MarketPlace: solutions to keep businesses safe

We selected market leading products that help businesses protect themselves from digital crime and online risks.

Thanks to the support of our founders and partners, we deliver some products at no cost to businesses that sign up for Membership. Businesses should also consider buying the market leading products in our MarketPlace.

Try filtering by category, for products to train your People, to protect your computer Platforms, to maintain good Processes, to lead Recovery after attack, and to Review your progress.


Adaptive Email Security
Clearswift

Protect your busiest communication channel from cyber-attacks and sensitive data leaks with an award-winning email security product.

APMG Online Cyber Security Training
APMG International

41% of security incidents are caused by internal breaches and errors. Mitigate, GCHQ-approved training, reduces this risk by educating staff and...

Assuria Protective Monitoring Service
Assuria Ltd

SME's need proven cyber defences to reduce business risk and meet tough GDPR and other compliance needs, but at prices they can afford.

BLOCKPHISH
BLOCKPHISH

91% of a cyber-attacks begin with a phishing email. Organisations need to train their staff to identify and defend against these threats.

Breach Simulation for Executives
Cyber Rescue

To protect reputation & revenues, leaders must be ready to lead recovery through the cascade of commercial consequences that follow a breach.

CDCAT®
APMG International

Faced with evolving threats and escalating risks, the traditional reliance on passive compliance assessments is not sufficient. These are frequently...

Cognition
Fortitude

The legacy, single-point solution approach to cyber defence is not working. Businesses are losing billions. Cognition, easily implemented, provides...

Continuous Perimeter Security
Intruder

8,000 new vulnerabilities get discovered every year, more than 20 a day. But most companies don't have time to check their security on a daily basis.

Cyber Essentials
IASME

Government backed certification for small companies to show they have key technical controls to protect against common internet threats

Cyber Essentials
APMG International

The majority of cyber attacks exploit basic weaknesses in your IT systems and software. Cyber Essentials shows you how to address and prevent the...

Cyber Security Audit
PAV

To effectively manage risk, organisations of all sizes need to understand where and how they are vulnerable to cyber attack.

Data Insurance
Data2Vault

Cyber solutions live, user training completed, but data loss threats still exists, Data Protection with Data Insurance counters this threat

Data Protection Services
ThinkingSafe

Protecting business systems & data from technical failures, cyber-attacks & insider risks, whilst improving user collaboration & compliance

DeceptionGrid™
TrapX Security

We help prevent small businesses from being the weakest cyber link in the 3rd party supply chain and help prevent them from becoming victims of...

e2e-assure SOC-as-a-Service
e2e-assure

Protect your critical assets from cyber attacks and GDPR breaches with our 24/7 SOC-as-a-service. Continuous security monitoring and active response...

EPS
BAE Systems

Email is still the single largest entry point for cyber risk. Users need more support than a written policy asking them to be vigilant.

Fornax
Estatom

Software and systems must be fundamentally and inherently secure to protect against current and importantly, future threats.

Free Secure IT Disposal
Sims Recycling

Protect your data we offer collection, data erasure, reuse and recycling of your IT assets that is 100% compliant, secure and sustainable.

GDPR Advisory
Xcina Consulting

GDPR is a regulatory requirement which affects all businesses handling personally identifiable data. This regulation impacts everyone.

Human Phishing Defence Solutions
PhishMe

PhishMe helps small and mid-sized businesses combat the phishing email threat by transforming humans into active security sensors.

iCyber-Shield
iCyber-Security

SMEs seek a trusted, integrated platform to provide affordable, robust, future-proof & proactive cyber-security protection across all assets.

Insight VM
Rapid 7

To effectively manage risk, organisations of all sizes need to understand where and how they are vulnerable to cyber attack.

Intercept-X
Sophos

Ransomware is the number one malware attack affecting organisations. Sophos Intercept X works to prevent malicious encryption of data.

ISMS.online
ISMS.online

SME's need to demonstrate they can be trusted by customers. We've built a secure info sec cloud based service for them to do just that.

London Data Destruction Centre
Data Eliminate Ltd

Eradicates the risks posed by sensitive data held on end of life computers, smart phones, hard drives and other electronic assets.

Panaseer
Panaseer

Small businesses need to focus on what matters most & understand which actions deliver the greatest reduction in risk from vulnerabilities.

Performanta Security Services
Performanta

Businesses choose to work with Performanta because of our breadth of services, industry knowledge and our independence.

Risk Assessment Tool
Titania

SME's worry about cyber attacks but have limited people, time and money. They need pro-level security advice, delivered simply, on demand.

Securonix UEBA
Securonix

Get ahead of Insider Threats and Cyber Attacks with predictive Threat Detection across Users and Entities.

Sentinel
YUDU Sentinel

When an attack impacts your primary systems Sentinel provides an independent document and communication channel to all mobile devices

Smishing Assessment
The AntiSocial Engineer Limited

Our pioneering smishing campaigns test your organisational susceptibility to malicious smishing text messages. We provide staff click rates advanced...

Symantec Endpoint Protection (SEP)
Symantec

Superior protection that fuses technologies in a multi-layered fashion. High-performance, single client, single management console across physical...

Symphonic Suite
Symphonic

Opening up data and systems to customers or third parties needs to be managed to be safe and at the same time easy for trusted partners.

Total Endpoint Protection Platform
Cybereason

Cybereason ensures that companies secure their networks against cyberattacks and reverses the hacker advantage in the connected, digital world.

Unified Security Service (USS)
CensorNet

Cloud Security without Compromise - Integrated Web Security, Email Security, CASB and Multi-Factor Authentication

Yoti
Yoti

Yoti is the easiest way to prove your identity online and in person. Use Yoti to know your customers and protect your business from fraud.

YubiKey
Yubico

The YubiKey facilitates Strong 2 Factor Authentication, eliminates the weaknesses of Username and Password and is effective against Phishing and MTM...

ZoneFox AI
ZoneFox

ZoneFox provides 360 visibility around data flow that security teams need to protect sensitive information against the insider threat.

Product Listing - London Digital Security Centre
MENU