Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

822 results found

822 results found in Lot 2: Cloud software in the category Remote access

  • Access PeopleHR

    The Access Group

    Our HR solution combines the latest technology with HR best practice. This helps automate your most repetitive tasks while enabling you to acquire, on-board, develop, nurture and retain your talent. Our solution provides a secure, flexible and scalable platform for your People data and processes, and integrates with our Payroll.

  • Computacenter - Proofpoint DLP Transform Package

    Computacenter (UK) Ltd

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Privileged Access Management (PAM) & Identity as a Service (IDaaS)

    EXPONENTIAL-E LIMITED

    The PAM Service allows policies and identities to be to be defined and managed for human and non-human (machine) identities requiring privileged credentials. Time bound sessions are monitored, logged, recorded, and stored for compliance and audit. Context aware MFA and SSO are integrated, with remote access for external vendors controlled.

  • Sophos Endpoint Security, Intercept X, XDR & MTR

    SOUTHERN COMMUNICATIONS CORPORATE SOLUTIONS LIMITED

    Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.

  • Altia Covert Operations Solution (ACOS) Community Intelligence / Information in Confidence

    ABM Intelligence Limited

    ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.

  • Check Point VSX

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Check Point VSX (Virtual System Extension) is a comprehensive network security solution that offers robust virtual firewall and VPN capabilities. It enables businesses to create multiple virtualised security gateways within a single hardware appliance, enhancing security flexibility and efficiency while reducing operational costs.

  • boxxe Cisco ThousandEyes

    BOXXE LIMITED

    ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.

  • UK Sovereign Symmetric Key Agreement - Arqit

    NINE23 LTD

    UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • Computacenter - IBM Netezza as a Service

    Computacenter (UK) Ltd

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    NINE23 LTD

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • Intranet and Digital Workplace in Microsoft SharePoint 365

    NEXER DIGITAL LTD

    Nexer is a global Gold Partner to Microsoft. We help organisations make better use of Microsoft products, through user research, design, implementation and ongoing support. We have our own intranet product based on SharePoint, Core, that integrates with Teams, Viva and Microsoft 365. We also offer "out-of-the-box" SharePoint solutions.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    BYTES SOFTWARE SERVICES LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc

  • Self-managed TAK Server

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Global VAT Reporting Tool (GVRT)

    ERNST & YOUNG LLP

    GVRT is a cloud-hosted, global Value Added Tax (VAT) and Goods and Services Tax (GST) reporting solution, that redefines and globally standardises the preparation, production, and reporting process of the business. EY GVRT is designed to simplify, digitise, and automate your indirect tax compliance, helping future proof your organisation.

  • Beyondtrust Remote Support

    CYBERIAM HOLDINGS LIMITED

    BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.

  • Pathpoint® ePOA - Pre-operative Assessment

    Open Medical Ltd

    Pathpoint® digital pre-operative assessment (ePOA) platform connects surgical and pre-op teams in an end-to-end perioperative workflow. Best practice screening questionnaire based on GIRFT, with automated risk stratification and configurable worklists. Full integration enables automation of pathway. Perioperative workflows including diabetes and prehabilitation. SNOMED-CT coded data delivers superior reporting and analytics.

  • MTI Hybrid Datacenter- Rationalisation & Migration

    MTI TECHNOLOGY LIMITED

    MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Efecte Cloud Based Service Management

    Matrix42 Sweden AB

    Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management (ITSM & ESM), Identity and Access Management (IAM), and Conversational IT. With our innovative and scalable solutions, organizations can streamline operations, enhance productivity, and achieve digital transformation goals.

  • Inoapps Customer Billing Management

    INOAPPS LIMITED

    Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.

  • DXC Technology Enterprise Applications Management (Oracle)

    ENTSERV UK LIMITED

    Management of Secure ERP solutions for Local and Government clients. Provides full stack of managed cloud services for Oracle applications. Delivered via secure cloud or hosted in secure DXC UK-based data centre.

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Jamf Apple Device Management and Security Solutions for Education

    GBM DIGITAL TECHNOLOGIES LIMITED

    Jamf allows educational institutions to easily manage and secure their Apple ecosystem, enabling them to support equitable learning with iPad. Jamf provides a complete and comprehensive management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy.

  • Akamai Enterprise Application Access - Akamai EAA

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Provide Zero Trust Network Access with Akamai Enterprise Application Access — identity-aware security to replace your VPN. Akamai’s Enterprise Application Access (EAA) is an Identity-Aware Proxy (IAP) in the cloud. The solution is part of Akamai’s highly scalable performance edge platform and bypasses the need for network access.

  • Backup as a Service

    Kick ICT

    Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.

  • Apollo

    IDOX SOFTWARE LTD

    An asset and fault management system which integrates with existing systems (such as UTC, RMS, Wisnet) to allow faults to be identified automatically with no manual intervention and processed automatically through to an Engineer.