Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2668 results found

2668 results found in Lot 2: Cloud software in the category Other information and communications technology (ICT) services

  • OPSWAT - MetaDefender Core

    NETWORK INTEGRATION TECHNOLOGIES LTD

    OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.

  • BMC Helix iPaaS

    Fusion Business Solutions (UK) Limited

    BMC Helix iPaaS is a powerful iPaaS platform offering (by Jitterbit) to help enable a broad set of integrations between BMC products and 3rd party solutions and sources. In addition to connectors, the platform includes a simplified UI, graphical mapping, transformational capabilities, routing, orchestration, operational monitoring and management.

  • Business Process Automation and Workflow

    Meritec Limited

    Digital end-to-end fulfilment of one specific process built on our Low-Code Digital Platform, meaning this process can adapt over-time with your organisational needs. This module can be applied across a variety of use cases to automate, schedule and action a variety of tasks. Business rules engine combines with system integration.

  • Sophos Managed Detection and Response Complete (MDR) Server

    Cyberlab

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • CheckPoint CloudGuard Cloud Security Posture Management

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc

  • Lexacom Echo

    APROBRIUM LIMITED

    Lexacom Echo is a cloud based speech recognition application. It enables the accurate and efficient entry of information onto the computer using voice. Lexacom Echo improves the quality of notes, boosts productivity, and saves time.

  • boxxe EJBCA PKI for Azure and AWS

    BOXXE LIMITED

    EJBCA PKI for Enterprises - A powerful and flexible certificate issuance and management system to issue and enable full life-cycle control of digital certificate and Certificate (CA), Registration (RA) and Validation Authorities (VA); enabling multiple use cases and standards compliance

  • Business Telephone Systems

    Kick ICT

    We offer UK business telephone systems that will improve your business communications, including set up of telecom systems, VoIP, business landlines and call recording solutions from vendors including 3CX, Horizon, Avaya and Microsoft Teams Phone.

  • Voyager

    IDOX SOFTWARE LTD

    Voyager delivers a holistic view of the transport network to the public via mobile and desktop, SMS, kiosks, broadcast screens, social media, mobile web phone apps and on and off street displays. All outputs provide accessibility information and meet the required standards for the blind and partially sighted.

  • UK Engage Secure online voting

    PRINT IMAGE NETWORK LTD (Trading as UK Engage)

    Our secure online voting solution is used for board, council/committee elections, referendums, polls or AGMs. It’s easy to use and flexible. With voter encryption & multi-factor authentication, our solution makes it easy undertaking ballots. Our system can be branded with a client’s logo, colour scheme and imagery to increase engagement.

  • Spinwell - GLU

    SPINWELL GLOBAL LIMITED

    A "NO CODE" Enterprise Integration Platform that; Is configured by Analysts. No software development, 100% NO CODE Is Singularly Versatile and Flexible across industries i.e., industry agnostic Is Secure and sits within clients physical & technical boundaries Is to HALVE the Time to Market and the Cost of integrating systems.

  • Recorded Future Threat Intelligence

    SAPPHIRE TECHNOLOGIES LIMITED

    Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services

  • Chrome - Pear Deck

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions offers Chrome - Pear Deck, an interactive presentation tool that enhances classroom engagement. It allows educators to create dynamic slides with formative assessments and real-time student feedback, improving participation and understanding in educational settings.

  • Check Point Harmony SASE

    SOFTCAT PLC

    Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.

  • NG Bailey Cloud Communications (Cloud WiFi)

    NG Bailey IT Services Limited

    NG Baileys cloud WiFi solution is built around offering Cloud Managed WiFi Services We can offer a simple and secure solution that is cost-effective and allows for the delivery, management and monitoring of wireless networks Working with Leading vendors such as: Meraki, Cisco and HPE Aruba

  • Engage Automation and Digital Transformation

    Inform Communications Ltd

    Engage Automation and Digital Transformation enhances public sector efficiency through advanced AI, CRM, data analytics, and digital communication tools including chatbots and voice assistants. Our digital strategy improves profitability, unlocks additional revenue solutions, streamlines operations and ensures compliance with robust security measures, significantly reducing overheads and improving service delivery.

  • Threat Intelligence - Recorded Future

    BROOKCOURT SOLUTIONS LIMITED

    Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.

  • Centripetal CLEANInternet

    4 DATA SOLUTIONS LIMITED

    CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.

  • Fortra's Classifier Suite FCS (Formerly Boldon James) - From HANDD Business Solutions

    HANDD Business Solutions

    Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.

  • Gazetteer API Service for postcode lookup

    ROCKTIME LIMITED

    Providing gazetteer custodians a simple method to upload and access property address (LLPG) and local street gazetteer (LSG) data. A cloud-based solution for gazetteer data import via an automated FTP file to destination service or collection from location service. An API enables access to data reducing charges and streamlining processes.

  • Cribl

    BYTES SOFTWARE SERVICES LIMITED

    Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution. bssgc

  • MasterGov Appeals

    DEF Software Limited

    MasterGov Appeals is a standalone module to manage the full life cycle of Planning and Enforcement appeals. With full integration with Planning and Enforcement modules this module makes management of the appeal process quick and efficient. In both scenarios data can be automatically copied from source records to save errors.

  • Jigsaw24 - LucidLink Cloud Storage Solutions

    Jigsaw24

    Supporting your remote workflows, LucidLink presents cloud storage as if it were local. LucidLink removes the need to install hardware into your environment, allows for always-on data access to cloud stored assets, and supports global collaboration in real time; all protected by secure end to end encryption.

  • Microsoft 365 E5 Compliance

    BYTES SOFTWARE SERVICES LIMITED

    Microsoft 365 E5 Compliance offers comprehensive solutions for managing data risks and regulatory requirements. Safeguard sensitive data across clouds, applications, and endpoints, identify ,remediate critical risks . Additionally, Microsoft Purview, included with an E5 license, provides unified data governance capabilities, including data-loss prevention, compliance management and insider risk management. bssgc

  • Immersive Labs

    Immersive Labs

    True resilience requires people and teams work together. With a seamless and tailored experience for individuals, teams, and organization, we provide unmatched cybersecurity exercises and training, along with data-driven insights and guidance to improve resilience. Immersive provides enterprise-class scale, security, reliability, and integrations for the world's largest organizations.

  • Trust&Assure

    AVOCO SECURE LIMITED

    Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.

  • Pen Testing - Application Security

    FULLPROXY LIMITED

    Penetration testing is a vital first line of defence for anyone managing a website. It replicates the actions a hacker would take to try to penetrate your cyber defences and shows you where the vulnerabilities lie. FullProxy provide a range of advanced and affordable options from one-off to continuous testing.

  • Verint Application Visualizer, a component of the Desktop & Process Analytics (DPA) suite.

    Verint Systems Inc.

    Verint Application Visualizer ™ is an innovative, cloud-based, desktop analytics solution that provides contact center leadership and staff with visibility into employee desktop activity. Its rapid deployment model means that in a matter of weeks, you can have real-time, objective data to help manage and provide feedback

  • Recorded Future

    Bright Cyber (Voodoo technology LTD)

    Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.

  • Crowdstrike Falcon Complete MDR Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.