Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3871 results found

3871 results found in Lot 2: Cloud software in the category Application security

  • Data Security and Privacy Services

    DEFENCE DATASEC LTD

    Defence DataSec delivers top-tier Data Security and Privacy Services, safeguarding your sensitive information from threats and ensuring compliance with regulations.Through advanced encryption, access controls, and monitoring, we protect your data assets from unauthorized access and breaches. Partner with us to mitigate risks, build customer trust, and uphold data privacy standards.

  • Neo Technology AWS Managed Services

    NEO TECHNOLOGY LIMITED

    Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.

  • Micro Focus, now OpenText - Network Operations Management (NoM) on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    The Network Operations Management (NOM) suite provides market leading management for enterprise networks, across public, managed and private clouds, integrating capabilities to monitor fault, performance, configuration, and compliance of physical, virtual, and software defined network (SDN) infrastructure. The Suite has the broadest and deepest multi-vendor support beyond simple SNMP/ICMP monitoring.

  • Cyber Resilience Training Platform (SaaS)

    CYBEXER (UK) LTD

    The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.

  • boxxe Sophos Managed Detection and Response Complete (MDR) Endpoint

    BOXXE LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications

  • Sophos Central Device Encryption

    PHOENIX SOFTWARE LIMITED

    Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.

  • Check Point Harmony Mobile

    CHARTERHOUSE VOICE & DATA LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Appointment manager API

    BOOMERANG I-COMMS LTD

    An intelligent platform to automate appointment management using our patented threading technology for 2-way messaging. We make it easy to manage appointments and integrate with your booking system / schedule. SMS, EMAIL AND IVR used to set, remind and cancel appointments. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • boxxe Digital Certificate Lifecycle Management - Command SaaS Lite

    BOXXE LIMITED

    Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • Dockerization of Development Environments

    DEFENCE DATASEC LTD

    At Defence DataSec, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.

  • Patient Centred Care

    Gaiasoft International Limited

    Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.

  • SAP Concur Invoice Standard Edition

    SAP Concur

    Concur Invoice allows you to capture and automate paper and electronic invoices, then integrate those payments into a single system for managing all of your spending. You’ll literally be able to track every penny in one, simple AP system and access it anytime, anywhere with the Concur mobile app.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    PROACT IT UK LIMITED

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Civica Election Management

    CIVICA UK LIMITED

    Civica provides local authorities throughout the UK with a diverse range of electoral management software and services. Our secure, web-based system is kept fully compliant with UK Legislation and offers all the benefits of a true Cloud Native solution.

  • Elected members ward enquiries

    PENTAGULL LTD

    Our elected members ward enquiries system is a cloud software service that readily and effectively meets all the requirements for managing councillor enquiries across the organisation, from initiating the enquiry through our intuitive and simple online form through to case resolution via back-office.

  • Web,Mobile Design and IT Support Services

    DBAAS LTD

    We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.

  • NAble Monitoring and Update service

    CENTRAL NETWORKS AND TECHNOLOGIES LIMITED

    N-Able is used to monitor physical and virtual devices in a customer's networks.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM INTELLIGENCE LIMITED

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.

  • CDW CrowdStrike Application Security Posture Management

    CDW LIMITED

    CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Armour Bridge - Secure Messaging Gateway

    ARMOUR COMMUNICATIONS LIMITED

    Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.

  • Digital Experience Analytics SaaS platform

    CONTENT SQUARE LTD

    Outcome: understand service users digital journeys and experience. Our analytics platform analyses billions of digital behaviours, providing session replay, unique metrics, journey maps, visualisations, and recommendations to increase engagement, reduce costs to serve, improve user experience and identify issues / errors / bugs / frustration / fraud.

  • Blue badges

    PENTAGULL LTD

    Our blue badges system is a cloud software service for the effective management of blue badges. Our system facilitates enhanced efficiencies, tangible savings and improved customer satisfaction levels. It integrates to the Department for Transport (DfT) portal and will automatically retrieve new Blue Badge applications.

  • CheckPoint Harmony Email & Collaboration

    BYTES SOFTWARE SERVICES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc

  • Office 365 Exchange Advanced Threat Protection

    VE3 GLOBAL LTD

    VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.

  • Tenable Active Directory Security

    PHOENIX SOFTWARE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Tenable Vulnerability Management

    SAPPHIRE TECHNOLOGIES LIMITED

    Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical. Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

  • Resource management solution

    BOOMERANG I-COMMS LTD

    Boomerang can manage multiple vacancies for temporary appointments, one-off events or recurring requirements. It contacts, counts and fulfils based on requirement. System manages shifts, overtime and emergency manning. It informs a candidate pool of new vacancies, developing rosters and manages out-of-hours support. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Consultee Exchange Centre

    TERRAQUEST SOLUTIONS LIMITED

    The Consultee Exchange Centre supports the application submission portal by providing a central hub for communication between all stakeholders, allowing invited consultees to respond to requests for feedback about a development. The hub also ensures the information gathering and consultation phase of application decision-making is productive and efficient.

  • Lone Worker Solution

    BOOMALERT LIMITED

    Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations. ISO-27001, Cyber Essentials, and Cyber Essentials Plus.

  • Proact Security Log Management Service (Microsoft Sentinel)

    PROACT IT UK LIMITED

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).