Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

865 results found

865 results found in Lot 2: Cloud software in the category Encryption

  • Bilingual All Licensing Application Process Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ All licensing software provides a single platform to manage Bilingual licence applications. Used as a stand-alone cloud platform or fully integrated, verso can be tailored to mirror and improve your internal workflows and processes. Powering local government licensing schemes.

  • Glow

    BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde

    The innovative evolution of voucher management. Equipped with a powerful API, Glow offers seamless integration for third-party access, enabling automated voucher distribution. Built upon the successful Evouchers.com platform, Glow promises efficiency and convenience, amplified by its advanced connectivity, revolutionising the way vouchers can be disbursed, automatically, by many organisations.

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Altia Covert Operations Solution (ACOS) Source Management

    ABM Intelligence Limited

    ACOS manages all RIPA/IPA authorities and activities. Source Management relates to the recruitment and management of Covert Human Intelligence Sources (CHIS). Centralised location (database) manages: pre-approach, recruitment, registration, Authorisation, reviews, policy logs, contacts, rewards, risk, intelligence (sanitised / unsanitised), deconfliction, compromise, tasking, performance indicators, and all associated activities

  • Totalmobile Reablement and Care at Home solutions

    TotalMobile

    Totalmobile a market leader in mobile workforce management within Reablement and Care at Home services. Help organisations increase efficiency/capacity, support rapid discharge, while ensuring quality and continuity of care. Our solutions include, shift pattern design, Rostering, Careplan management, real time scheduling, job management, IoT integration, analytics, and lone worker protection.

  • BeyondTrust Identity Security Insights

    SOFTCAT PLC

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Massage And Special Treatments Licensing Application Process Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides online self-service massage and special treatment licensing, data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • Altia Covert Operations Solution (ACOS) Surveillance Authorities

    ABM Intelligence Limited

    ACOS offers a comprehensive tool for the management of applications for Directed Surveillance, Intrusive Surveillance, Property Interference, Combined (Intrusive and Property) Surveillance and TEI Warrants (all written and urgent). With easy workflow and compliance with RIPA, IPA, Police Act, GDPR, FOIA and HRA this module ensures legislative compliance.

  • Cybereason EDR Licences

    MONDAS CONSULTING LTD

    Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.

  • Check Point CloudGuard Network Security (CGNS)

    INTEGRITY360 LIMITED

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Computacenter - Palo Alto Cortex XSIAM

    Computacenter (UK) Ltd

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Keyfactor Command

    UNSUNG LIMITED

    Manage & automate digital/TLS certificates in cloud, on-premise & hybrid environments with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • B-SAFE Secure Data Transfer System

    BONDAP LTD

    B-SAFE Secure data transfer is a web-based system to upload, send and share any files and messages securely and rapidly, including large files and data sets. Secure, Auditable, Automated, and Compliant File, Email and Data Transfer and Sharing. Scalable, and secure with encryption as standard for OFFICIAL and OFFICIAL-SENSITIVE.

  • Mydex Master Reference Data Services (MRD)

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    Mydex Master Reference Data Services enable subscribers to quickly and easily access publicly-available API-enabled ‘look-up’ tables at low cost. Data from these tables, ranging from postcodes and IP geolocation addresses through official lists of local authorities, Members of Parliament to commonly recognised health conditions, can be connected to and configured.

  • AvePoint Confide

    SOFTCAT PLC

    Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide

  • Permit Application & Processing Automation - verso™ Software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides Permit Application Automation , data validation and process transformation. Used as a stand-alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of licensing schemes.

  • Ultima AvePoint MyHub for Microsoft 365

    ULTIMA BUSINESS SOLUTIONS LTD.

    Track Teams, Sites, Groups and Communities in Microsoft Office 365? We get it. Time spent searching means less time being productive. Meet MyHub, your one-stop-shop for managing existing Microsoft 365 workspaces and creating new ones—all from Microsoft Teams or our handy web app! Organize, understand, and centrally access your assets.

  • Rubrik Cloud Data Management, Backup and Recovery

    Khipu Networks Limited

    Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.

  • Cloudlake Backup for Google Workspace (G Suite)

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.

  • Digital IoT Tracking and Resource Management

    ISHELP.CO.UK LIMITED

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • Power App

    Clarity Tech Ltd

    We use Microsoft Office 365 which include SharePoint Online, Power App, Exchange Online, Lync Online and Office Professional Plus. Most of these online services have a subset of the features available on their on-premises counterparts. We can help migrate existing systems, or deploy new systems into Office 365.

  • Managed PKI

    ENTRUST (EUROPE) LIMITED

    Managed PKI gives you your own high assurance, dedicated PKI, fully managed (and optionally certified) from Entrust's ultra-secure facilities, located in the UK. With Managed PKI you have a fully bespoke, PKI platform ready for all enterprise certificates, remote signing (TrustedX), eIDAS compliant Qualified Certificates etc.

  • Inclued Citizen Engagement Platform

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    Inclued enables safe, secure, two-way engagement between citizens and organisations. Citizens can publish anonymised profiles of themselves. Subscribers can identify, target and recruit citizens for their services, present incentives and offers, create communities, and seek feedback. Secure data sharing helps eradicate form filling, saving time and effort for all stakeholders.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • Totalmobile Emergency Services: Police Duty Management and Ambulance Resource Management (GRS)

    TotalMobile

    Totalmobile’s trusted GRS solution is market leader in Police Duty Management Systems & Ambulance Resource Management. It enables organisations to effectively plan and deliver complex resource requirements. The system, supported by security cleared personnel, provides a comprehensive set of police and ambulance specific functionality, designed and enhanced over 20+ years.

  • Waste management package

    Pentagull Ltd

    Our Waste Management package combines our residential waste, commercial waste and bulky waste systems into a single package. All three systems are built upon our ESB platform which gives single platform access to all three services making it easier for your staff, residents and customers.

  • AppealsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    AppealsPro is a fully-hosted, cloud-based, legislatively compliant, school appeals management solution that enables Appeal Clerks to administer school admission appeals (including Grammar schools), exclusion reviews and transport appeals. The system also comes with a fully integrated Appellant Portal, School Portal and an optional Panellist Portal (for sending Panel Packs securely).

  • Generative AI for Enterprise with Amazon Q

    DATASUMI LTD

    Datasumi elevates your business by leveraging the power of generative artificial intelligence (AI) through Amazon Q Business. Our all-encompassing training and consulting service, Q Insights, is committed to assisting you in realising the complete value of this innovative technology.

  • ComplaintsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.

  • Certificate Authority as a Service

    Q-SOLUTION LIMITED

    A Private Certificate Authority service, hosted within public cloud, providing X.509 client certificates for users, devices and systems. Designed for use by an organisation or closed community for applications such as API messaging, server mutual TLS, VPNs, IoT devices, mobile device or laptop authentication, user access to secure systems.