Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3871 results found

3871 results found in Lot 2: Cloud software in the category Application security

  • CDW Microsoft Project Plan 3

    CDW LIMITED

    Cloud solution for project planning and control, project portfolio management (PPM). Microsoft Project Plan 3 includes Project for the web, creation of Roadmaps and Project Online Professional, and can be used by administrators, portfolio managers, portfolio viewers, project managers, resource managers, team leads, and team members.

  • Permit to Work (PTW) Software

    Ultan Technologies Ltd

    Permit to Work (PTW) software enables effortless creation, request, and management of permits for hazardous works. Enhanced visibility ensures effective communication and safety control among stakeholders.

  • Cyber SOC/SIEM as a Service

    ICYBERDEFENCE LIMITED

    The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.

  • PowerConnect for SAP solution and Splunk

    SOMERFORD ASSOCIATES LIMITED

    PowerConnect is certified SAP add-on which can extract high-fidelity, real-time and historical SAP telemetry data ready for analysis and visualisation in Splunk.

  • SafetyQube Environment, Health and Safety (EHS) Software

    Kingsfield Computer Products Ltd

    SafetyQube is a top rated, feature rich, easy to use, customisable and affordable EHS software recommended by >90% of customers. With comprehensive modules available on both desktop and mobile, SafetyQube helps organisations stay safe, efficient and compliant.

  • Ryalto

    RETINUE SOLUTIONS LIMITED

    Ryalto is a mobile app for workers in the public sector, to stay connected to their organisations peers. They pick up news and protocol information direct in the app and complete satisfaction surveys. There is a powerful shift booking tool that can standalone or be connected to a rostering system.

  • Entity Verification API (EVA)

    MOODY'S ANALYTICS UK LIMITED

    Entity Verification API (EVA) consolidates live and curated entity data, including risk information. It enhances data access through a single delivery method, with features like real-time monitoring. EVA supports customisable data-retrieval policies, ensuring AML compliance and flexibility with evolving networks, and includes a comprehensive audit trail.

  • Check Point CloudGuard Code Security (Spectral)

    LRQA

    CloudGuard Code Security, provides automated tools that integrate with developers’ tools to detect code-vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations.

  • Messaging API

    BOOMERANG I-COMMS LTD

    Boomerang’s RESTful API ensures a secure, functional, high-performance messaging experience. With substantial throughput and redundancy, it meets enterprise needs for instant global messaging. Boomerang's built-in intelligence ensures accurate message matching, empowering developers to create automated conversational workflows seamlessly. ISO 27001, Cyber Essentials, and Cyber Essentials Plus Accredited.

  • Pathpoint® Remote Monitoring

    OPEN MEDICAL LTD

    Pathpoint® Remote monitoring, a HSCN cloud based platform that allows you to safely monitor patients remotely, our suite of 2-way patient communication tools & real-time alerting system. Utilising automated digital questionnaires, alerts to concerning responses, secure upload of clinical photos, video consultations to capture patient recorded data for monitoring post-discharge.

  • Digital self service

    PENTAGULL LTD

    Our self-service portal system is a cloud software service for the delivery of online digital transactions through the use of modern, responsive and highly configurable online forms. It also includes a number of pre built forms to deliver unrivalled value for money.

  • Forcepoint Insider Threat (FIT)

    Chess CyberSecurity Ltd t/a CyberLab

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Computacenter - Proofpoint Security Awareness Training

    COMPUTACENTER (UK) LIMITED

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Vehicle fleet and resource management system

    LIGHTBULB ANALYTICS LIMITED

    Lightbulb Analytics [LBA] IR3 system is a fleet and resource management system which enables users to optimise their fleet and resources. IR3 achieves this by providing features such as live tracking, vehicle status, trip replay, driver behaviour, vehicle and personnel utilisation and potential collision analysis.

  • Social Engineering - Simulated Phishing Testing

    LEIDOS INNOVATIONS UK LTD

    Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.

  • Tanium Converged End Point Management (XEM)

    PHOENIX SOFTWARE LIMITED

    Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.

  • Mobile App Development using Power Apps

    CEOX SERVICES LTD

    Ceox’s Mobile App Development using Power Apps enables Public Sector Organisations to build native Mobile Apps for iOS and Android using the Power Platform. Power Apps provides an easy, quick way to build Mobile Apps, for internal use and engaging with citizens. Build Native Apps, Responsive Apps or PWAs.

  • Microsoft Windows 365

    BYTES SOFTWARE SERVICES LIMITED

    Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11 bssgc

  • Kentico support

    SPINDOGS LTD

    Kentico support. Mobile optimised, accessible website development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.

  • Netwrix Stealth Intercept

    SOFTCAT PLC

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Site Surveys & Due Diligence

    RENKAP LTD

    Our Site Survey Platform allows clients to easily tender, procure, instruct and manage multiple surveys for property development or refurbishment. Previously our clients had to manage all the multiple surveys but through RenKap they can now instantly get 3 quotes from vetted surveyors and manage it all on one platform.

  • boxxe Cloudflare Cloud Email Security

    BOXXE LIMITED

    Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.

  • CDW Sophos Intercept X Advanced with XDR

    CDW LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Backupify for Google Workspace via Netpremacy

    NETPREMACY LIMITED

    Backupify protects your most important cloud data through secure, automatic, daily backup. Backupify allows search and restore of files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and application errors. Backs-up data in Google Mail, Drive, Calendar, Contacts, and Shared Drives.

  • Proofpoint DLP Transform Package

    INTEGRITY360 LIMITED

    Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.

  • Sophos Managed Risk

    PHOENIX SOFTWARE LIMITED

    SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity

  • Computacenter - IBM WatsonX.Governance

    COMPUTACENTER (UK) LIMITED

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.

  • Workforce Analytics

    MeVitae

    Helping organisations hire smarter, faster and fairer, by mitigating unconscious and algorithmic bias. Improving diversity and inclusion typically involves three stages: identifying areas for improvement, selecting appropriate interventions, and assessing their impact. MeVitae’s analytics assists you throughout each of these stages, whilst seamlessly integrating with 20+ ATS' and HR tools.

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.