Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2514 results found

2514 results found in Lot 2: Cloud software in the category Security

  • Sophos Intercept X Advanced

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security. bssgc

  • Forcepoint Insider Threat (FIT)

    SOFTCAT PLC

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 20 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Data Analysis and Data Modeling

    LEFKE IT LIMITED

    LefkeIT specializes in Data Analysis and Data Modeling. Our expert team conducts thorough analysis of your data, extracting valuable insights to drive informed decision-making. Through advanced modeling techniques, we structure data for optimal storage, retrieval, and analysis, ensuring accuracy and efficiency in your data-driven initiatives.

  • No-Code user-centred GenAIOps Platform

    GREAT WAVE AI LIMITED

    No-code platform for the creation of generative AI apps and agents. LLM agnostic, configurable Retrieval Augmented Generation (RAG) capability, GenAI evaluation and observability OOTB, industry-leading guardrails deliverable via plain text and a range of ready-made integrations. All build in-line with GenAIOps Principles.

  • Netwrix Password Reset

    INTEGRITY360 LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity

  • SAP Testing and Quality Assurance

    DEFENCE DATASEC LTD

    At Defence DataSec, our SAP Testing and Quality Assurance services are tailored for Government Departments. We specialize in comprehensive testing strategies, including functional, performance, and regression testing, ensuring the reliability and quality of SAP implementations. Trust us for rigorous testing processes that deliver reliable and high-performing SAP solutions.

  • Innovation Accelerators

    NAIMURI LIMITED

    Naimuri offers two accelerated offerings; Innovation Sprints - working with our technology experts in a one-week sprint, to innovate and prove concepts. Data Analytic Laboratories - a structured one or two week programme to understand the fundamentals of your data problems. Both deliver working solutions demonstrating benefits and mission impact.

  • Law Enforcement Information Sharing Agreements (ISAs)

    COALESCENT LIMITED

    Dapian has been designed by police forces and national bodies, to empower non-experts in the wider business to take responsibility for their law enforcement data protection processes. Organisations can complete, signoff, store, share and collaborate on Information Sharing Agreements.

  • Biobank management system

    OMDA HEALTH ANALYTICS LIMITED

    Cloud-based database web application for bio-specimen management.

  • Systm 1 SMS Messaging

    MMG Mobile Marketing Group

    Messaging alert services. SMS, Email, Voice and HLR , Multi-Channel Campaign Manager. The most highly accredited SMS provider for Security. UKAS Accredited ISO-27001, ISO9001, Cyber Essentials, Cyber Essentials Plus & Secure Digital Transactions Kitemark accredited. MMG delivers more SMS messages for UK Central and Local Government than any other provider

  • Computacenter - ProofPoint Email Fraud Defence

    Computacenter (UK) Ltd

    Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.

  • SailPoint IdentityNow - Cloud Identity Governance Service

    CYBERIAM HOLDINGS LIMITED

    Cloud based Identity Governance solution from leading identity vendor, SailPoint. IdentityNow enables business friendly identity governance via access request, access certification and effective provisioning and deprovisioning of joiners, movers and leavers, along with improved productivity and Password Management capabilities. Patented Zero Knowledge Encryption security model.

  • iboss Zero Trust Edge

    BLUEFORT SECURITY LIMITED

    The iboss Zero Trust Edge prevents breaches by making applications, data and services inaccessible to attackers while allowing trusted users to securely and directly connect to protected resources from anywhere. Providing customers with a containerized architecture built for infinite scalability.

  • Computacenter - Proofpoint Essentials

    Computacenter (UK) Ltd

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time.

  • Check Point Harmony SaaS

    Charterhouse Voice & Data

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Crown Time & Attendance Flexitime Suite

    Crown Computing Limited

    This suite equips organisations to easily manage flexible working patterns with real-time data. Designed for HR, Finance and Operations to reduce the burden of people management, driving down costs, paying people accurately, reducing absenteeism, improving efficiencies. Data security and reliability are paramount. Fully configurable and interfaces with any third-party system.

  • Caveris ICAS (Information & Cyber Assurance Suite) SaaS

    CIRRO LIMITED

    Cirro, with Caveris, offers continuous visibility of your cyber protection measures. Our service enables you to identify existing weaknesses, focus efforts on bolstering defences, reducing risks, and ensuring compliance. With our comprehensive monitoring, you can stay ahead of potential threats and safeguard your organisation's digital assets effectively

  • Akamai APP and API Protector (AAP)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Akamai App & API Protector is a cloud-based web application and API protection (WAAP) solution featuring powerful protections that are at once highly automated and easy to operate. Includes web application and API protections, application DDoS, and bot visibility and mitigation, API Discovery, Site Shield, SIEM Integration, DDoS Fee Protection.

  • Forcepoint Data Loss Prevention (DLP)

    Cyberlab

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).

  • Proofpoint Tessian ICES

    PHOENIX SOFTWARE LIMITED

    Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.

  • Verdict Cyber Security Analysis Service

    ACTIONABLE LTD

    Verdict Cyber is the latest generation cyber security analysis platform. Verdict is an automated cyber security App Store using analytics including deep learning AI to provide users with the most authoritative cyber security verdict about any file type. Verdict enable experts and beginners to perform file analysis.

  • Forescout Threat Detection and Response (XDR)

    BYTES SOFTWARE SERVICES LIMITED

    Forescout XDR converts telemetry and logs into high fidelity, SOC-actionable probable threats. bssgc

  • Agent Assisted Payments

    ECKOH UK LIMITED

    A PCI Level 1 compliant agent-assisted payment solution that enables your customer to make secure payments across all channels including phone and chat, when speaking with an agent. CallGuard allows for full de-scoping for Card Not Present (CNP) payments allowing our clients to certify for PCI using SAQ-A or SAQ-D.

  • Behavioural Solutions – Sentiment Analysis

    VIABLE DATA LTD

    Viable Data provide behavioural solutions including sentiment analysis to detect individual behaviour and emotion, well-placed for immigration, borders and law enforcement and security services based organisations.

  • CheckPoint Harmony Mobile

    BYTES SOFTWARE SERVICES LIMITED

    A Complete threat defence solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience. bssgc

  • Nutanix Disaster Recovery Planning service

    HYPER TALENT SOLUTIONS LTD

    Nutanix Disaster Recovery Planning Service offers robust strategies to safeguard critical data and applications against unforeseen events. It focuses on creating resilient, rapid recovery solutions, minimizing downtime and data loss. This service ensures business continuity through customized recovery plans, leveraging advanced technologies for efficient and reliable disaster response.

  • Proofpoint Security Awareness Training

    SOFTCAT PLC

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Real Time Passenger Information (RTPI) Lite using Bus Open Data Service (BODS)

    R2P Systems UK Ltd

    BODS provides us with vehicle position and schedule information that is connected to our system via a secured API. The main advantage of this system is the ability to produce real-time predictions across multiple bus operators and various localities.

  • Case Management System

    CLARITAS SOLUTIONS LIMITED

    Case Management System empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • MTI Tenable One Exposure and Vulnerability Management Platform

    MTI TECHNOLOGY LIMITED

    Tenable provides a class leading vulnerability scanning and management solution, providing the tools and functionality to deliver vulnerability assessments, and the insights necessary to advance your security posture and safeguard your business. It is continually updated with new vulnerability definitions and checks, zero-day research, and compliance benchmarks.