Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3896 results found

3896 results found in Lot 2: Cloud software in the category Application security

  • Environmental and Flood Risk Asset Management Software

    AMX Solutions Ltd

    AMX Flood and Environment is a flexible, spatially enabled asset management solution providing comprehensive tools for managing inventory (inc. SUDS), inspection and maintenance planning, flood incident response and detailed, customisable reporting to support KPI’s. Compliant with EA and NRW Datasets. Manage drainage, defences, buildings, MEICA, H&T, instruments, structures, and more

  • Power BI software

    Aspire Systems

    Our Power BI service allows us to create dynamic and interactive data visualisations and robust business intelligence. Embed Power BI reports into bespoke applications, Teams, Power Platform and SharePoint solutions. Provide business intelligence solutions across multiple languages and provide advice on Power BI licensing and Power Platform solutions.

  • Check Point Harmony Endpoint

    LRQA

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Sophos Managed Detection and Response Complete (MDR) Endpoint

    SOFTCAT PLC

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • IRIS Intelligence Environmental, Social, and Governance Management System

    IRIS INTELLIGENCE LIMITED

    IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.

  • Webex Notify

    IMImobile Europe Ltd

    Webex Notify is a cloud based application that allows employees to send customer and internal messages across channels with multiple templates, large contact lists, de-duping and bulk sends. It provides a powerful role-based access control framework to configure the messaging environment, allowing department administrators to define users and templates.

  • COOLSPIRiT a Databarracks Company: Barracuda Email Protection Premium

    COOLSPIRiT, a Databarracks company

    Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.

  • CDW Microsoft Purview Information Protection

    CDW LIMITED

    Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data.

  • MetaLearning Essentials

    MetaCompliance Ltd

    MetaLearning Essentials combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Essentials provides animated and lifelike eLearning courses.

  • Akamai Akamai Cloud Computing

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform enables schools and academy trusts to build and review their cybersecurity policies. This service contains an e-learning module that provides schools and trusts with the capability to deploy customised cybersecurity awareness training and coaching to staff and board members.

  • Barracuda Endpoint XDR

    SCG CORPORATE LIMITED

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Mydex Safe, Secure Cloud for service integration and tranformation (SSC)

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    The need for transformation to locally integrated operational services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. The SSC allows organisations across varying sectors and regulatory environments, working together to deliver joined-up services.

  • Facial Recognition Services

    VIABLE DATA LTD

    Cloud-based facial recognition services for performing business critical functions such as security checks, personnel identification, watch-listing operations and digital travel credentials for immigration, borders, law enforcement and access control functions. Our scalable intelligent identification software platform includes the ability to integrate with existing biometric algorithms.

  • Pathlock Cloud Application Access Governance (AAG)

    Grey Monarch Limited

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Doormouse

    Mimoto

    Doormouse is a cloud hosted network registration portal designed with University Halls of residence in mind. It provides a straight forward interface for students to register their devices for use with the network from within their room.

  • ServiceNow Licences

    ADVANCE SOLUTIONS CORP LTD

    We provide government customers with the ability to purchase licenses across the entire ServiceNow platform. Our ServiceNow professionals are skilled in advising on optimal licensing requirements to maximize the value of your investment, accelerating your time to value through our robust ecosystem.

  • Zero Trust / SASE

    CANTARUS LIMITED

    Secure access service edge, or SASE, is a cloud-based security model that provides network security functions and software defined networking delivered from a single service provider. Kalani have partnered with Cloudflare to provide their best in class Zero-Trust platform with full identity-based security controls.

  • Arcus Government Pack

    ARCUS GLOBAL LIMITED

    Arcus Government Pack supports UK Public Sector organisations in their use of the Salesforce platform by providing features specifically designed for and with governmental organisations. These include financial management and integrated payment channels, data security and publishing, task automation, workflow management, and multi-channel communications.

  • Profile™

    SAPPHIRE TECHNOLOGIES LIMITED

    Our Profile™ SaaS solution guides you through the process of collaborative information gathering, reporting and auditing against compliance frameworks and standards including NCSC's Cyber Assessment Framework (for GovAssure and NIS Directive), HSE's OG86 and IEC/ISA 62443.

  • ProofPoint Email Fraud Defence

    INTEGRITY360 LIMITED

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • govService Digital Services Platform

    GRANICUS-FIRMSTEP LIMITED

    govService (formerly Firmstep) is a web-based, digital services platform for quick and easy creation of online processes. The low-code solution combines forms and process with a customer self-service portal that integrates with citizen request management (CRM), creating a single view. govService integrates to any 3rd party system.

  • govService Digital Customer Experience Platform

    GRANICUS-FIRMSTEP LIMITED

    govService (formerly Firmstep) is a web-based, digital services platform for quick and easy creation of online processes. The low-code solution combines forms and process with a customer self-service portal that integrates with citizen request management (CRM), creating a single view. govService integrates to any 3rd party system.

  • Short Message Service (SMS)

    Reach-Data Ltd

    We provide an enterprise grade, fully resilient Mobile Terminated (MT) and Mobile Originating (MO) SMS service. All messages are processed through our Tier 1, direct connections to the UK mobile networks, ensuring the highest levels of Service, Support, Deliverability and Reliability.

  • Data Subject Access Request Automation

    TMC3 LIMITED

    Privacy rights automation by OneTrust. The platform enables organisations to automate the end-to-end DSAR and other individuals rights fulfilment to meet UK GDPR requirements. Seamlessly automate manual tasks associated with personal data requests through data discovery and robotic automation technology. Operationalise all data subject requests in a single platform.

  • Egress Prevent - Integrated Email Cloud Security - Outbound

    S3 Ltd

    Egress Prevent protects against data breaches by reducing human activated risk. Intelligent DLP technologies combine with custom policies and machine learning to: detect accidental and malicious data loss alert users to potential data breaches stop them before they happen with real-time prompts. Misdirected Emails, Mis-attached file detection & Content Analysis.

  • CDW AvePoint Insights for Microsoft 365

    CDW LIMITED

    Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Government Intranet

    INVOTRA LIMITED

    Invotra's Government Intranet serves hundreds of thousands of UK Civil Servants. Designed to give employees a voice, Invotra's Government Intranet provides the intranet tools people need to self-serve, collaborate and work efficiently. A customisable intranet with people directory, search, analytics, CMS, collaborative apps and integrations that drive productivity and engagement.

  • Data In Motion Encryption

    THALES UK LIMITED

    Thales Data in Motion Encryption solutions offer flexible, vendor-agnostic network connectivity. They support a range of security objectives and network environments, adaptable to evolving requirements. The HSE product range supports Encryption network speeds up to 100Gbps, and platforms range from single to multi-port appliances, available in hardware and virtual solutions.

  • SignServer for Azure and AWS

    Keyfactor

    SignServer Enterprise is a server-side digital signature software used to sign any digital document, and more. SignServer offers high performance and high availability and is designed to perform automated signatures (and other cryptographic operations on digital documents).