Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2156 results found

2156 results found in Lot 2: Cloud software in the category Authentication, identity and access management

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Powered by Neo: Offline Functionalities and Mobile App

    NEO TECHNOLOGY LIMITED

    Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    COMPUTACENTER (UK) LIMITED

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • MIRACL MFA and DVS

    Grove Information Systems

    MIRACL Trust Proof is a service using the Designated Verifier Signature (DVS) digital signature scheme that allows the signing of any digital transaction, user action, data transfer or Machine-Machine interaction to make it irrefutable. Authenticity of action can be proven due to the immutable and cryptographic nature of the signatures.

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • Totalmobile Major Infrastructure Logistics Management

    TOTALMOBILE LIMITED

    Totalmobile is the market leader in construction logistics harnessing its enterprise digital platform supporting major construction/infrastructure programmes to achieve excellence in operational efficiencies and compliance monitoring. Key aspects of our platform include; logistics tracking, lone working, asset/inventory management, delivery management, appointment booking, integrated routing/visual maps, navigation/location APIs and real-time analytics.

  • Powered by Neo: Refund Management Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Refund Management Solutions streamline the process of issuing refunds in the housing sector. Our system automates refund requests, tracks refund statuses, and facilitates timely reimbursements to tenants. With built-in reporting and communication tools, landlords can efficiently manage refunds while maintaining transparency and compliance.

  • CheckPoint Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Powered by Neo: Voids Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Voids Management Solution optimises the process of managing vacant properties in the housing sector. Leveraging advanced case management and task assignment features, it streamlines workflows, reduces turnaround times, and enhances operational efficiency, ensuring swift property occupancy and tenant satisfaction.

  • Equine, Livestock and Companion Animal Border Control Service

    EQUINE REGISTER LIMITED

    Enables organisations exchange data and record the arrival and departure of an equine, livestock, companion animals (including dogs and cats) also check the biosecurity status of an animal in advance of its arrival. Supports recording of double ended movements and communications between organisations and users to manage biosecurity and risk.

  • Threat Intelligence Services

    LEFKE IT LIMITED

    LefkeIT delivers comprehensive Threat Intelligence Services. Our expert team monitors global threats, analyzes trends, and provides actionable insights tailored to your organization's risk profile. With proactive threat detection and response measures, we help fortify your defenses against evolving cyber threats, ensuring resilience and protection of your assets.

  • Identity and Access Management (IAM) Advanced

    SAPPHIRE TECHNOLOGIES LIMITED

    An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).

  • Cloud Software Deployment & In-life Management

    ISx4

    ISx4 specialises in the implementation of analytics and AI solutions on cloud infrastructure. Options include Azure, AWS, SAS, Watsonx, Posit, Anaconda and bespoke solutions. ISx4 can host and own the cloud environment or deploy to the client cloud environment . In-life management and support is part of the service offering.

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Happiest Minds SaaS services

    HAPPIEST MINDS TECHNOLOGIES LIMITED

    We partner with cloud service providers such as AZURE, AWS, and GCP, consult clients to fulfil their needs, and offer the required software subscription services. In addition to advising clients on the best subscription, we also provide additional value-added services that OEM providers may or may not offer.

  • Check Point Harmony Endpoint

    CHARTERHOUSE VOICE & DATA LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Powered by Neo: Hoarding Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Hoarding Management solution addresses the complex challenges associated with hoarding behaviours in housing. By providing robust tools for assessment, intervention planning, and ongoing support, it enables housing professionals to effectively manage hoarding cases with empathy and efficiency, promoting tenant well-being and property safety.

  • Data Security and Privacy Services

    DEFENCE DATASEC LTD

    Defence DataSec delivers top-tier Data Security and Privacy Services, safeguarding your sensitive information from threats and ensuring compliance with regulations.Through advanced encryption, access controls, and monitoring, we protect your data assets from unauthorized access and breaches. Partner with us to mitigate risks, build customer trust, and uphold data privacy standards.

  • Neo Technology AWS Managed Services

    NEO TECHNOLOGY LIMITED

    Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.

  • Micro Focus, now OpenText - Network Operations Management (NoM) on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    The Network Operations Management (NOM) suite provides market leading management for enterprise networks, across public, managed and private clouds, integrating capabilities to monitor fault, performance, configuration, and compliance of physical, virtual, and software defined network (SDN) infrastructure. The Suite has the broadest and deepest multi-vendor support beyond simple SNMP/ICMP monitoring.

  • Check Point Harmony Mobile

    CHARTERHOUSE VOICE & DATA LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Appointment manager API

    BOOMERANG I-COMMS LTD

    An intelligent platform to automate appointment management using our patented threading technology for 2-way messaging. We make it easy to manage appointments and integrate with your booking system / schedule. SMS, EMAIL AND IVR used to set, remind and cancel appointments. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Dockerization of Development Environments

    DEFENCE DATASEC LTD

    At Defence DataSec, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    PROACT IT UK LIMITED

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Civica Election Management

    CIVICA UK LIMITED

    Civica provides local authorities throughout the UK with a diverse range of electoral management software and services. Our secure, web-based system is kept fully compliant with UK Legislation and offers all the benefits of a true Cloud Native solution.

  • Elected members ward enquiries

    PENTAGULL LTD

    Our elected members ward enquiries system is a cloud software service that readily and effectively meets all the requirements for managing councillor enquiries across the organisation, from initiating the enquiry through our intuitive and simple online form through to case resolution via back-office.

  • Web,Mobile Design and IT Support Services

    DBAAS LTD

    We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM INTELLIGENCE LIMITED

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.