Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Trustmarque Palo Alto Cortex XSOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Security (Information Assurance) Architecture

    MAZIK GLOBAL LIMITED

    The design, documentation and assurance of secure technical architectures used for hosting applications. e.g. the Security Architecture that underpins a Risk Management Accreditation Document Set or equivalent. The mitigation of vulnerabilities. Quality Assurance of existing capability. Use of government standards e.g. Security Policy Framework (SPF).

  • Legacy Application Migration

    CIRRO LIMITED

    Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.

  • Eagle Eye Cloud CCTV provided by Reliance High-Tech

    Reliance High-Tech Ltd

    Eagle Eye Networks VMS allows the transmission, storage and retrival of CCTV footage within a flexible cloud platform. Cloud stored video footage can be accessed by users from any location via web browser and mobile applications.

  • SentinelOne Managed Endpoint Detection & Response (MDR)

    EXPONENTIAL-E LIMITED

    SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux. SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.

  • Cloudflare

    CDS

    CDS provides Cloudflare consulting, implementation, and managed services to protect websites and applications, improve website and application performance, identity and access management (zero trust), protect and accelerate networks and manage cloud deployments. CDS provides training , or can fully manage the environment on your behalf.

  • Proofpoint Core Plus Package

    PHOENIX SOFTWARE LIMITED

    Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.

  • VouchforMe

    AVOCO SECURE LIMITED

    VouchforMe provides Vouching-as-a-Service. It is integrated into existing government identity services, like One Login, to verify people offline; a citizen unable to verify themselves using online methods can be vouched, offline, by a trusted Voucher, such as an educational establishment, health clinic, government office, etc.

  • Salesforce Community Cloud Services

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Salesforce Community Cloud Services tailored for government departments. We collaborate with government entities to create secure,engaging online communities for citizens, employees, and stakeholders.Our expertise includes customized community design,seamless integration with existing systems,and comprehensive support to foster effective collaboration and communication within the government ecosystem.

  • Proofpoint Essentials

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc

  • Galaxkey Secure Workspace

    INTEGRITY360 LIMITED

    Galaxkey Secure Workspace for secure file transfer, sharing and collaboration. Features include: secure collaboration, file sharing, encryption, unlimited file size. All with central management and complete white labelling capabilities. Encryption is CPA Certified by the NCSC.

  • Proofpoint Identity Threat Defense & Response (ITDR)

    INTEGRITY360 LIMITED

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • Imprivata Vendor and Privileged Access Management

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data

  • BeyondTrust Privileged Management

    INTEGRITY360 LIMITED

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • BMC Helix Discovery

    Fusion Business Solutions (UK) Limited

    BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.

  • ML Ops Assurance Pipeline

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Assurance Pipeline Service melds automated ML deployment with scalability, boosting efficiency through features such as automated data prep and orchestration. It supports custom architectures, speeds up model launches with CI/CD, and secures operations with detailed logging. Optimising costs and performance, it’s perfect for effortlessly crafting top-tier ML environments.

  • Intelligent Automation - RPA, Intake, BPM, Machine Learning , NLP, Analytics & Visualization

    VE3 GLOBAL LTD

    VE3's Digital Workforce integrates intelligent automation solutions to elevate your business processes. We employ a domain-centric and tool-based strategy to prioritize end-to-end automation. Our proprietary catalysts accelerate your path to a digital future and elevate the digital intelligence of your operations.

  • API Manager

    VE3 GLOBAL LTD

    API Manager is a robust platform designed to streamline the lifecycle management of APIs. It enables secure integration, deployment, and monitoring of APIs across organizational ecosystems. This service enhances connectivity, enforces security protocols, and provides analytics to optimize API performance, ensuring efficient digital operations.

  • Logit.io Application Performance Monitoring and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Tenable Vulnerability Assessment Scanning and Management as a Service

    PLANNED LINK LTD

    A cloud-based vulnerability management solution

  • Netskope - Web and Cloud Security

    INTEGRITY360 LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality

  • Sophos Intercept X Server

    SOFTCAT PLC

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • IBM Security - Trusteer Pinpoint

    IBM UNITED KINGDOM LIMITED

    IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.

  • DevSecOps Integration

    DEFENCE DATASEC LTD

    "At Defence DataSec, our AWS Networking Services offer Government Departments robust and scalable networking solutions. We specialize in designing and implementing AWS networking services such as VPC, Direct Connect, and Route 53, ensuring secure communication between resources. "

  • AI Augmentation for Building Opex & Decarbonisation

    FUTURE DECISIONS LTD

    We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.

  • Konsolute - Microsoft Cloud Security Services

    KONSOLUTE

    Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.

  • Inoapps Rental Management

    INOAPPS LIMITED

    Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime. Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.

  • AWS Marketplace - BYOL

    SOFTCAT PLC

    AWS Marketplace is a curated digital catalogue that makes it easy for Buyers to find, buy, deploy, and manage third-party software, AI/ML models and algorithms and the data sets they need to build solutions and run their organisations. The service available on GCloud 12 is ‘Bring Your Own Licence’ (BYOL).

  • SolarWinds Network Performance Monitor (NPM) License

    Prosperon Networks Ltd

    SolarWinds® Network Performance Monitor (NPM) is a simple, powerful and affordable monitoring solution that enables you to quickly diagnose and resolve network performance problems and outages. Now with deep packet inspection and analysis, you can quickly and accurately identify network and application reliability.

  • Umbraco Migrations

    MORIYAMA LIMITED

    Moriyama offer migration services where content and assets are moved from your outgoing Umbraco CMS to the new back-office, as part of a major version upgrade or rebuild, or as part of a process of merging platforms together.