Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

802 results found

802 results found in Lot 2: Cloud software in the category Remote access

  • Business Operations Case Management System

    Claritas Solutions Ltd

    Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Pathpoint® Rehabilitation

    Open Medical Ltd

    Developed by clinicians, Pathpoint® Rehabilitation is a versatile, cloud-based clinical coordination platform, which digitises the entire patient rehab pathway from initial intervention in the hospital, onwards to community rehab settings. Includes referral management, structured documentation, allied therapy pathways (physio, OT etc) and patient engagement. Prehabilitation workflows also available.

  • HYDRAX Secure Mobile Device Management Service

    Phonehub IO Ltd

    Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.

  • OCF - YellowDog Platform

    OCF LIMITED

    YellowDog is a compute workload management platform that schedules and provisions workloads whether they are on-premise or across a public or private cloud. Using YellowDog, customers can build HPC scale clusters in any cloud, on any instances and in any location around the world.

  • F5 BigIP VE Distributed Cloud, Silverline/App Protect, Nginx & Evolve Support

    BlueFort Security Ltd

    F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.

  • Business Continuity, Resilience and Risk Management Software with Hosting (SaaS)

    Continuity2 ltd

    "Meridian" BCMS is a web based tool designed to automate and alleviate the everyday management of an organisation’s Business Continuity Management System and delivers compliance to ISO22301 and FCA Operational Resilience standards. The system delivers all aspects of Resilience ,Risk Assessments , BIAs, Dependency Mapping, Scenarios Planning, Testing, Notification/Incident Management.

  • KickSecure Managed Patching and RMM Services as a Service

    Kick ICT

    An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.

  • Entity Resolution Driven Data Analysis And Exploitation Service

    DATA-EDGE ANALYTICS LTD

    The service provides a single view of an entity. It resolves entities (organisations/people/objects) from records, at scale, in real time, with full 'explainability'. The system incorporates data transformation, pipelines, ingestion, storage, alerting, entity analysis, graphing and visualisation tools for users. The system feeds downstream analysis systems.

  • Tessian ICES

    INTEGRITY360 LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • FibriCheck

    FibriCheck

    FibriCheck is a device agnostic, hardware free, cloud based digital application that transforms smartphones/ smartwatches into a medical device, detecting and following-up on cardiac arrhythmias. Users simply download to create an account, perform measurements, getting real-time results and reports, which can be securely shared with their provider to inform decision-making.

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Barrier Networks

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Micro Focus, now OpenText - OpenText Core IAM Foundation on SaaS

    MICRO FOCUS

    OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides: • Identity Governance • Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework • Password Management • Identity Intelligence Basic

  • Egress Defend - Integrated Cloud Email Security

    S3 Ltd

    Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.

  • Identity and access management (IDAM)

    Zaizi Limited

    Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions. We provide skills and advice guiding you from discovery through to implementation.

  • AV Support

    SPS UK&I LIMITED

    Our comprehensive cloud-based AV device monitoring solution offers real-time insights into your AV/UC estate, from room utilisation and equipment status to usage patterns and performance metrics. Offering remote management, consultancy, equipment procurement, and maintenance services, with automatic service call generation and live dashboard reporting for enhanced operational efficiency.

  • Pathpoint® Theatre Management System

    Open Medical Ltd

    Pathpoint® Theatre Management solution provides effective management and oversight of a hospital’s theatre activity. Includes intraoperative documentation, live theatre dashboard, recording of delays and cancellations. Real-time tracking of cases and equipment recording workflows. SNOMED-CT coded data delivers superior reporting and analytics.

  • IBM Watson Query

    IBM United Kingdom Ltd

    IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.

  • Azure Virtual Desktop Solution

    DO Business Services Limited

    Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.

  • Maxcourse

    MAXINITY SOFTWARE LIMITED

    Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.

  • Proofpoint Insider Threat Management

    INTEGRITY360 LIMITED

    Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.

  • SecurEnvoy MFA / Identity Access Platform

    Chess CyberSecurity Ltd

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Microsoft 365 Business Process Automation

    Cloud Cover IT Limited

    Microsoft Office 365 is a cloud-based subscription service that brings together the best tools for the way people work today . Empower your team - get the toolkit you need for easy collaboration, improved compliance, and advanced security. Cloud Cover IT provide a complete Microsoft Solution including training and support

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Microsoft Power Platform

    Kick ICT

    Encompassing Power BI, Power Apps and Power Automate, Power Platform enables rapid development and deployment of business application. Our expertise enables customers to harness the Power Platform and deliver innovative solutions and workflows into their business. Our service includes developing, consulting, deploying and supporting Power Platform based business applications.

  • Altia Covert Operations Solution (ACOS) Source Management

    ABM Intelligence Limited

    ACOS manages all RIPA/IPA authorities and activities. Source Management relates to the recruitment and management of Covert Human Intelligence Sources (CHIS). Centralised location (database) manages: pre-approach, recruitment, registration, Authorisation, reviews, policy logs, contacts, rewards, risk, intelligence (sanitised / unsanitised), deconfliction, compromise, tasking, performance indicators, and all associated activities

  • Abaco Geophoto

    ABACO(UK) LIMITED

    Mobile application providing one of the most advanced certified geotagged photo systems, tracking and supporting multiple types of checks and requests to collect and manage certified images, evidencing activity, capturing objects in the field. Highly configurable, localised “look and feel”, business process integration, comprehensive back-office management of communications and tasks.

  • BeyondTrust Identity Security Insights

    Softcat Limited

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Altia Covert Operations Solution (ACOS) Surveillance Authorities

    ABM Intelligence Limited

    ACOS offers a comprehensive tool for the management of applications for Directed Surveillance, Intrusive Surveillance, Property Interference, Combined (Intrusive and Property) Surveillance and TEI Warrants (all written and urgent). With easy workflow and compliance with RIPA, IPA, Police Act, GDPR, FOIA and HRA this module ensures legislative compliance.

  • Check Point CloudGuard Network Security (CGNS)

    INTEGRITY360 LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Computacenter - Palo Alto Cortex XSIAM

    Computacenter (UK) Ltd

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents