Search results

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
430 results found

430 results found in Cloud software in the category Security risk management

Save details of your search and download your search results.

Cybereason Endpoint Detection and Response with Nex-Gen AV

APPTechnology

APPtechnology provides Real Time Prevention & Detection of Cyber Attacks through Endpoint Protection technology and NGAV, covering; Prevention (NGAV & EDR) Detection (EDR) Response/Investigation Hunting A single software agent provides EDR and NGAV functionality managed through a single dashboard. Optional 24x7 SOC services covering Active Monitoring, Adversary Hunting, Advanced Analysis

Vendor Risk Management

DVV Solutions

Vendor Risk Management (VRM) - offers SaaS Software to automate, centrally manage, create a workflow process and remediate risk associated with supplier access to client data, networks or other use cases around the client-supplier relationship.

SBL Tenable.io

Software Box Limited (SBL)

A cloud-based vulnerability management solution

Microsoft Enterprise Mobility + Security E5

Insight

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

Secure Email Service

E-Share

A secure email service via an Outlook plugin. Encrypts all attachments and the body of the email. No restriction on file sizes. Links are sent to the recipient for them to access files in your cloud storage provider. Full real time auditing with revocation controls even after you hit send.

Alert Logic Cloud Defender

Cloudreach Europe Limited

Alert Logic Cloud Defender SaaS improves security visibility and compliance. 24x7 monitoring by security experts for network threat detection, log management, vulnerability assessment and web application protection. Providing continuous monitoring and actionable security intelligence protecting your data. This helps organisations achieve compliance, allowing critical teams to focus on security outcomes.

Modelworks®

D-RisQ Ltd.

Modelworks® uniquely applies Formal Methods mathematics to systems requirements to assess the stability of systems, show whether redundant functionality exists and ensure that systems will never deadlock. The technique will show where the actual behaviour of the design is not reflected in the requirements and also provide repeatable, objective evidence.

Protective Monitoring as a Service

Eduserv

Eduserv Protective Monitoring as a Service provides the setup, configuration and operation of log monitoring, event analysis and automated alerting in line with NCSC (formerly CESG) guidance. This secure cloud service eases the burden of PSN compliance and helps to meet the SIEM requirements for accrediting OFFICIAL systems.

Number Insight

Zensend

A method that ensuring numbers are active by checking that they are valid and connected. It allows users to look up network information for a mobile phone number.

BT Managed Email Security : Email Archive Features

BT PLC

The service offers easy, scalable and reliable control of Email Archiving, providing a single, rapid, searchable and secure email repository for end users. This includes a bulk upload feature for volume legacy email. The Discovery tool provides real-time iterative search capabilities, built-in collaborative eDiscovery workflow, and exports.

Board Portal

Admincontrol AS

Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.

BIGFONE Cloud Crisis Management

Azuronaut Limited

Bigfone is a business continuity and crisis management service. Hosted in Microsoft Azure, Bigfone is a Platform as a Service (PaaS) solution that integrates with Azure Active Directory to contact employees quickly in a crisis. Bigfone utilises best in class delivery services for email / SMS communication. https://bigfone.azuronaut.com/

Splunk Enterprise Security (SIEM)

Splunk Inc.

Splunk Enterprise Security is a SIEM that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information. It enables security teams to quickly detect and respond to attacks to simplify threat management while minimizing risk and safeguarding your business.

Zscaler Cloud Security Service

Truststream Security Solutions

Zscaler Cloud Security delivers user security as a service from the cloud, eliminating the cost and complexity of traditional secure web gateway approaches. By moving security to a globally distributed cloud, organisations can easily scale protection to all offices or users, regardless of location, and minimize network and appliance infrastructure.

Recycling of ICT, Telecomms & Cable to WEEE and EA Regulation Standards

Network 2 Supplies Ltd

N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.

Anomali Reports

Anomali Inc

Anomali Reports collects log data from security information and event management (SIEM) products and reads the data looking for five kinds of potential indicators of compromise (IOCs). The data is correlated against Anomali's vast library of known IOCs. Matches (true-positives) are pushed into SIEM analysis workflows as critical prioritized events.

McAfee Web Gateway Cloud Service

Bytes Software Services

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users. bsscloud

Over the Counter Payments

allpay Limited

allpay provides a comprehensive over-the-counter network payments service utilising more than 40,000 PayPoint and Post Office outlets and branches nationwide, providing organisations with daily transaction data via its secure cloud-based portal. Payments can be made via barcoded bill or plastic payment card.

Managed PKI in Microsoft Azure

Trustis

This is a high assurance, dedicated Microsoft PKI delivered as a managed service, hosted in Azure. With our Managed PKI in Azure you have a fully customised, high assurance solution with full control of your own cryptographic keys, managed from an ultra-secure, accredited facility in the UK.

USP Secure Entry Server® Cloud Appliance

United Security Providers UK Ltd

USP Secure Entry Server® is a comprehensive Web Access Management solution. An advanced WAF securing web applications and portals from cyber-attacks, uniquely combined with context based Multi-factor user-authentication, Web SSO and Federation. AWS images available for deployment within your Private Cloud, along with fully managed operational support, direct from USP.

Microsoft Advanced Threat Analytics

Civica UK Limited

Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline. Via Civica. See https://www.microsoft.com/en-gb/cloud-platform/advanced-threat-analytics

FOI Case Management

Blackthorn GRC Limited

This service can be used to handle enquiries from start-to-finish. Capture the method and type of enquiry, allocate tasks within teams, monitor the progress, and ensure the customer is satisfied. Record how the response was formulated, who was involved, and then report against the full lifecycle. UK hosted to IL2/OFFICIAL.

SailPoint IdentityNow - Cloud Identity Governance Service

Sailpoint

Cloud based Identity Governance solution from leading identity vendor, SailPoint. IdentityNow enables business friendly identity governance via access request, certification and effective provisioning and deprovisioning of joiners, movers and leavers, along with improved productivity and usability via Password Management capabilities. Patented Zero Knowledge Encryption security model.

Microsoft Secure Productive Enterprise E3

Bytes Software Services

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3 and Windows 10 Enterprise E3. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise bsscloud

Cloud Managed Print Service

Redshank IT Services Limited

Redshanks IT Services Ltd help customers gain control of their print estate and reduce costs by up to 40% utilising Cloud Managed Print Services (Print as a Service). Bringing transparency and predictability to print management achieves maximum benefits from print technology whilst streamlining document workflow and enhancing security.

McAfee Web Protection

Bytes Software Services

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users. bsscloud

Office 365 Enterprise Mobility + Security E5

SeeLogic Ltd

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

My1Login Enterprise Identity Management Solution

My1Login Ltd.

My1Login’s Identity & Access Management (IAM) solution enables organisations to manage access to applications for internal and external users. My1Login's a wholly UK-Based Identity Provider offering Single Sign-On (SSO) to web, mobile and thick-client, legacy applications, User Provisioning, Self-Service Password Reset, Privileged Password Management, Multi-Factor Authentication and Reporting underpinning compliance.

StatusToday

StatusToday

StatusToday is an AI-powered Insights Platform that understands human behaviour in the workplace, helping organisations improve security, productivity and communication. Combining state-of-the-art Machine Learning and Human Psychology, StatusToday’s patent-pending AI analyses employees’ activity metadata to deliver unparalleled operational visibility, map human threats and key behavior patterns internal to the organisation.

Microsoft Enterprise Mobility + Security E5

Gaia Technologies Plc

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

Access: One - Citizen Identity as a Service (IDaaS)

Pirean

Access: One's Citizen IDaaS offering provides an easy to configure and consume platform for Identity and Access Management services for providing secure access to Citizens for Digital Services. The service delivers GDS compliant capabilities for Registration, Authentication, Single Sign-On, Provisioning, Password Self-Service, Access Request, Delegated Administration, Strong Authentication and Reporting.

Texuna Identity Assurance & Access Management

Texuna

Identity Assurance and Access Management is an enterprise solution supporting mission-critical authentication and authorisation services, giving secure access to private and public cloud applications. Deliver Single Sign-On/Off via Shibboleth or OAuth2 for customers, partners, employees. Exchange attributes between integrated systems via SAML2. Active Directory integration and federation via open standards.

Docker Enterprise Edition Software Licences

Amazic

Docker Enterprise Edition (EE) is an secure, integrated, supported and certified container platform for CentOS, RHEL, Ubuntu, SLES, Oracle Linux & Windows Server 2016. Also for AWS, GCP and Azure. Deploy apps efficiently & effectively across diverse non homogeneous networks including third party cloud providers, hybrid cloud & private networks.

Professional Audio Conference Calls

Speakserve Limited

Speakserve offer an easy to use, highly reliable, secure and cost effective audio conference call service. Call Recording, archiving, transcription, and compliant analytics are included. Global access and high definition audio from any device allows you to deliver crystal clear conference calls for your important meetings.

Aerohive Manager NG

AIT Partnership Group Ltd

Aerohive Manager is a cloud-enabled SAAS WLAN management solution. Designed to manage Aerohive Access Points it also fully integrates with Dell switches. The software uses cooperative control technology to provide all the benefits of a controller-based wireless LAN solution, without requiring a controller or an overlay network.

Github for Business

Amazic

GitHub Enterprise is a version control/source control solution which combines the power and flexibility of GitHub with the security, administration, and control businesses need. With GitHub Enterprise, you can foster greater transparency and collaboration amongst developers and allow seamless integration of third party tools — all without compromising security practices.

Identity as a service

Citizen

Citizen grows customer engagement and combat frauds by frictionlessly validating identity. We leverage mobile biometric technology to provide safer, seamless online experiences, ensuring strong cyber security and reducing abandonment. Our consent platform ensures that the GDPR regulation drives business value, whilst helping customers gain control over their personal data universe.

Armor Anywhere

Armor Defense Ltd.

Armor Anywhere is a managed, scalable security solution that protects virtual machine instances hosted on any cloud environment. Armor Anywhere's OS agent is powered by our Intelligent Security Model and managed by our experienced security operations team (SOC) – providing real-time visibility into your security program and actionable threat intelligence.

Cryptography-as-a-Service (CaaS)

Trustis

Protect your data and systems in the Cloud using certified high performance HSMs without employing crypto experts or buying expensive hardware and having unused capacity. Hosted and expertly managed in the UK while, crucially, you retain complete control over your encryption keys. Buy what you need when you need it!

Microsoft Enterprise Mobility + Security E5

Bytes Software Services

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise bsscloud

KnowBe4 - Security Awareness Training & Simulated Phishing Platform

S3 Ltd

KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 300 course modules available. Fully automated simulated phishing attacks, hundreds of templates with unlimited usage. Enterprise-strength reporting, showing stats and graphs for both training and phishing.

Check Point Mobile Threat Prevention (MTP)

CWSI

Check Point Mobile Threat Prevention from CWSI is a solution which protects iOS and Android devices from advanced mobile threats such as malware, device configuration threats, man-in-the-middle attacks and apps requiring excessive permissions. It can integrate with many other systems or deploy as a standalone product.

McAfee Multi-Access from O2

Telefonica UK Limited

McAfee Multi Access from O2 is a security service that allows customers to protect all their devices, including smartphones, tablets and PCs. Provisioned and managed through a cloud-based portal with flat-monthly charges, the solution allows business administrators to deploy McAfee Total Protection, Mobile Security and TrueKey on a 5(+1)licence basis.

Office 365 Advanced Threat Protection

Civica UK Limited

Protect your email in real time against unknown and sophisticated attacks, through automatic analysis and detonation of suspicious content and unsafe URL links, when included in emails. Gain insights who is being targeted and the category of attacks, including blocked message investigations and URL trace capabilities. Via Civica. See https://products.office.com/en-gb/exchange/online-email-threat-protection

Audit Case Management

Blackthorn GRC Limited

No matter what is being audited, transparency, collaboration and remediation are key. This tool will highlight audit status and compliance weaknesses, manage task allocation and escalation, and give on-demand reporting via an integrated market-leading partnership platform. Compliance can be made easy when the experience is engaging. UK hosted to IL2/OFFICIAL.

RiskTree

360 Defence (UK) Ltd

RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.

Microsoft Cloud App Security

Softcat Limited

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Office 365 Enterprise E3

Microsoft

Cloud Office Productivity includes Office ProPlus Word, Excel, PowerPoint, OneNote, co-authoring, Outlook Exchange Email, Skype for Business, Instant Messaging, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, Data Loss Protection, Rights Management. Mobile (iOS, Android, Windows phone), desktop (Windows, Mac). See https://products.office.com/en-gb/secure-productive-enterprise

Datto Backupify Cloud to Cloud Backup Service

Netpremacy Limited

Backupify protects your most important cloud data through secure, automatic, daily backup. You’ll be able to easily search and restore files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and app errors. G Suite, Office 365, Salesforce, Social Media

Content Migration

Pulsion Technology Limited

We offer content migration services for multiple content types. Following best practice processes, we actively collaborate with our clients to ensure a secure and cost-effective content migration service.

Cyber Forensic Analysis Service

SecureCloud+ Limited

Cyber Forensic Analysis Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET, (including NATO and MISSON) and TOP SECRET delivers active cyber defence management and network forensic analysis. The aim is to contain and mitigate the impact of cyber incidents and prevent future attacks.

Business Continuity Management System

BCMfort

BCMfort is a highly effective and interactive Business Continuity Management System (BCMS) that allows organisations to proactively manage their Risk by empowering their workforce in planning and response. By consolidating your Continuity Plans into the Cloud, providing transparency across the organisation, allowing you to respond and manage incident resolution instantly.

pam

pam

pam is cost effective and secure cloud software for law enforcement, justice and other public sector solution areas. Whether you are seeking better ways of working internally, in sensitive multi-agency activity or other partner initiatives, you can make it happen quickly with pam.

Exponential-e Unified Security Solution (Censornet)

Exponential-e Ltd

Unified Security Solution (USS) enables organizations to monitor and control Web, Email and Cloud Application use to provide complete security for your organisation from one dashboard. You can protect your employees, whether in the office or mobile, against cyber-attacks, and accidental or malicious leaks of sensitive data.

MyCompliance Advantage

MetaCompliance Ltd

MetaCompliance® Advantage is an IT Governance, Risk and Compliance (IT GRC) product that enables organisations to automate and manage the key tasks associated with user awareness and engagement for information assurance, including risk assessment, the measurement of organisation wide IT security posture and policy management.

Barracuda Next Generation and Web Application Firewall

Think S3 (S3 Consulting Ltd)

Powerful firewall for Azure with the Next Gen Firewall The Barracuda Web Application Firewall for Azure is a scalable security solution that protects applications from targeted and automated attacks. Message Archiver & E-Mail Security Gateway provides Email Security & Email Management on Microsoft Azure

Exponential-e Cloud File Sync and Share

Exponential-e Ltd

Exponential-e’s Cloud Sync provides seamless and automatic access to documents, files, and shared folders with robust security features. With mobile, VPN-less access to files in home directories, file shares, and SharePoint devices, securely collaborate with team members inside and outside of your organization.

Cryptzone with AppGate

Somerford Associates Limited

AppGate is an integrated security gateway that provides application and service-specific authentication and authorisation which controls network access inside and from outside the perimeter AppGate was designed with two principles in mind: * Everyone inside the network is not necessarily trustworthy * Everyone outside the network is not necessarily untrustworthy.

Verify API for 2FA using a Mobile Phone

Nexmo Inc.

Nexmo Verify API allows you to implement two factor authentication (2FA) using short lived verification codes sent to a Mobile or Landline over SMS or an automated Voice phone call.

Crises Control

Transputec Limited

Crises Control is a cloud based emergency mass notification application combined with a functional business disruption incident management platform. It offers multi-channel communications, delivered through and supported by a mobile application. A sophisticated new task manager module allows tasks to be allocated and tracked during an incident.

Cloudbees Jenkins Software Licenses

Amazic

CloudBees Jenkins Enterprise enables Jenkins at scale by extending a verified distribution of Jenkins with the enterprise features required by teams delivering mission-critical software in the DevOps era. Jenkins is the leading automation platform for continuous delivery however, enterprises have unique needs.

Liaison Technologies Tokenization

Liaison Technologies Ltd

A managed tokenization service that uses Liaison Technologies Protect Token Manager to protect not only credit cards, but also any type of sensitive Personally Identifiable Information (PII) which can be stored securely in a PCI-compliant cloud. With Liaison TaaS, customers enable their enterprises to interact with TaaS via web services.

Boomalert: Critical Incident Communications

Boomalert Ltd

Boomalert’s incident communication software enables the distribution and receipt of broadcast communications over SMS, Voice and Email and the escalation of urgent or critical messages. This ensures that an organisation can plan and prepare effectively for critical incidents, and consequently mitigate against the negative impact that might otherwise occur.

Office 365 Enterprise E5

Microsoft

Office, Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management plus Cloud-PBX call management, PSTN-Conferencing, Business Intelligence, PowerBI, Delve Analytics, Personal-Org Analytics, cybersecurity, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery.

Microsoft Secure Productive Enterprise E3

Phoenix Software Ltd

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3 and Windows 10 Enterprise E3. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

CGI - Security Operations Centre (SOC)

CGI

A Real Time Protective Monitoring Services which provides a shared managed service to organisations to collect, detect and alert on security incidents within their Cloud and where required, their wider IT and applications infrastructure. This is the baseline service upon which the optional services can be supported

RiskAid

Risk Reasoning Limited

RiskAid is a powerful yet intuitive online tool to manage risk and uncertainty for projects, operationally or across an organisation. It incorporates advanced features such as "what if" scenarios, a full searchable audit trail and role based security.

Microsoft Secure Productive Enterprise E3

SeeLogic Ltd

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3 and Windows 10 Enterprise E3. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

Microsoft Enterprise Mobility + Security E5

Microsoft

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

Symantec Endpoint Protection.Cloud

Gradian Systems Ltd

A comprehensive cloud based security solution designed to meet the needs of small to medium businesses. Protecting your endpoint systems including desktops, laptops and file servers, with advanced technologies for antivirus, antispyware, firewall, and host intrusion prevention. Managed via a single web based console.

Application Security Testing Fortify On-Demand

Sogeti UK Limited

Powered by HPE Fortify on Demand (provided by Hewlett Packard Limited), Sogeti’s Application Security Testing Service is a flexible managed service that makes it simple to initiate security tests on selected applications or launch a comprehensive security program without any upfront investment in technology and resources.

BiZZdesign Enterprise Studio

Edifit Limited

BiZZdesign Enterprise Studio is a collaborative business design platform offering powerful, integrated modeling and reporting across multiple disciplines to enable coherent decision-making. It provides capabilities to seamlessly plan, design and execute change using a wide set of disciplines and extensible modelling languages.

CE Smart

CyberSmart

CE Smart allows organisations to rapidly check, secure and certify to achieve Cyber Essentials - all within a single platform. The cloud based dashboard allows both real-time visibility of devices and smart fixes resulting in a significant reduction of the overhead of Cyber Essentials implementation.

Managed Information Security Services

C Squared Consultancy Limited

C Squared is able to provide flexible and diverse solutions to a range of key information security risks by providing technology, managed services and consultancy. Our suite of strategically combined products can protect your organisation from a range of internal and external cyber and data security threats.

SBL IBM Application Security on Cloud - Static Analyser

Software Box Limited (SBL)

IBM Application Security on Cloud - Static Analyser integrates application security testing into your software development lifecycle. By doing this it help your organisation lower costs and reduce risk exposure by identifying web-based source code vulnerabilities early in the software development lifecycle, so they can be fixed before deployment.

VigilancePro - User Activity Monitoring, Management & Auditing

Vigilant Applications Limited

VigilancePro is a powerful User Activity monitoring, management & auditing solution. Through a unique layered approach to information security, VigilancePro enables organisations to monitor, identify and manage how users access, process, store and transmit sensitive information. Comprehensive audit trails provide evidence of compliance (or otherwise) with applicable policies and regulations.

Sparx Enterprise Architect Software

RJD Technology Ltd

An enterprise wide solution to visualise, analyse, model, test and maintain all systems, software, processes and architectures. The platform helps the customer to stay in control of their workspace, support colleagues and teams, enable collaboration and build confidence within the most complex projects. More information can be found at: http://www.sparxsystems.com/

IBM Application Security on Cloud - Mobile Analyser

IBM United Kingdom Ltd

This offering identifies security issues of mobile applications. It highlights what in the code needs to be fixed with no source code being required. The developer need only upload the application package to the service and this rapid scan will create a detailed security report, including simple remediation steps.

Zscaler Private Access VPN-less Secure Access

Comtact Limited

Zscaler Private Access delivers policy-based, secure access to private applications and assets without the cost, or security risks of a VPN. Users get all of the benefits of Zscaler’s marketing-leading Internet Security platform, as well as granular, policy-based access to internal resources from a single point.

Microsoft Enterprise Mobility + Security E5

Trustmarque Solutions Limited

Cloud Enterprise Mobility + Security. Licensing suite includes Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics and Microsoft Cloud App Security. Cybersecurity, Mobile Device Management (MDM). https://products.office.com/en-gb/secure-productive-enterprise

Two-Factor Authentication

Zensend

The service securely authenticates users before allowing them access to an online service. This is done by sending users a unique code via SMS, which they then enter into the service. It is used to prevent fraud and add an extra layer of security to traditional username and password methods.

Microsoft 365 E5

New Signature UK Limited

Cloud Productivity & Security. Licensing suite for Office 365 Enterprise E5, Enterprise & Mobility Suite E5 and Windows 10 Enterprise E5. https://www.microsoft.com/en-gb/licensing/product-licensing/microsoft-365-enterprise.aspx

Enterprise Mobility + Security E3

New Signature UK Limited

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics

Edgescan - Continuous Technical Security Vulnerability Assessment

Securestorm

Edgescan is a managed, Continuous Technical Security Vulnerability Assessment service with continuous, security testing and system visibility that delivers a unique service combining full-stack vulnerability management, asset profiling, alerting and risk metrics. As official partners, Securestorm, an NCSC certified company, will assist customers with on-boarding the service and portal configuration.

Enterprise Identity Management Solution

OneLogin, Inc.

OneLogin provides a platform for managing user identities in the cloud and behind the firewall, and comes complete with secure single sign-on across desktops, Web and mobile devices, federated search, user provisioning with entitlements, real-time synchronization of users and entitlements across all directories, multi-factor authentication, VPN integration, and compliance reporting.

Topsec Email Security - Cloud Email Filtering Service (Anti-Virus/ Anti-Spam/ Content Filtering)

Topsec Cloud Solutions

A managed email security service which works with your hosted or in-house email services to provide a comprehensive Anti-Virus, Anti-Spam and Content filtering cloud service, keeping new and emerging threats away from your network. Add-on Modules include Email Continuity and Malware, Ransomware & Phishing Email URL Sandbox (Topsec Blended Threats).

Bramble Hub Informu - Information Asset Register System

Bramble Hub Limited

The system profiles information assets, tagging them into a business classification scheme to inherit a default retention period. Physical records, electronic documents, data sets or IT equipment can be added as assets, with data relating to their ownership, location, use etc., including source, processing condition and sharing information for GDPR.

Okta Identity and Access management

BSI Cybersecurity and Information Resilience (Ireland) Ltd

The Okta Identity Platform provides a complete identity layer for your application. • Securing sensitive user profile data, and making it available across all systems. • Seamless user experience with one username, password and session across a suite of products. • Unifying authentication across legacy on-premises products and cloud services.

ICT and Telecoms Installation

Network 2 Supplies Ltd

N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.

CenturyLink Threat Intelligence

CenturyLink Communications UK Limited

Monitoring of customer traffic as it passes through CenturyLink infrastructure based on sampled Netflow analysis. Sampled network traffic combined with open source, private, and CenturyLink proprietary threat data and Real-time, and correlated with your organisation's IP space, to provide high fidelity intelligence and alerting via this Portal

Boomerang Messaging

Boomerang I-Comms Ltd

Automate communication flows across SMS, Email and Voice messaging, by dynamically matching outbound messages with inbound responses, regardless of quantity and order. Our technology is proven in generating substantial savings across appointment, management, workforce scheduling and incident management processes; whilst delivering choice and value for the end user.

Microsoft Enterprise Mobility + Security E3

Gaia Technologies Plc

Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics. See https://products.office.com/en-gb/secure-productive-enterprise

Secure Collaboration

E-Share

Securely collaborate by setting policies and permissions that staff adhere to by default. Gain control of data inside and outside the firewall. Drag and drop simplicity that enables team members to access, send and receive documents on any device. Access rights can be defined by management or by folder owner.

SYNERGi GRC

Information Risk Management Plc

IRM's SYNERGi Platform provides a cost-effective and comprehensive GRC software solution for rationalising IT GRC, managing cyber risk, incident & vendor management, and meeting regulatory requirements not limited to IS1, IS2, ISO27001/2, PCIDSS, ISO31000, DPA/GDPR, BIA, PIA, ISO, NIST, SANS 20, CIS, SOX, 22301/BS25999, SPF, Asset Management, CTAS, HIPAA, ISO27005.

Fordway Cloud Skype for Business Service

Fordway

Fordway Cloud Skype for Business is an enterprise grade Unified Communication solution delivering instant-messaging, voice, and video with collaboration capabilities through a downloadable client or web interface. Fordway’s offering is based on a per user/month pricing model allowing a flexible approach to billing.

Endpoint Security

E-Share

E-Share provides an additional layer of security that encrypts data before it goes into public cloud storage services with endpoint security for BYOD. This enterprise solution for secure sharing and collaboration using the public cloud gives organisations extra security and visibility to safeguard and track all cloud data activity.

OneLogin

AIT Partnership Group Ltd

With OneLogin's single sign-on portal users only have to enter one set of credentials to access to their web apps in the cloud and behind the firewall – via desktops, smartphones and tablet. Transform enterprise security and centralise control of users, apps and devices with cloud-based identity and access management.

Custodian SaaS - Software as a Service

Celerity Limited

Celerity Custodian is a data protection suite that gives enterprises a single point of control and administration. Custodian provides reliable, cost effective backup and fast recovery for virtual, physical and cloud environments of all sizes and, enables advanced application protection to minimise downtime, maximising availability.

Cyber Security & Compliance eLearning Library

MetaCompliance Ltd

The MetaCompliance Cyber Security and Compliance Catalogue has been developed by our industry experts to deliver engaging eLearning content to the workforce as part of a compliance workflow, thus allowing significant automation of cyber security awareness programs. Different media types such as video and animation are combined in these modules.

Access: One - Platform as a Service (IDaaS)

Pirean

Access: One's Platform IDaaS offering provides an easy to configure and consume platform for building, refining and publishing custom Identity and Access Management services for providing secure access to Digital Services.