Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2181 results found

2181 results found in Lot 2: Cloud software in the category Authentication, identity and access management

  • Miya Command

    ALCIDION UK LIMITED

    Miya Command ingests data to create real-time visualisations that display the current and future status and immediately highlights potential constraints. Visual cues indicate areas of potential over and under-utilisation. This information incorporates all patient movements across an episode of care, from admission through to discharge and beyond.

  • MIS/Arbor

    INTERM IT (UK) LIMITED

    Fully managed support for Arbor. This will include but not limited to password resets, user creation, MFA configuration, Security configuration, end user support, group configuration, running reports, report creation, instructions manual usage, support portal.

  • Vulnerable person safety solution

    Boomalert Ltd

    Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations. ISO-27001, Cyber Essentials, and Cyber Essentials Plus.

  • Advania Private Chat GPT solution

    Advania

    Advania's 'Private ChatGPT' solution, entirely hosted in your Azure environment, ensures data privacy and security. No data is shared with the internet or Microsoft/OpenAI, nor used for external model training. Our solution upholds 'trusted Azure' benefits like compliance and data sovereignty. Users interact via a web application featuring your branding.

  • Taxi & Private Hire Bilingual Licensing Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso licensing software provides Bilingual Taxi & Private Hire Licensing Automation, data validation and process transformation. Used as a stand alone system or fully integrated, verso™ can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    AVELLA SECURITY LIMITED

    Following a Zero Trust Network Model, as recommended by NCSC, The service provides ZPA/ZIA licenses and additional deployment services for ZScaler Internet Access/Zscaler Private Access. Provides access to legacy applications, either hosted on site, or via the PSN Gateway. Supports XP, Win8, Win10, Mac, Mobiles, Browser based access.

  • Advanced Analytical Data Science Capability to Counter Fraud

    VE3 GLOBAL LTD

    The Advanced Analytical Data Science Capability to Counter Fraud leverages sophisticated machine learning algorithms and statistical methods to identify, analyze, and prevent fraudulent activities. This service enhances security by detecting anomalies and predictive patterns, offering actionable insights that enable organizations to safeguard their operations and minimize financial losses effectively.

  • Integration Services

    Espire Infolabs Limited

    Espire helps companies to re-engineer their application landscape for seamless interoperability and interaction between disparate systems. Espire can build boundary-less businesses by securely connecting technologies,database processes and applications across the enterprises. Espire's Enterprise Integrations practice brings capabilities around API Management, EnterpriseServiceBus, Application Data Integration,IoT for applications and devices hosted on-prem/on-cloud.

  • Heimdal Security

    SOFTCAT PLC

    At Heimdal Security, we specialize in automation and consolidation, offering automated smart solutions that deliver immediate ROI by tackling key challenges such as alert fatigue, resource allocation, Automated D&R and compliance reporting.

  • Workspace ONE Assist

    XTRAVIRT LIMITED

    Workspace ONE Assist is a real-time remote support solution that enables IT and help desk staff to quickly assist employees with mobile and laptop device tasks or issues, decreasing downtime, maximizing productivity, and improving the overall employee experience.

  • Proofpoint Security Awareness Training

    INTEGRITY360 LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Business Processes and Consultancy

    MASS CONSULTANTS LIMITED

    Within MASS are teams that are committed to research and innovation, product management, communications and marketing, and digital services. These teams successfully help find buyer problems and needs by following a design-thinking (‘discover, define, develop and deliver’) process, and ideate and solve by exploring data (secondary and primary).

  • Digital and Electronic Signatures

    Digidentity B.V.

    Our eIDAS compliant digital signing service allows you to sign documents electronically. We can provide advanced and qualified e-signatures (AES and QES). The product allows users to digitally sign documents remotely in a secure and convenient way in accordance with UK and EU law. Works with Adobe and Docusign.

  • Inoapps Subcontractor Management Cloud

    INOAPPS LIMITED

    With our Subcontractor Management module for Oracle Cloud Enterprise Resource Planning (ERP), you can keep track of all aspects of your subcontractor lifecycle. Inoapps' Subcontractor Management Cloud integrates with Oracle Cloud ERP to deliver holistic business support from beginning to end.

  • Proofpoint Core - P1 Bundle

    INTEGRITY360 LIMITED

    Train end-users against threats. Augment threat-protection with a robust security-awareness training-programme integrated with email-security controls and phishing-simulations, cultural/knowledge assessments, comprehensive training/awareness. Tailored curriculum delivered to users based on actual threats. Full-catalogue of interactive training/tools designed to change end-user behaviour. Capabilities:threat simulations testing user response to phishing-attacks, 40+languages, 13 categories.

  • Pavement Licensing - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides Pavement Licensing Automation, data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    PHOENIX SOFTWARE LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • Facilities Management with Dynamics 365 Field Services

    TELEFÓNICA TECH UK BUSINESS APPLICATIONS LIMITED

    Utilising Microsoft Dynamics 365 Field Service, our solution enhances Facilities Management efficiency. Dynamics 365 integrates building operations, maintenance, asset management, and energy consumption. This comprehensive solution streamlines facilities management, ensuring optimal performance and extended asset lifecycles.

  • Data (Discovery, Orchestration, Modelling, Migration , Architecture, Governance) Services

    E-ZEST SOLUTIONS LIMITED

    e-Zest, an agile digital technology innovation partner for Fortune 500 enterprises, publicsector organisations and software product companies. Leveraging specializations and partnerships with multiple global cloud principles, we develop custom cloud softwares with special focus in Microsoft, AWS, Snowflake,Synapse, Databricks, SQL etc.). Services focused on data engineering, Legacy transformations,CI/CD, SQL/NoSQL consulting.

  • Corporate Alerting

    Boomalert Ltd

    BoomAlert automates incident communication. Build bespoke communication workflows, meet requirements for critical events. Alerting workflows automate coordinated processes based on responses, time triggers, count triggers and escalation paths. Critical Alerting, Incident Management, Business Continuity, IT Monitoring, Machine-2-Machine Alerting, Event Management. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited.

  • CPaaS solution

    BOOMERANG I-COMMS LTD

    Boomerang's Communication Platform offers comprehensive communication solutions from a unified platform. Built-in intelligence ensures message matching, empowering developers to create automated conversational workflows. Access channels like SMS, Email, Voice, RCS, WhatsApp. Intelligent Messaging ensures seamless conversational engagements, driving automation in communication processes. ISO-27001, Cyber Essentials, and Cyber Essentials Plus accredited.

  • MTI Forcepoint ONE

    MTI TECHNOLOGY LIMITED

    Forcepoint ONE combines Zero Trust and SASE security technologies, including three secure access gateways and a variety of shared threat protection and data security services, all built on a cloud-native platform. This allows the public sector to adapt quickly to hybrid-working while keeping attackers out and sensitive data in.

  • Agile Software Engineering

    ENDAVA (UK) LIMITED

    Endava help you deliver effective, high-quality software, predictably, using modern software development processes, practices and tools. Our engineering-led approach means that our software is well-built and forms a solid, sustainable base for the success of your business.

  • Computacenter - Infoblox BloxOne Threat Défense

    COMPUTACENTER (UK) LIMITED

    Infoblox BloxOne Threat Defense Advanced, a comprehensive DNS Detection and Response (DNSDR) solution, detects threats and stops attacks by hunted/pre-campaign/DNS threat intelligence. Intelligent ecosystem integration/automation/AI-driven analytics to reduce MTTR, improve ROI of security tools, and SecOps efficiency. Lookalike Domain Monitoring/Takedown services enable businesses to efficiently protect their brand and customers.

  • Computacenter - CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    COMPUTACENTER (UK) LIMITED

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Arcus Report It

    ARCUS GLOBAL LIMITED

    ‘Report It’ provides online forms which enable citizens and businesses to report issues and apply for services through the Digital Services Hub (DSH). ‘Report It’ also includes a form builder and template forms that make it simple for organisations to build their own online forms.

  • OneSpan Sign - Electronic Signature, eSign, Digital Signature, Digital Agreements

    SOMERFORD ASSOCIATES LIMITED

    OneSpan Sign allows to securely, view, approve, automate and eSign documents and forms using digital signatures in accordance with Trust Services and Electronic Identification (eIDAS). The platform is offered as ‘out-of-the-box’ application and as a tool for application developers to rapidly integrate e-signature functionality.

  • Bitdefender Gravityzone - Next-Gen Endpoint Antivirus

    NETWORK UTILITIES (SYSTEMS) LIMITED

    Bitdefender GravityZone Enterprise is a cybersecurity solution for organisations, offering advanced threat protection and endpoint security for devices like servers, desktops, and mobile devices. It combines anti-malware, anti-ransomware, and Endpoint Detection and Response (EDR) capabilities to defend against various cyber threats.

  • CDW Sophos Mobile (CMA)

    CDW LIMITED

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Ethical Phishing Campaign

    VISIONIST LIMITED

    Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.