Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2603 results found

2603 results found in Lot 2: Cloud software in the category Other information and communications technology (ICT) services

  • CheckPoint CloudGuard Web Application Firewall (WAF)

    BYTES SOFTWARE SERVICES LIMITED

    Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. bssgc

  • Salesforce Analytics and Reporting Services

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in Salesforce Analytics and Reporting Services customized for government departments. We empower government entities with powerful data analysis and reporting tools. Our services enhance decision-making processes, offer actionable insights, and facilitate data-driven strategies. We ensure that governmental objectives are met with precision and efficiency.

  • Workday Regulatory Compliance

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions Ltd specializes in seamless integration of Workday Learning Management Systems (LMS) for government agencies. Our solutions ensure smooth data migration, user-friendly interface, and comprehensive training content management. With our expertise, agencies can maximize the benefits of Workday LMS, enhancing employee development and organizational effectiveness efficiently.

  • Google Cloud DevOps Services

    DEFENCE DATASEC LTD

    Defence DataSec specializes in Google Cloud DevOps Services, enabling seamless collaboration between development and operations teams for efficient software delivery.Our expert consultants implement best practices, automation, and continuous integration/continuous delivery (CI/CD) pipelines on Google Cloud Platform. Trust us to streamline your development processes,accelerate time-to-market, and enhance overall agility and reliability.

  • Tenable.io Vulnerability Management

    REDINET LIMITED

    Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.

  • Healthcare Standards Based Data Modelling Tool

    Direcht

    Create data models that are translated using interoperability standards and output in XML, JSON and ADL formats. Based on ISO13606, providing SNOMED CT, Data Dictionary, PRSB, HL7 and FHIR compatibility. Maps to Contsys, PRSB and dynamically to FHIR for transformation, translation and exchange to other healthcare systems.

  • Business transformation through blended learning - digital, virtual, face-to-face

    Me Learning Ltd

    Training, roleplay and coaching to create an authentic style and delivery which gets results in the workplace.

  • DevOps Integration with Agile Practices

    LEFKE IT LIMITED

    LefkeIT specializes in DevOps Integration with Agile Practices for Government Departments. Our expert consultants seamlessly merge development and operations, fostering collaboration and automation. With agile methodologies and continuous delivery, we optimize efficiency and product quality. Trust us for reliable DevOps Integration solutions that enhance project outcomes.

  • ICT Relocation - Data Centre

    NETWORK 2 SUPPLIES LIMITED

    Relocating Cloud IT can be complicated. We will audit the physical hardware and provide a comprehensive inventory. We will provide assurance that all items are transported following being safely packed, in one of our fleet of tracked vehicles.

  • Juniper Next Gen Firewall vSRX

    ITogether

    The Juniper vSRX Virtual Firewall offers the same features as physical SRX Series firewalls, including core and next-gen firewall capabilities, networking, and automated lifecycle management, all in a virtualized form factor. It delivers security services scalable to match network demand and operates at speeds up to 100 Gbps.

  • Connect The Dots

    CAMERAFORENSICS LTD

    Connect The Dots is a cloud-based open source intelligence tool that allows users to search for email addresses or usernames across a wide range of platforms, websites and public databases. The system provides intelligence for law enforcement investigators and assists with deanonymisation of online identities.

  • Peopleware Workforce Management (WFM)

    PEOPLEWARE LTD

    InVision has been a leader in Workforce Management for over 30 years. Peopleware WFM Cloud supports the whole planning cycle and is an easy-to-navigate WFM solution for contact centres and back-office operations. It is designed to save you money, time, and empower you to do more with less.

  • Digital High Health Certification (Livestock, Equine and Companion Animals)

    EQUINE REGISTER LIMITED

    Enables owners/keepers/farmers to create a digital High Health Certificate to facilitate cross-border transport of animals (incl equines) retrieving data from the Central Equine/Animal/Canine and Feline Databases and the Digital Stable/Kennel including identification and Vet-Verified vaccinations. It can also be integrated with government departments i.e. APHA, OV’s, borders and laboratories.

  • Abavus - Web Services

    ABAVUS LIMITED

    Our Web Services API Package is a standardised way of integrating Web-based applications using open standards JSON and REST. A comprehensive suite of web services are available, enabling customers to complete integrations without support. Alternatively, using these web services, Abavus can complete integrations on your authority's behalf.

  • Security Automation and Compliance

    DEFENCE DATASEC LTD

    Defence DataSec specializes in Security Automation and Compliance services,leveraging advanced technologies to automate security processes and ensure regulatory compliance.Our expert team implements robust security measures,ncluding automated vulnerability scanning,configuration management,and compliance checks,to safeguard your infrastructure and data.Partner with us to enhance your security posture,reduce risks,and achieve continuous compliance in dynamic environments.

  • Delinea - Privilege Manager (Zero Trust & PEDM)

    BARRIER NETWORKS LIMITED

    Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.

  • SentinelOne Active EDR - Endpoint Detection and Response

    ITHQ LTD

    The SentinelOne Endpoint Protection Platform unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all vectors, elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.

  • Computacenter - CrowdStrike Falcon Cloud Security

    COMPUTACENTER (UK) LIMITED

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • CDW Mimecast Comprehensive Defense Plan (Zone 1+2)

    CDW LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Ultima AntiSocial Phishing Prevention

    ULTIMA BUSINESS SOLUTIONS LTD.

    AntiPhish Phishing Prevention combines educational phishing campaigns with a realistic experience. Analyse your organisation's click rate and compromise statistics. Effectively monitor the reduction in employee phishing susceptibility with regular simulated phishing campaigns. Following up with ongoing staff awareness, to keep employees on the lookout and continually improve your security defences.

  • Rapid7 InsightIDR

    CHESS ICT LIMITED

    Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.

  • Thinkst

    ITogether

    Thinkst Canary deploys virtual traps, mirroring real assets, to detect and deflect threats preemptively. Its deception technology offers early intrusion detection, ensuring robust network security. Easy deployment and low maintenance provide seamless integration, offering unparalleled visibility into your network's threat landscape.

  • Nintex Automation Cloud

    NINTEX UK LIMITED

    With Nintex Automation Cloud, you can quickly design and deploy deeply integrated, powerful workflow applications with easy-to-configure logic and rules that eliminate manual work – using clicks, not code.

  • Island - Enterprise Browser / Secure Browser

    SOMERFORD ASSOCIATES LIMITED

    Island is an Enterprise Browser that provides policy control over every facet of a user’s interaction with a web application giving you limitless visibility, control and compliance with your most critical applications. Island can serve as the platform for the future of productive and secured work.

  • Wavenet GP Voice (Gamma Horizon)

    Wavenet

    Wavenet GP Voice is a cloud-based telephony and collaboration solution for GP practices, integrating seamlessly with existing clinical systems. The solution has been approved by both NHS England and the Advanced GP Telephony Framework. Powered by Gamma’s Horizon UCaaS and Horizon Contact products.

  • OpusConsult - planning policy consultation platform

    JDi Solutions Ltd

    Opus Consult, an intuitive digital engagement platform, with specific planning policy Local Plan features that make light work of managing public consultations. Enabling Local Authorities to maximise community reach and engagement; efficiently analyse and report on data; collaborate throughout the process; increase productivity and reduce costs to deliver Local Plans.

  • HCLTech DRYiCE Lucy - AI-enabled Cognitive Virtual Assistant

    HCL TECHNOLOGIES UK LIMITED

    Lucy is an intuitive conversational-Artificial Intelligence (AI) cognitive virtual assistant/platform that mimics human-like interactions while extending support and service to its users. Lucy leverages enterprise-grade Machine Learning (ML) and Natural Language Processing (NLP) capabilities to offer empathetic, context-driven and accurate assistance to enhance the user experience.

  • Identity and Access Management (IAM) Solutions Deployment

    LEFKE IT LIMITED

    LefkeIT specializes in Identity and Access Management (IAM) Solutions Deployment. Our expert team implements robust IAM frameworks tailored to your organization's needs, ensuring secure and efficient access control. With meticulous planning and deployment, we safeguard your digital assets and ensure compliance with regulatory standards.

  • Tines Automation Platform

    Tines

    Tines is an automation platform that helps organizations streamline their workflow processes by enabling them to automate repetitive tasks. Allow users to create custom workflows using a simple drag-and-drop interface, integrating with various third-party tools and services, effectively to security incidents and threats. Low code- No code approach to automation.

  • Brand protection

    SAPPHIRE TECHNOLOGIES LIMITED

    Brand impersonation is on the rise. Many British citizens are unaware that .gov.uk is the domain for public sector organisations. This service monitors and provides critical information about brand-related cyber threats, including organisation and brand impersonations, logo and domain abuse, leaked data and credentials. A takedown service is also available.