Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

473 results found

473 results found in Lot 2: Cloud software in the category Configuration and patch management

  • Becrypt Mobile Device Management+

    Becrypt Ltd

    High-value MDM Servers tend not to reside in the well-protected segments of organisations’ networks, due to the nature of required connectivity to the global smartphone infrastructure. Delivered as a fully managed solution for businesses, it provides peace of mind over the security, integrity and delivery of the mobile estate

  • Oracle Cloud Implementation, Support and Maintenance

    Ve3 Global Ltd

    VE3 assists clients in transforming their strategies into practical, technology-driven outcomes through its diverse services. These include consulting, implementation, support and maintenance, development, and license optimization for various Oracle Cloud Products such as Financials (ERP), HCM/Payroll, SCM, Sales & Marketing (CX), BI & Analytics, and PaaS

  • IT Health Check Services

    SALUS DIGITAL SECURITY LIMITED

    Delivery of testing services under National Cyber Security Centre CHECK standards in support of Government, Public Sector and CNI operators

  • Check Point Harmony SaaS

    INTEGRITY360 LIMITED

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • Gytpol validator

    INTEGRITY360 LIMITED

    Automatic misconfiguration detection and zero-disruption remediation

  • Puppet (Perforce) Software Solutions

    WM Promus

    Puppet Enterprise is a commercial configuration management tool built on top of the open-source Puppet software. It allows you to automate the configuration of your IT estate (known as nodes). Puppet (Perforce) extends this offering with additional s/w such as CD4PE and Comply to further your DevOps/DevSecOps journey.

  • Barrier Networks Crowdstrike Falcon Next Gen Security Information Event Management (SIEM)

    Barrier Networks

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Ultima and Varonis SaaS Data Security Platform

    Ultima Business Solutions Ltd

    Secure data through automation, working with Ultima and Varonis. Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Automated data security.

  • ManageEngine Mobile Device Manager Plus: Cloud-based enterprise mobility management tool

    Zoho Corporation Limited

    A web-based mobile device management tool that enables Android, iOS, iPadOS, macOS, Windows, and ChromeOS devices to be managed. Automate the complete device management life cycle through OOB enrollment, configuration and security management, app and update management, kiosk management, location tracking, remote troubleshooting, and more.

  • Cloud Strategy Assurance

    SALUS DIGITAL SECURITY LIMITED

    Security review of Cloud migration, cloud development, cloud backup plans and services.

  • Microsoft Viva Connections

    Phoenix Software Ltd

    A Microsoft Viva module that provides a gateway to a modern engagement experience. This is included in M365 licensing and builds on audience targeting capabilities and publishers available on SharePoint Modern Pages

  • Cyber Essentials as a Service

    Kick ICT

    We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security. We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.

  • Endpoint Detection and Response (EDR)

    Creative Networks

    Endpoint Detection and Response (EDR) services protect individual devices within a network by continuously monitoring for suspicious activities such as malware and unauthorised access attempts. With real-time detection and response capabilities, EDR helps prevent data breaches and maintains the integrity of IT systems.

  • SecurityScorecard - Cybersecurity Risk Ratings Platform

    Barrier Networks

    SecurityScorecard is a comprehensive cyber security risk ratings platform that continuously monitors the cyber security health of organisations to inform cyber security risk management. SecurityScorecard identifies public facing vulnerabilities that create a security risk. Use cases include self monitoring, peer bench-marking, third party risk management and cyber insurance.

  • WatchGuard MDR (Managed, Detection and Response)

    Redinet Ltd

    WatchGuard MDR provides 24/7/365 cybersecurity services through the MSP partners to their customers, offering endpoint and Microsoft 365 activity monitoring, threat hunting, and attack detection, investigation, and containment, with guided recommendations for remediation. The offering is managed by an elite team of cybersecurity experts and powered by AI.

  • Accredited Virtual Desktop (VDI)

    LogiQ Consulting Ltd

    The Accredited Virtual Desktop/Cloud PC is built on Logiq's Turn Key DISX platform, which enables access to an accredited desktop, from an existing device. This reduces the needed for multiple devices whilst enabling collaboration between MOD, other Government Departments and Defence Industry at the OFFICIAL tier.

  • Cyber Security Consultancy Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Endpoint Detection and Response Solutions

    FuseMail

    VIPRE Endpoint Detection & Response provides comprehensive anti-malware and anti-exploit protection for Windows and Mac endpoints.

  • Digital Experience Monitoring - ATERNITY

    Geode Networks Ltd

    Digital Experience Monitoring using Aternity from Geode Services is a managed service that provides visibility into user experience (UX) by monitoring and reporting on their specific performance of application activities across any application type, local, cloud, multi-cloud, web, VDI or enterprise.

  • ServiceNow Design, Development and Support Services

    Leidos Innovations UK Limited

    Provision of innovative implementation and support services for the ServiceNow platform. Includes bespoke application development, platform implementations and customisations, maintenance and support. Proven design and implementation processes accelerate your digital. Leidos is a member of the ServiceNow Specialist Tier and is a ServiceNow Reseller and Managed Service Provider.

  • Action1 Patch Management

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Action1 provides a cloud-based patch management platform, streamlining vulnerability mitigation and patch deployment across systems, ensuring real-time compliance and risk reduction for OS and third-party software.

  • KickSecure Premium

    Kick ICT

    We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security. We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.

  • CIHS Kelverion Automation as a Service

    CIH Solutions Ltd

    Kelverion Runbook Studio offers an intuitive, low-code/no-code solution for automating IT processes, integrating 800+ systems like Azure, ServiceNow, and AWS. It enhances operational efficiency by reducing human error and process cycle times, providing significant ROI through its automated runbook library and graphical design experience.

  • Umbraco Consultancy

    Moriyama

    Moriyama offers Umbraco development consultancy to clients, mentoring client in-house developers to enable them to successfully self-manage their Umbraco projects: leveraging our considerable experience and expertise with Umbraco, clients can access consultative support for their in-house development teams.

  • CheckPoint - Infinity SOC

    Ve3 Global Ltd

    A cloud-based platform empowers SOC analysts to swiftly uncover, investigate, and mitigate attacks with 99.9% accuracy. InfinitySOC utilizes an advanced AI algorithm to identify behavioral patterns, leveraging big data analysis from ThreatCloud to pinpoint active threat indicators.

  • Micro Focus, now OpenText - Fortify Hosted on SaaS

    MICRO FOCUS

    Micro Focus Fortify Hosted provides a cloud‐based enterprise service for automating application security programs. It enables management, development, and security teams to work together to triage, track, validate and manage software security activities.

  • EasyVista EV Reach

    Tekwurx Limited

    EV Reach is a SaaS or on-premises software used for remote support and IT process automation.

  • Open Banking Account Information Service (Fully Integrated)

    DGM AGILITY LIMITED

    DGM Agility is an authorised Account Information Service Provider (AISP) which enables us to provide a gateway to the Open Banking service. This service enables access to an aggregation of financial information for an individual or business. We collect, store, and make available the information as a service

  • WDM Integrated Asset Management System (WDM IAMS)

    W.D.M.Limited

    The WDM IAMS is an advanced Highways and Environmental Asset Management System, drawing on over 30 years of experience with central and local government clients. It features fully integrated mapping and mobile working tools. This system offers seamless functionality and robust support, perfectly suited for today's dynamic asset management landscape.

  • O365 Vulnerability Scanning

    PEGASUS LABS PTY LTD

    Monitor Office 365 configuration against good practice standards and custom policies for secure configuration. Detect and remediate common user mistakes in real time. Ensure compliance with standards by auditing your Office 365 configuration and file sharing for non-compliant security controls.