Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2156 results found

2156 results found in Lot 2: Cloud software in the category Authentication, identity and access management

  • Artificial Intelligence (AI) Insights Microsoft

    FormusPro

    FormusPro is a certified Microsoft Partner who specialise in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.

  • Appointment management messaging

    BOOMERANG I-COMMS LTD

    An intelligent platform to automate appointment management using our patented threading technology for 2-way messaging. We make it easy to manage appointments and integrate with your booking system / schedule. SMS, EMAIL AND IVR used to set, remind and cancel appointments. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Aridhia Trusted Research Environment (TRE) Workspaces

    ARIDHIA INFORMATICS LIMITED

    Aridhia’s Trusted Research Environment is a cloud-based subscription service giving project teams access to collaborative analytic workspaces tailored to their requirements. Multidisciplinary teams can integrate and interrogate data in a web-accessible workspace pre-configured with analytic technologies,rapid prototyping tools, database storage and compute resources,collaboration features, audit capabilities and information governance functionality.

  • CheckPoint Harmony SASE

    BYTES SOFTWARE SERVICES LIMITED

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats. bssgc

  • Proofpoint Identity Threat Defense & Response (ITDR)

    INTEGRITY360 LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Imprivata Vendor and Privileged Access Management

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data

  • BeyondTrust Privileged Management

    INTEGRITY360 LIMITED

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • Snowflake

    INTERWORKS EUROPE LIMITED

    Integrated data sharing platform with near infinite scalability. data lakes, enterprise data warehouse, data marts, big data storage and analytics. Secure data sharing. Interfaces with leading ETL, ELT visualisation and machine learning tools. Automatic load based scaling. Upgrades, patches, backups, load-balancing, maintenance and tuning are all handled automatically. NHS expertise,

  • AvePoint EnPower for Microsoft 365

    PHOENIX SOFTWARE LIMITED

    As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.

  • ML Ops Assurance Pipeline

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Assurance Pipeline Service melds automated ML deployment with scalability, boosting efficiency through features such as automated data prep and orchestration. It supports custom architectures, speeds up model launches with CI/CD, and secures operations with detailed logging. Optimising costs and performance, it’s perfect for effortlessly crafting top-tier ML environments.

  • API Manager

    VE3 GLOBAL LTD

    API Manager is a robust platform designed to streamline the lifecycle management of APIs. It enables secure integration, deployment, and monitoring of APIs across organizational ecosystems. This service enhances connectivity, enforces security protocols, and provides analytics to optimize API performance, ensuring efficient digital operations.

  • NHS Secure Data Environment (SCHOLAR)

    PRESCRIBING SERVICES LTD

    Eclipse SCHOLAR (Secure Clinical Hub for Online Learning Audit & Research) empowers NHS ICBs to effortlessly implement a secure pseudonymised data environment for regional activities with full data specialist support. The system allows ICBs to work collaboratively on research programmes with 28 million live patient portals already integrated.

  • Logit.io Application Performance Monitoring and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Netskope - Web and Cloud Security

    INTEGRITY360 LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality

  • Phone Verification

    MELISSA DATA LTD.

    Global Phone Verification can check whether a phone number is valid. Mobile numbers can be detected as live and connected, and CallerID taps into real-time carrier data to return the name of the person or business associated with the number at activation.

  • Luciditi Identity Verification (Right to Work, Right to Rent DBS Checks)

    ARISSIAN LTD

    The Luciditi digital identity services allows secure MUTUAL digital verification & authentication of individuals and third parties. Available through a mobile app or an embedded service utilising technology with automated liveness detection and document authenticity checks, to streamline on boarding processes or authenticate communications between parties.

  • Qualys Cloud Platform (QCP)

    SOFTCAT PLC

    Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.

  • Duty planning solution

    BOOMERANG I-COMMS LTD

    Boomerang can manage multiple vacancies for temporary appointments, one-off events or recurring requirements. It contacts, counts and fulfils based on requirement. System manages shifts, overtime and emergency manning. It informs a candidate pool of new vacancies, developing rosters and manages out-of-hours support. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Portal Build Accelerator - PearDrop

    INFLUENTIAL SOFTWARE SERVICES LIMITED

    A portal development accelerator tool, enabling configurable workflow portals for common business operations (such as bookings, customer/user/supplier management etc)

  • IBM Security - Trusteer Pinpoint

    IBM UNITED KINGDOM LIMITED

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.

  • DarkBlue® Intelligence Suite ​ Software as a Service (SaaS)

    CACI LIMITED

    DarkBlue® is a safe space for investigators to explore the Open, Deep and Dark web. With over 6 billion AI-enhanced records, collected over two decades, it unlocks the Deep & Dark Web without direct exposure. Daily scraping of 600,000-800,000 new records ensures DarkBlue® remains a vital tool for intelligence gathering.

  • DevSecOps Integration

    DEFENCE DATASEC LTD

    "At Defence DataSec, our AWS Networking Services offer Government Departments robust and scalable networking solutions. We specialize in designing and implementing AWS networking services such as VPC, Direct Connect, and Route 53, ensuring secure communication between resources. "

  • Falcon Next Gen SIEM

    PHOENIX SOFTWARE LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Pegasystems Cloud Software - Customer/Citizen Decisioning

    PEGASYSTEMS LIMITED

    Pega is a low-code platform for AI-powered decisioning and workflow automation. We enable organisations to get work done using apps that are secure, scalable, governed, and maintainable. We offer solutions for business process management, digital process automation, and customer/citizen engagement.Customer/Citizen Decisioning is a key part of the platform.

  • Elected members ward funding

    PENTAGULL LTD

    A cloud software service that meets all the requirements for the management of ward funding applications. With a strong emphasis on mobile working, the system streamlines the application process to keep input time to a minimum. Workflow that effectively manages the approval, validation and payment sub-processes within the application procedure.

  • AvePoint Cloud Governance for Microsot 365

    SOFTCAT PLC

    "M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform. Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization."

  • Policing communications platform

    BOOMERANG I-COMMS LTD

    Intelligent, automated, threaded messaging designed for the Police. Multi-channel broadcasts, conversational SMS, Email and voice messaging, and appointment management all from an easy-to-use user interface, email inbox or integrated through API. A communication solution for the Police to streamline and manage workflows. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Konsolute - Microsoft Cloud Security Services

    KONSOLUTE LTD

    Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.

  • Inoapps Rental Management

    INOAPPS LIMITED

    Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime. Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.

  • NQM LLM Platform

    NQUIRINGMINDS LIMITED

    The NQM LLM Platform provides a next generation platform for building and deploying AI applications- large language models (LLM) and generative AI. It provides simple means to rapidly build and deploy chatbots and agents through pre-configured cookie-cutters, also allows for creation of arbitrarily complex data analytics/ processing workflows involving AI.