Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • ManageEngine Endpoint Central: Cloud-based Unified Endpoint Management and Security Solution

    ZOHO CORPORATION LIMITED

    Endpoint Central is an endpoint management and security solution for a company's IT infrastructure. It manages servers, desktops, laptops, and devices across multiple OSs from a single console. Crafted for SMBs and enterprises alike, it simplifies and automates routine tasks while securing against cyberattacks with its integrated endpoint protection suite.

  • EVOLVE eSourcing

    ELCOM SYSTEMS LIMITED

    EVOLVE eSourcing, manage complex procurement procedures. Covering Electronic notices, RFx, eEvaluation, eAuction, full integration with OJEU and Contracts Finder. A simple, efficient and compliant solution for rapid deployment. Onerous tasks are removed without compromising security, quality and effectiveness of the system. Integration with legacy, supply chain and external systems.

  • Forescout - EyeSight / EyeControl / EyeInspect

    BARRIER NETWORKS LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.

  • Proact Security Incident and Event Management (Microsoft Sentinel)

    PROACT IT UK LIMITED

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Amazon WorkSpaces

    SOFTCAT PLC

    Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.

  • Powered by Neo: Latent Defect Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Latent Defect Solution provides a platform for efficiently managing latent defect issues in housing. By leveraging advanced case management and task tracking capabilities, our solution ensures seamless identification, resolution, and documentation of latent defects. This streamlines the defect management process, minimising risks and enhancing property safety and compliance.

  • Check Point Harmony SaaS

    LRQA

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.

  • DevOps Continuous Compliance Server

    Viewdeck Consulting Limited

    DevOps Continuous Compliance Server offers the UK public sector a comprehensive SaaS solution for regulatory adherence in software development. With automated compliance checks, real-time monitoring, and tailored compliance policies, organisations can streamline compliance management, ensure regulatory adherence, and enhance accountability while maintaining security and scalability in a cloud-based environment.

  • Stone Cloud Enterprise Network Security - Cisco Duo Multi Factor Authentication

    Stone Technologies Limited Trading as Converge Technology Solutions

    Stone utilises Cisco Duo to provide Multi Factor Authentication. Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known vulnerabilities and/or exploits.

  • ProxyAddress

    ProxyAddress

    ProxyAddress is a unique, award-winning service providing secure 'proxy' address details to those facing the instability of homelessness. A ProxyAddress helps to establish consistency and can be used like a normal address to securely access vital services and support, regardless of location or how often an individual moves.

  • Barrier Networks Zero-Trust Access Control & IoT Security (Fortinet FortiNAC)

    BARRIER NETWORKS LIMITED

    Network Access Control (NAC) is a critical component in the modern-day network. NAC offers organisations the ability to deploy Zero Trust Network Solutions, Secure SD Branch Deployments and ensure IoT, BYOD and user devices are profiled, only allowed to access approved resources and periodically reviewed for compliance.

  • Web content management system

    SPINDOGS LTD

    Web content management system development. Mobile optimised, and accessible. Spindogs' web Content management system platform provides bespoke templates for content editors. GDPR compliant CMS has an easy to use admin interface and flexible content editing features. The web content management system is open-source, user friendly, and fully customisable.

  • Heimdal Security - Unified Threat Platform

    Network Utilities (Systems) Ltd

    One Platform, One Agent, Complete Protection From ransomware and insider threat, to business compromise and anything in between, Heimdal™ protects your operational integrity by stopping even the most sophisticated cyberattacks from day one. Bundle includes: Threat Prevention, Patch & Asset Management Next-Gen Antivirus & MDM

  • Kineo Totara TXP - Totara Learn, Perform and Engage

    Mind Tools Kineo

    Kineo Totara TXP is our all-in-one learning management system (LMS) and talent experience platform (TXP) that uses technologies built to work together to close the skills gap and open our clients' learning ecosystem. We provide a fully managed service to take each client’s learning strategy to new heights.

  • altSRD - Secure Remote Desktop

    ALTIATECH LTD

    altSRD provides right-sized virtualized desktop solutions that balances security, productivity and value - Parallels RAS (remote application server): a flexible virtual application and desktop delivery solution. Parallels Secure Workspace (formerly Awingu): a highly secure and auditable access to your desktops, company files as well as legacy, web, and SaaS apps.

  • E-Sign

    E-SIGN (UK) LIMITED

    E-Sign is a leading provider of eIDAS compliant, secure electronic signatures and digital document management solutions. The electronic signature platform enables users to create, e-signature, send documents, negotiate contracts, accept payments, and create automated workflows. E-Sign offers a range of e-signature services, supporting unified digitalisation and simplified document transaction management.

  • CMS - content management system

    S8080 LIMITED

    ISO27001 certified open source, cloud-hosted CMS for digital services and websites. S8080’s GDPR compliant open source CMS platforms securely handle multilingualism, CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around your user’s needs.

  • Miya Patient Flow

    ALCIDION UK LIMITED

    Industry-leading digital patient flow journey boards providing healthcare teams with at-a-glance information on patients, and actions needed to ensure timely care and discharge. We deploy integrated, interactive journey boards to support efficient bed management and command and control – from ward level, to clinical specialties, hospitals and ICS wide insights.

  • Safe2Drive Driving Licence Checking & Grey Fleet Service

    SAFE 2 DRIVE SOLUTIONS LIMITED

    UK driving licence checking and reporting solution that provides online status, entitlement, and conviction data for UK licence holders using the DVLA ADD service. For professional drivers, it returns CPC and tacho-card dates. Clients access their portal 24/7. The speed of a check response is immediate. A fully managed service.

  • Neo Technology Power BI Optimisation Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Power BI Optimisation Service ensures your organisation maximises the potential of its Power BI implementation. Our team of analytics experts offers comprehensive design, implementation, and managed services for both new and existing solutions. We utilise agile delivery methods to provide tailored self-service BI architectures, robust governance models.

  • Microsoft 365 Licencing

    Atlas Cloud

    Atlas Cloud are a Microsoft Preferred Partner. Let us take the hassle out of Microsoft 365 administration and lean on our specialist skills to migrate, upgrade security or boost adoption when necessary.

  • Cloud Software

    BLS International Services Ltd.

    The software is used for network monitoring and end point monitoring as well as automated ticket generation through emails and SMS. The software has special features for server utilization, health and pre failure alerts defined and send to the administrator.

  • IBM Cloud Pak for Data

    IBM UNITED KINGDOM LIMITED

    IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.

  • Check Point CloudGuard Cloud Native Application Protection Platform (CNAPP)

    LRQA

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.

  • Powered by Neo: Tree Management and Maintenance Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Tree Management and Maintenance Solution empowers housing managers to oversee tree inventory, health assessments, and maintenance tasks. With features like GIS mapping and reporting, it streamlines trimming, cutting, and removal operations, ensuring compliance and enhancing environmental stewardship.

  • DXC Technology ServiceNow Resale

    ENTSERV UK LIMITED

    ServiceNow offers a portfolio of cloud-based applications that automate and manage enterprises. Our applications are built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades. ITSM, HRSD, ITOM, SecOps, CSM, Helpdesk, Service Desk, Self-Service Portal.

  • HSSEQ Observation Module: Record Observation via QR Code, No Login Needed

    Ultan Technologies

    The Observation Module empowers staff, contractors, and the public to generate ad-hoc observations. Configurable forms and dropdown values, along with tracked corrective actions to completion, ensure compliance. QR Code scanning for "Login Free" reporting, coupled with automatic task creation and potential assignment, streamlines safety and compliance efforts.

  • Barrier Networks Crowdstrike Falcon Data Protection

    BARRIER NETWORKS LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • EVOLVE eMarketplace

    ELCOM SYSTEMS LIMITED

    Secure shopping/trading via an easy to use eMarketplace. Management of catalogues, goods and services with integration to existing systems. A Public eMarketplace system that enables a Governement-to-Business (G2B) shopping, purchasing, spot buying and tail-end spend in an easy to use and controlled environment. Report and analyse spend and aggregation opportunities.

  • Check Point Harmony SaaS

    ITogether

    Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.