Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

867 results found

867 results found in Lot 2: Cloud software in the category Encryption

  • Computacenter - IBM Netezza as a Service

    Computacenter (UK) Ltd

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    NINE23 LTD

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • CheckPoint CloudGuard Network Security - For Azure Virtual WAN

    BYTES SOFTWARE SERVICES LIMITED

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc

  • Self-managed TAK Server

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • Secure Content and File Delivery and Storage Web Platform

    ROCKTIME LIMITED

    Rocktime provides private login access to secure content and files as a cloud platform. A secure and scalable service which can be deployed to the Cloud using intuitive and powerful out of the box functions to support administration. For use by both public and private restricted websites.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • HCLTech Domino + Domino Volt

    HCL TECHNOLOGIES UK LIMITED

    A rapid application development platform that enables easy assembly of low code applications. Its proven and competent security model keeps data secure, both on local clients, in transit and on servers. Domino Volt - An agile, easy-to-use, low-code development platform that creates web applications for data collection and process automation.

  • Microsoft Cloud App Security

    VE3 GLOBAL LTD

    Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • Sophos Firewall

    INTEGRITY360 LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Resource bookings

    Pentagull Ltd

    Our resource booking system is a cloud software service that allows your organisation to effectively manage access to a resource or a service that you provide. With strong emphasis on customer self-service, the system streamlines the application process to keep staff involvement to a minimum at point of application.

  • MTI Secure Cloud Solutions

    MTI TECHNOLOGY LIMITED

    MTI provides a range of storage solutions that can be consumed on a pay as you consume or reserved instance basis. These services can be used in public cloud, in the Buyers data centre or in a Co-Lo datacentre. Term lengths can be from 1 to 5 years

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • TRUSTMARQUE PROOFPOINT PRODUCT SET

    TRUSTMARQUE SOLUTIONS LIMITED

    Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.

  • DevSecOps/Secure Cloud Software Development

    NAIMURI LIMITED

    We are data exploitation, national security and law enforcement experts who leverage public cloud through DevSecOps services. We operate from a List X facility. We help clients move from legacy ways of working, to secure, automated and DevSecOps enabled capabilities for cloud access and development. We create accredited DevSecOps environments.

  • Domarn Limited

    Domarn Group

    A fully service integrated digital design agency experienced in delivering comprehensive creative, strategic and technical solutions for public and private sector. Services include design, production, branding, marketing, communications, campaigns, social media, photography, digital content creation, SEO, WordPress design and development, maintenance, hosting, HTML Govspeak and accessibility specialists WCAG 2.2 compliant.

  • HMO Licensing Application Process Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ HMO property licensing software managing Mandatory, Selective & Additional Licensing. Used as a stand-alone cloud platform or fully integrated, verso can be tailored to mirror and improve your internal workflows and processes. Powering local government licensing schemes including Property Inspection App and HHSRS Risk Assessments.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • Software as a Service and Security as a Service (SaaS)

    BOM Group Ltd

    Whether it be network/Application monitoring or securing physical or data assets in hybrid environments, BOM has the knowledge and partners to ensure the buyer leverages the most suitable tool(s) to suit their needs. Technical architects can advise on which software/hardware is fit for purpose based on the buyers requirements.

  • IBM Netezza as a Service

    IBM UNITED KINGDOM LIMITED

    IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.

  • Computacenter - Palo Alto Cortex XDR

    Computacenter (UK) Ltd

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • Garden waste

    Pentagull Ltd

    Green Waste Subscriptions system is a cloud software service that meets all the requirements for the management of green waste subscriptions. Strong emphasis on customer self-service, the system streamlines the renewal/enrolment process to keep staff involvement to a minimum. We provide various integrations to back-office waste services systems if required.

  • Housing HMO licensing

    Pentagull Ltd

    Our HMO licensing system provides your authority with an efficient and cost-effective way to manage your licence applications online from start to finish including proposal, determination, licence issue and statutory returns.

  • BeyondTrust Privileged Password Management Password Safe Cloud

    SOFTCAT PLC

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.