 10. With security absolutely critical for a mobility first strategy, we deliver the ultimate value to every endpoint in your business.

WordPress CMS

Pulsion Technology Limited

We specialise in responsive website design, using the WordPress Content Management System (CMS). We create WordPress websites with a mobile first design strategy, ensuring a quality and consistent user experience on all platforms and devices. Our WordPress CMS experts will ensure your website is cost-effective, highly scalable and easily maintained.

Mimecast - Email Security, Targeted Threat Protection and Email Business Continuity Service

Six Degrees Technology Group Limited

Our Mimecast service extends traditional gateway security with Targeted Threat Protection that addresses ransomware, impersonation, spear-phishing and other advanced threats. Continuity keeps employees sending/ receiving email even if your email system or Office 365 exchange, has an outage. Our security services eliminates the infrastructure and management requirements for on-premises solutions.

OCTANE Web and API Monitoring

IB Boost

ORQAcloud and the Octane suite provides a rich platform for monitoring and managing your environments, APIs, services and web application functionality and performance. Use established metrics and templates, or develop or record and upload complex user scenarios, triggered or scheduled health checks of your services at all times.

Montvieux Managed Attribution Internet Access Service

Montvieux

The Montvieux Managed Attribution Internet Access Service provides users with the ability to control how they appear online, including the method of access and the footprint they leave. The Service is scalable, globally accessible, includes training and can be tailored to meet the specific demands of individual use cases.

Sophos Central Security Products

Levett Consultancy Ltd

Levett Consultancy provides the range of Sophos Central products, including; Sophos Central - Sophos XG Firewall & Wireless Products Sophos Endpoint, Encryption, Mobile 8, & Server. Sophos Phish Threat

BeyondTrust Secure Remote Support

Softcat Limited

BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.

Barrier Networks Broad Security Protection (Fortinet)

Barrier Networks

Fortinet Security Fabric is an architectural approach that unifies the security technologies deployed across the digital network, including multi-cloud, endpoints, email and web applications, and network access points, into a single security system integrated through a combination of open standards and a common operating system.

ThreatMetrix (TMX)

LexisNexis Risk Solutions

ThreatMetrix, a LexisNexis Risk Solutions Company, provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.

Microsoft Office 365 licenses and professional services

TECHNOLOGY SERVICES GROUP

TSG have successful experience delivering Office 365 projects. Office 365 is a cloud-based service that offers robust security, reliability, and user productivity. Office 365 includes Security & Compliance centre, Microsoft Office 2016, SharePoint, OneDrive, Teams, Flow, PowerApps, compliance and governance.

Cloud Managed Print Services UniPrint

Softstream Solutions Limited

As more and more organisations utilise the benefits of a cloud methodology, Softstream Solutions allows the print process to remain future proof as cloud and digital transformation of workflows are adopted. A Managed Print Service will enable cost saving, workflow optimisation and enhanced security for any organisation.

PCM UK Cisco Umbrella Services

PCM Technology Solutions UK Ltd

In the past, everything was contained within your network perimeter. Now, more happens off-network. These changes create new security challenges: • Malware and ransomware • Gaps in visibility and coverage • Cloud apps and shadow IT • Difficult to manage security