Search results

627 results found in Cloud software in the category Security risk management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
627 results found

VMware AirWatch - Part of Workspace ONE

Phoenix Software Ltd

VMware Workspace ONE (includes AirWatch)- a secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernises traditional IT operations for the mobile-cloud era.

Microsoft 365 E5

Bytes Software Services

Cloud Productivity & Security. Licensing suite for Office 365 Enterprise E5, Enterprise & Mobility Suite E5 and Windows 10 Enterprise E5 bsscloud

Staff Skills & Competencies Survey

Blackthorn GRC Limited

People are our most expensive resource, yet we are often unaware of what they can truly deliver. Our Skills Discovery tool can perform an objective assessment of the skills and competencies within the workforce, providing leadership with a clear indication of gaps in the collective capability. UK hosted upto IL3/OFFICIAL.

Cloud End Point Protection and Compliance Service from Fordway

Fordway

Fordway Endpoint Data Protection and Compliance is a fully-automated, enterprise-class solution offered as software as a service (SaaS), covering backup, restoration, compliance and legal. Endpoint Protection and Compliance offers elastic, on-demand backup storage that scales for any number of users, with data stored in either Amazon AWS or Microsoft Azure.

CDW ProofPoint Essentials

CDW Limited

ProofPoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time.

Okta

Generation Digital

Okta Solutions provides the following modules: Single Sign-On frees people from password chains; Provisioning lets IT leaders and administrators automate user onboarding and offboarding; Universal Directory is an exible, cloud-based user store; Mobility Management puts user identities at the center; and Adaptive Multifactor Authentication allows customers to secure their applications.

Secure Application Server Service GC10-ASC-SAS1

Viewdeck Consulting Limited

Secure managed application hosting, providing management and delivery of an extensive range of native or 3rd party applications in a patched, secured, contained service. Supports a wide range of technologies under a fully configured DevOps environment with integrated Monitoring, Event Management, Monitoring etc.

Wandera Secure Mobile Gateway

Wandera

The Wandera Service provides customers with a Secure Mobile Gateway (SMG) which compresses mobile data, enforces acceptable usage policies, provides multi-level mobile threat detection by scanning on device and in the cloud, and provides data usage reporting to business organisations to help protect business data and avoid mobile bill shock

Mobile and Fixed Identity Verification - Secure Gateway VMIV GC10-IAS-MFS1

Viewdeck Consulting Limited

A Mobile and Fixed Identity Verification Secure Gateway Services, delivering a secure audited interoperability with the VMIV (Viewdeck Mobile Identity Verification) Law Enforcement, Border and Humanitarian Services and national infrastructure capabilities. Bilateral capability, both Transmission and Receiving in secure environments, cross-Agency interoperability, fully monitored/audited, combined load-balancing for resilient service integrity.

MetaPrivacy

MetaCompliance Ltd

A single platform where you can record your data processing activities, create your risk register, manage staff policies, train your users on GDPR with graphically engaging content, therefore demonstrating your overall compliance with GDPR. This is the perfect tool to use as part of the personal data gathering phase.

Big Red Button - Click

Quorum Cyber Limited

Traditional anti-malware products need to be installed on every corporate device. Maintaining and updating client based anti-malware software is a difficult task. Click provides a different approach, sitting at your gateway monitoring all outbound DNS requests and preventing users from interacting with malicious sites.

Symantec Cloud Access Security Broker - CASB

Symantec (UK) Ltd

Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly IaaS and PaaS. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

Managed Security Services

RE-SOLUTION DATA LTD

Re-solution provide comprehensive managed security solutions utilising Cisco’s CloudCenter platform. CloudCenter is an application-centric hybrid cloud management platform that securely provisions infrastructure resources and deploys applications to data centre, private cloud, and public cloud environments.

Identity and Access Management

Texuna

Identity Assurance IdP with Access Management Lifecycle supporting mission-critical enterprise authentication and authorization services. Secure access to local, cloud, mobile applications with centralized IAM policies. Integrate identity information across user journey lifecycle to control access centrally. Single Sign-On/Off and access governance for behavior tracking and attribute exchange between integrated systems.

PCS Managed AntiVirus / AntiMalware

PCS BUSINESS SYSTEMS

This fully managed antivirus solution maximises protection against hard to detect threats and both known & potential viruses.

Audit Case Management

Blackthorn GRC Limited

No matter what is being audited, transparency, collaboration and remediation are key. This tool helps manage audit activities and data across the whole life-cycle, from planning and execution to remediation and reporting. It covers compliance, IT, supplier, and quality audits as well as ISO compliance. UK hosted up to IL3/OFFICIAL.

Sophos Central Security Products

Levett Consultancy Ltd

Levett Consultancy provides the range of Sophos Central products, including; Sophos Central - Sophos XG Firewall & Wireless Products Sophos Endpoint, Encryption, Mobile 8, & Server. Sophos Phish Threat

McAfee Multi-Access from O2

Telefonica UK Limited

McAfee Multi Access from O2 is a security service that allows customers to protect all their devices, including smartphones, tablets and PCs. Provisioned and managed through a cloud-based portal with flat-monthly charges, the solution allows business administrators to deploy McAfee Total Protection, Mobile Security and TrueKey on a 5(+1)licence basis.

SharePoint Consultancy

Sundown Solutions Ltd

We provide full, onsite consultancy for any form of SharePoint work, and provide guidance and best practice on all areas of the platform, which can often include: training, custom development, identity management, security auditing, governance planning, data integration, search configuration, branding, migration support, user adoption planning, and more. .

Vulnerability Scanning or Assessment as a Service

Proact IT UK Limited

Provides regular vulnerability scans of customers extenal facing networks

(Security) Incident Response Management

Blackthorn GRC Limited

This service allows reactions to (security) incidents to be immediate and thorough. Create an incident record, assign a team, associate evidence and supporting material, progress the investigation with workflow, coordinate remediation activity and report back into the organisation all from one interface. UK hosted up to IL3/OFFICIAL.

Sandblast Mobile

Ultima Business Solutions Ltd

SandBlast Mobile (previously known as MTP or Capsule) provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats.

Design & Build

ORM

We create digital products and services such as websites that play a vital role in delivering a superior customer experience. The platforms and applications we develop use the latest technical architectures, microservices, API integrations and development frameworks that take full advantage of cloud technologies and scalability.

GDPR Security Operations (SecOps)

Bristol IT Company

A cloud based Web Application designed to help organisations improve IT systems security and become “GDPR ready”. It provides functions which help with GDPR preparations, and a single, secure place to store all GDPR documents, audits and processes, as well as help with Cyber Essentials certification and PCI DSS compliance

Exabeam Security Intelligence Platform

CYBANETIX LIMITED

Exabeam uses data science for behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection. Exabeam's User and Entity Behavior Analytics (UEBA) provide insider threat detection, tracking anomalous behavior and suspect movements within your organization, while also securing your cloud services, machines, devices, and IoT assets.

Authinity

Avco Systems Ltd

Secure identity management and single-sign-on solution that helps organisations meet their complex security & compliance policies, and consolidate their user/application management efforts.

CommandCentral Aware

Motorola Solutions UK Limited

CommandCentral Aware provides a common operational picture through the real-time aggregation, correlation and analysis of systems and disparate data sources including CAD, records systems, video feeds, local and/or national public safety related data sources, social media, asset and resource information, radio console connectivity.

Legacy Application Management Service - Private or Public Cloud

APPTechnology

Legacy by APPtechnology enables your 16 Bit and 32 Bit complex business critical applications to be securely provided to your users, overcoming compatibility and platform support issues. Hosting your Legacy applications for delivery to Windows 10, using a combination of toolsets (Droplet, Glassware or Browsium) and APPtechnology managed services.

OfficeLabs GDPR Activity Tracker

OfficeLabs Ltd

GDPR places specific legal obligations on you to maintain records of personal data and processing activities. The GDPR activity tracker provides a way to record and report activity and use workflow to action any follow on activities. Includes easy to use, intuitive forms and comprehensive reporting.

Identity and Access Management Service (IdAMS)

Incremental Group

Incremental Group offers Identity and Access Management (IdAM) solutions, providing the Public Sector with expert advice on maintaining customer privacy and data security. Incremental Group orchestrates the identity provisioning and de-provisioning process for all identity types and understands the application of biometric recognition systems enabling speed, accuracy and user experience.

Web Proxy Server as a Service GC10-ASC-SLA

Viewdeck Consulting Limited

Secure managed Web Proxy service, delivering reverse proxy capabilities and separation for web applications. Provides load balancing, resilience, and HA in n-tier architecture. Security enforcing through separating Application Hosts from direct user connections. Supporting a range of security features providing a resilient platform, including optional security enhancing configuration.

Health & Care Online Account

Sitekit

Health & Care Online Account gives a citizen an assured online identity he or she can use to transact with health and care services. The citizen has the choice of using a GOV.UK Verify identity, or a social identity (e.g., Facebook, Google, Microsoft) suitably secured through a vouching process.

Keepnet Labs Anti-Phishing Solution

Keepnet Labs LTD.

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

Insider Threat Services on Darktrace

HIVE LOGIC LIMITED

Insider threat services directly address the fact that most security breaches are at least assisted by insiders. The most significant security breaches will involve insider threats for example through password compromise. Insider Threat services guards against motivated malicious insiders and accidental negligence by employees to greatly reduce corporate data loss.

Extract, Transform and Load (ETL) Server as a Service (VETL) ​​GC10-SAS-ETL1

Viewdeck Consulting Limited

VETL Enterprise class Extract, Transform and Load Solution, supports Big Data integration. Suitable for one-off migrations or constant data transformation. Visual data manipulation to join sources and data together. Integration and migration services across wide range of sources SQL, Hadoop HDFS, HBase, Hive, Pig, Sqoop, Google BigQuery and NoSQL databases.

Forceview

Experian

Forceview is a financial background check product for use by Police and Law enforcement agencies

CDW Checkpoint Capsule Cloud

CDW Limited

Check Point Capsule Cloud uses a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.

ADEPort

Adetiq Limited

Fully customisable online portal, ADEPort®, allows users to report on and visualise the processed data that we provide in real-time. Providing unlimited user access, multiple permission levels and specific reporting requirements. This solution will also provide live alerts for any infractions or violations of business or industry standards.

CyberPrism - Cyber Assessment Tool

Cyber Risk International

CyberPrism is a cloud based CAT - Cyber Assessment Tool. It allows organisations to perform an online assessment which calculates their inherent cyber risk score and related cyber maturity. The system generates a full cyber assessment report . CyberPrism facilitates the evaluation of cyber risk in the vendor supply chain.

SentinelOne Core & SentinelOne Complete from O2

Telefonica UK Limited

SentinelOne Endpoint Protection Platform unifies prevention, detection, and response in a single agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility with full-context, real-time forensics.

Cyber Intelligence Analysis Service

SecureCloud+ Limited

Cyber Intelligence Analysis Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET, (including NATO and MISSON) and TOP SECRET delivers threat intelligence operational support, to protect against high-profile intrusion, identity theft and data exploitation. Collaborative analysis of cyber alerts and advisories enables behavioural analysis of potential threat actors.

Cloudera Enterprise Data Hub

Cloudera Inc

Cloudera Enterprise software enables an Enterprise Data Hub – a scalable platform to store and analyse all your data. It includes CDH, the world’s most popular open source Hadoop-based platform, advanced system management and data management tools plus support and community advocacy from our Hadoop developers and experts.

Microsoft Cloud App Security

Think S3 (S3 Consulting Ltd)

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Imperva Incapsula

ULTRIS LIMITED

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

BMC Client Management On Demand

Fusion Business Solutions

Fusion GBS is a Platinum Partner of BMC, reselling BMC Client Management On Demand. BMC Client Management provides complete desktop, laptop and mobile device management helping organisations control hardware and software costs, avoid audit failure and maintain device security.

Mobile Inspection and Compliance

4C Europe UK Ltd

Exonaut® Mobile Inspection and Compliance provides a fully mobilised inspection and compliance solution supporting remote workers in the field. Inspections and audits can be managed and delivered using a mobile app which provides connectedness and increases efficiency. Inspection and audit findings are captured dynamically, reducing administration and generating instant reports.

MetaPhish

MetaCompliance Ltd

MetaPhish provides an awareness and training portal which allows the administrator to orchestrate simulated phishing and ransomware attacks to directly target their staff and management. Ultimately, this will increase employees' sensitivity to fraudulent emails and allows your organisation to outline the risks and the need for additional training.

Sophos

Complete IT Systems

Centralize Your Network Security with Sophos. Next-Gen Endpoint Security with Advanced Threat Prevention, Always-On Encryption, UTM Firewall Appliances, Mobile Management, Web and Email Gateway Appliances, Wireless Access Points, Server Virtualization and Network Scanning for Ransomware

CenturyLink Network Protection Service

CenturyLink Communications UK Limited

The service accompanies CenturyLink Internet Circuits for customers who require upstream rate limiting and filtering. The service cost-effectively mitigates risk of DDoS attacks by the application of Rate limiting, ACLs and Null routing. The service is provided with a 30 minute SLA guaranteed response time for volumetric DDoS attack.

Web Collaboration and Wiki Service (VWCW) GC10-VMP-WIK1

Viewdeck Consulting Limited

The Viewdeck Web Collaboration and Wiki Service VWCW, is a collaboration, Wiki, and enterprise project website ideal for intranets, extranets or cross organisational working. The power of the Wiki allows teams to share content across domains and locations in a flexible secure way.

Kainos Smart Software

Kainos Worksmart Limited

Kainos Smart is a SaaS Test Automation Product for Workday. Used successfully by over 120 Workday customers it covers HCM, Payroll & Financials business process, security configuration and integration testing. It allows customers to automate the execution and verification of test cases against their specific Workday configuration.

Azure Active Directory P1

Akhter Computers PLC

A full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management, role based access control, application usage monitoring, rich auditing and security monitoring and alerting

Microsoft Cloud PKI

Entrust Datacard (Europe) Limited

This is a high assurance, dedicated Microsoft PKI delivered as a managed service, Cloud hosted e.g. Azure, AWS etc. With our Managed PKI you have a fully customised, high assurance solution with full control of your own cryptographic keys, managed from an ultra-secure, accredited facility in the UK.

McAfee Web Gateway Cloud Service

Caretower Ltd.

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users.

Reliance acsn Two-Factor Cloud Authentication

Reliance acsn

Reliance acsn offer its Cloud Authentication Service, 'Authenticate', which delivers all the benefits of soft-token strong authentication, but cloud-hosted, so you don’t need to buy or maintain additional infrastructure. It acts as a key component in protecting user identity and securing access to a client’s protected systems and services.

CTG Secure Portal for Communications Data Disclosure

Computer Task Group (UK) Limited

CTG provide custom, secure Information Disclosure portals delivering workflow automation and self-service between public sector departments, law enforcement and the private sector. CTG cloud based solutions can be configured to support a wide range of disclosure workflows including RIPA, RDHI, DRD, FOI, DPA and other security sensitive regulations.

Zscaler Private Access Service

Truststream Security Solutions

Zscaler Private Access is a cloud-based service that delivers policy-based, secure access to private applications and assets without the cost, support burden, or security risks of a VPN. It delivers seamless, policy-driven, access to private internal applications and assets whether they are in the cloud, the data center, or both.

Freja eID

Verisec Ltd

Freja eID is an electronic identity on your mobile that allows you to log in, sign and approve transactions and agreements with your fingerprint or PIN. It lets you monitor and control your digital activities. This MFA product helps your users and citizens avoid ID theft and fraud.

Nexus Managed Antivirus & Web Filtering

Nexus Open Systems Ltd

Nexus Managed Anti-Virus and Web Filtering Service gives your organisation the latest best in class Anti-Virus Endpoint Security without the headache. The service is built around a simple per device per month cost – there are no upfront or ongoing installation, upgrade, licencing or management fees. Updates and upgrades included.

Check Point CloudGuard for SaaS

Phoenix Software Ltd

CloudGuard SaaS is a cloud service that prevents attacks on enterprise SaaS applications, blocks cybercriminals from taking over employee accounts and provides data security for SaaS applications.The solution supports a multitude of enterprise SaaS application including Microsoft Office 365, Google G-Suite, BOX, Citrix ShareFile and more

Content Threat Removal Cloud Platform (Assured)

MDS Technologies Limited

The Content Threat Removal Cloud Service provides information exchange control when data is moved between security domains or across perimeter gateways. It protects a range of file transfer, Web browsing and machine-to-machine use cases. Service tailoring meets an organisation’s specific sharing needs, supporting user compliance and addresses organisational security risks.

Mobile Threat Defense

Pradeo Security Systems

Pradeo Security Mobile Threat Defense solution offers a complete, automatic and seamless mobile threat protection securing Apps, Network and Devices. The solution aligns with your organization security policies & preserves business agility. Pradeo MTD is integrated with major MDM's.

Hybrid Cloud Management, Orchestration and Billing Services (Cisco CloudCenter, formerly CliQr) copy

Cloud Digital Limited

We are a Cisco CloudCenter Software partner. We engage, collaborate and deliver complete end to end Hybrid Cloud Management, Orchestration and Billing solutions including managed service options for internal and external cloud and vm support. Remove Shadow IT and grasp power and agility within internal cloud and public cloud offerings.

Viewdeck Visualisation of Data Service Kibana® (VSVL) GC10-SAS-VSL1

Viewdeck Consulting Limited

VSVL is a Logstash® cloud service, that enables the ingestion of data from a multitude of sources simultaneously. Ability to ingest a variety of inputs to pull in large quantities from common sources.. VDIS supports transformation and the ability to visualise in services like Elasticsearch®.

Barrier Networks Symantec Cloud Access Security Broker

Barrier Networks

Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly IaaS and PaaS. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

Elasticsearch Service

Softcat Limited

Hosted/managed Elasticsearch & Kibana brought to you by the creators of the Elastic Stack to help you with logging, app search, site search, security analytics (SIEM), metrics, APM, and more. Elastic Cloud ships with X-Pack features including monitoring and security features like default encryption at rest and native authentication.

Web Proxy Server as a Service (VWPS) - PaaS GC10-PAS-SLA1

Viewdeck Consulting Limited

Secure managed Web Proxy service, delivering reverse proxy capabilities and separation for web applications. Provides load balancing, resilience, and HA in n-tier architecture. Security enforcing through separating Application Hosts from direct user connections. Supporting a range of security features providing a resilient platform, including optional security enhancing configuration.

ADEPort Timesheet Management

Adetiq Limited

An online portal for timesheet capture, validation and reporting, ADEPort®, allows users to enter timesheet data and provide live alerts for any infractions or violations of business or industry standards and regulations. Providing unlimited user access, multiple permission levels and specific reporting requirements and visualisations.

Big Data Security Information & Event Monitoring (SIEM) Service

Moortec Solutions Ltd

Moortec’s SIEM Monitoring-as-a Service provides a powerful, scalable and secure platform for receiving, processing and analysing system and security events in real-time. Utilising Apache Metron and associated open source products, the service removes the complexity and burden of building a similar service offering on your own on-premise or cloud infrastructure.

Imperva Incapsula

Truststream Security Solutions

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Lexis Diligence - Enhanced Due Diligence solution

LexisNexis

Lexis Diligence brings into one, simple online tool the intelligence to conduct global enhanced due diligence and comply with legislation for anti-money laundering (AML), anti-bribery & corruption (ABC). The solution enables checks on individual or company backgrounds (KYC), negative news, sanctions and politically exposed persons (PEPs) and company litigation history.

Anti Phishing Protection – Security Awareness and Training

Rivington Information Security

Rivington provides Anti Phishing and Security Awareness testing and training solutions. Our service offers knowledge assessment, simulated phishing attacks and interactive training which have been proven to help reduce successful phishing attacks and malware infections.

Internet of Things (IoT)

Incremental Group

Incremental Group uses the Microsoft Technology Stack to incrementally build and support scalable and secure Internet of Things (IoT) solutions. Incremental Group engages with Public Sector organisations to deliver business outcome focused software enabling reliable, secure, bi-directional communications between enterprise devices and the cloud.

InformedTRANSFORM-Cloud Transition Feasibility & Migration Services

Informed Solutions Ltd

InformedTRANSFORM Cloud Transition Feasibility & Migration Services offer a complete solution to new cloud services, or migrating legacy services to the cloud. It encompasses ICT estate review, Current State Assessment, IT Strategy, planning, cloud migration, cloud assessment and infrastructure optimisation, helping you get the most out of cloud based services.

Imperva SecureSphere Cloud DAM

ULTRIS LIMITED

SecureSphere Data Activity Monitoring and Database Firewall provides enterprise-class protection, audit analysis, automated processes and reports running natively on AWS and Azure. SecureSphere data protection solutions protect databases from attack, reduce risk and streamlines compliance by enabling organizations to leverage common infrastructure, both in AWS, Azure and on-prem.

Risk and Incident Manager

4C Europe UK Ltd

Exonaut® RIM is web based solution with mobile capability that delivers a structured, systematic and integrated approach to risk management, in accordance with ISO 31000. It enables organisations to adopt a common methodology for enterprise and project risk management activity, tracking exposure and monitoring the status of mitigation and controls

BetterCloud for G Suite

Netpremacy Limited

A comprehensive security, 360-degree management and automation platform built for all GSuite customers, BetterCloud is the number one security, management and process automation tool for your G Suite solution. The Bettercloud unified suite of tools offers all of the controls you need for IT Department, Service Desk to SIRO.

Secure Blockchain Service

SecureCloud+ Limited

Secure Blockchain Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET,MISSION SECRET,TOP SECRET provides a distributed ledger-based mechanism eradicating flaws in security typically introduced by human error or threats. The service reduces the risk of single points of failure, improves traceability providing a single source of truth.

Security Incident Detection & Response

C2 CYBER LTD

This is a cyber security service to help an organisation detect and respond to attacks. Our cloud platform collects relevant system data, has a set of threat use cases that analyse it, and then provides timely and understandable reports that describe the incident and provide guidance for the response.

CyberGator Cyber Monitoring Saas Service

Auriga Consulting Ltd

Security Event Monitoring can be costly. Auriga’s CyberGator bucks this trend and is a first to market of its type. CyberGator is a cost effective, subscription-based Cyber Security Monitoring SaaS service, that is agile, intuitive and real-time, offering much more than security monitoring alone. Security health and alerting are included

Skyhigh Networks CASB

BSI Cybersecurity and Information Resilience (Ireland) Ltd

Skyhigh is the leading cloud access security broker trusted by over 600 enterprises to securely enable over 20,000 cloud services, including shadow IT and sanctioned IT. Clients leverage a single cross-cloud platform to gain visibility into cloud usage and risks, meet compliance requirements, enforce security policies, and respond to threats.

Radware Cloud DDoS

Caretower Ltd.

Cloud DDoS Protection Services provide a range of enterprise grade DDoS protection. The service provides the widest security coverage, the most accurate detection, and the shortest time to protect against DDoS. The service enables organizations to assure the SLA of their data centers and applications from a Web-based application (portal)

Security Awareness Training (ulearn) & Simulated Phishing (uPhish)

usecure

usecure provides Security Awareness training and simulated phishing as well as a GAP analyses tool. This incorporates an evaluate - educate - simulate approach in our user-focused Security stack.

Microsoft Secure Productive Enterprise E5

Insight

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E5, Enterprise Mobility + Security E5 and Windows 10 Enterprise E5. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

​​Secure Linux, Apache, MySQL and Php (LAMP) Application Service GC10-ASC-SLA1

Viewdeck Consulting Limited

Secure managed Web Software service, delivering a LAMP (Linux, Apache, MySQL, Php) application Service. Supports a wide range of web based applications (php, or perl based) in a patched, secured container service. Provides a range of security features providing a resilient platform, plus managed, monitored and backup services.

Website Security Testing

Borwell

This is a Cloud based security testing service. It allows us to test an organisation’s website for SQLi vulnerabilities, Cross Site Scripting (XSS) vulnerabilities and test for defacement. It is a fully automated scan.

McAfee Web Protection

Bytes Software Services

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users. bsscloud

InfoSaaS UtopiaR

InfoSaaS Limited

InfoSaaS UtopiaR is a secure, cloud-based solution which supports organisations completing Data Protection Impact Assessments on their activities, as required by Article 35 (Privacy by Design) of the 2018 EU General Data Protection Regulation. It also provides for tracking of data subject rights requests and personal data breaches.

Integrated Risk & Issue System (IRIS) - Project and Portfolio Management Software v6.7.1

IRIS Intelligence Ltd.

IRIS Software helps teams manage risks, issues and opportunities more effectively. It facilitates increased risk identification, ensures consistency of assessment, tracks progress of mitigation actions and delivers timely, customised reports to Management. It is a highly flexible system, supporting ISO31000, ISO27001 and the PMBoK, as well as tailored customer processes.

Microsoft Cloud App Security

Gaia Technologies Plc

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Radware Cloud Web Application Firewall

Caretower Ltd.

The Service offers protection from application-level web attacks. The Service automatically detects application domains, analyzes potential vulnerabilities and assigns optimal protection. The Service uses DNS to divert traffic towards the supplier’s Cloud and also includes DDoS Protection to 1Gbps in all packages, extended DDoS Protection is available as an option.

Check Point Capsule Cloud

Phoenix Software Ltd

Check Point Capsule Cloud solves security dilemmas by using a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.

Agile Project Management

Goldbrooks Ltd

Our service will help drive delivery excellence and sustained growth by deploying best in class techniques tailored to assist organisations that are implementing or improving their Agile or Scrum approach. Our offerings include Coaching, Training, Propagating the Scrum principles and Managing cultural change.

TheOneView

EMIS Ltd

Easily access the information you need to plan, manage and report on all your governance, risk and compliance (GRC) requirements. Modules for Risk, Business Continuity Management, Audit, Business Impact Assessments, Checks, Document Management and others. Designed to drive business value whilst effectively managing all areas of GRC. Mobile apps available.

Body Worn Video Manager

i2N Ltd

Body Worn Video Manager captures video, audio and stills from Body Worn cameras and other devices such as CCTV and Digital Interview Recorders. Workflows can be created to manage and control the integrity of recordings. Original copies are always retained, in addition to full audit trails of all edits made.

GDPR Ready – Data Encryption as a Service (EaaS)

The Bunker Secure Hosting Limited

The service provides GDPR compliant data protection through file and volume level data-at-rest encryption, without re-engineering applications, databases or infrastructure. Service deployment is simple, scalable and fast.

Simulated Phishing Awareness Platform

Digi2al Limited

Phishing is the most common cyber attack. Our phishing awareness platform creates user resilience and drives awareness by simulating and testing real phishing, (spearphishing and whaling). Including phishing user testing, training & education modules, with detailed reporting and metrics on phishing vulnerability. User cyber security behaviour training is GDPR compliant.

Cloud Security

HIVE LOGIC LIMITED

The cloud security service, or Cloud Access Security Broker (CASB), secures all monitored cloud usage, including hypercloud. It analyses the risks and enforces appropriate controls through a wealth of constantly updated controls. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need.

KPMG Sofy Suite

KPMG LLP

The KPMG Sofy Suite of products comprises four data analytics and workflow services (products): - Access Control Monitoring - Data Quality Insights - Process Insights - Risk Management Platform

Continuous Delivery as a Service GC10-DOS-CDS1

Viewdeck Consulting Limited

Continuous Delivery as a Service provides a control over your software and infrastructure deployments, by automating integration across both infrastructure and application code. This gives your operations and development teams a common platform for developing, testing and deploying cookbooks, applications and more. Agility in the end to end capability.