Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • Blue badges

    Pentagull Ltd

    Our blue badges system is a cloud software service for the effective management of blue badges. Our system facilitates enhanced efficiencies, tangible savings and improved customer satisfaction levels. It integrates to the Department for Transport (DfT) portal and will automatically retrieve new Blue Badge applications.

  • CheckPoint Harmony Email & Collaboration

    BYTES SOFTWARE SERVICES LIMITED

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc

  • Office 365 Exchange Advanced Threat Protection

    VE3 GLOBAL LTD

    VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.

  • Tenable Active Directory Security

    PHOENIX SOFTWARE LIMITED

    Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.

  • Tenable Vulnerability Management

    SAPPHIRE TECHNOLOGIES LIMITED

    Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical. Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

  • Resource management solution

    BOOMERANG I-COMMS LTD

    Boomerang can manage multiple vacancies for temporary appointments, one-off events or recurring requirements. It contacts, counts and fulfils based on requirement. System manages shifts, overtime and emergency manning. It informs a candidate pool of new vacancies, developing rosters and manages out-of-hours support. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Consultee Exchange Centre

    TerraQuest

    The Consultee Exchange Centre supports the application submission portal by providing a central hub for communication between all stakeholders, allowing invited consultees to respond to requests for feedback about a development. The hub also ensures the information gathering and consultation phase of application decision-making is productive and efficient.

  • Lone Worker Solution

    Boomalert Ltd

    Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations. ISO-27001, Cyber Essentials, and Cyber Essentials Plus.

  • Proact Security Log Management Service (Microsoft Sentinel)

    PROACT IT UK LIMITED

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Sentinel Spaces

    YUDU Sentinel

    Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight. Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.

  • Sharepoint

    Clarity Tech Ltd

    Our expertise includes SharePoint and Office365 SharePoint Online. Our service include: Website, EDRMS and ECMS implementation, Web portal, SharePoint strategy, development, training, mentoring, migration and support. One of our large scale Sharepoint product is developed for NHS Foundation Trust Hospital. This product provides critical information to over 4000 users.

  • Arcus Notices

    ARCUS GLOBAL LIMITED

    Arcus Notices is a flexible and intuitive cloud-based solution, built on Salesforce, helping users manage the full Notice process from initiation, preparation, issuing of the notice to monitoring of compliance. The included mobile app supports full access and offline remote working, enabling officers and teams to work efficiently and effectively.

  • Neo Technology Digital Document Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.

  • Powered by Neo: Tenant Absence Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's Tenant Absence Management Solution efficiently addresses the challenges of managing absent tenants in the housing sector. Our tenant tracking and activity monitoring system ensure efficient property oversight.

  • Cybersecurity Awareness Training and Simulated Phishing

    Bob's Business Ltd

    A fully managed service including cybersecurity awareness training, policy management, and delivery of simulated phishing campaigns. Human Vulnerability Assessments and cognitive-behavioral learning. Delivery of bespoke training packages and cyber masterclasses. Providers of a learning management system.

  • Sophos Central Intercept X Advanced with XDR

    BYTES SOFTWARE SERVICES LIMITED

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc

  • ProvetoVote

    AVOCO SECURE LIMITED

    ProveToVote (P2V) is a revolutionary solution designed to streamline and simplify the often challenging task of identity verification during the voting process. Avoco’s mission is to make this essential voting element accessible and less burdensome for everyone involved.

  • Forescout NetSec Core

    CHESS ICT LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Collibra

    Billigence

    Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, data dictionary and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • Magma Flows

    MS INFOTECH LTD.

    Magma flow are various business automation flows to streamline employee onboarding, time tracking, project management, expense tracking, etc

  • Chrome Education Upgrade License

    LEVETT CONSULTANCY LIMITED

    Chrome Education Upgrade empowers IT to create educational environments for teachers and learners to thrive in, with enhanced management, security, and support capabilities for ChromeOS Devices. Remotely manage, provision, deploy, and implement ChromeOS policies to streamlining arduous IT tasks, and enable users to be more productive using technology.

  • Accounts Payable Control Centre

    Xelix

    AI-powered software that bolts onto your finance systems to enhance Accounts Payable controls, automate tedious tasks and deliver meaningful insights.

  • Google ChromeOS Flex Licence

    Netpremacy Limited

    Google Chrome OS Flex can be installed on your PCs and Macs so that they are secure, boot fast, don’t slow down over time, update automatically in the background and can be managed from the cloud with a Google Chrome Enterprise Upgrade licence from Netpremacy.

  • Caveris ICAS (Information & Cyber Assurance Suite)

    CIRRO LIMITED

    Organisations are increasingly dependent on third-parties to deliver. Our approach to this Governance Risks and Compliance (GRC) is based on Caveris ICAS. This allows you to Automate your Third-Party Risk Assessment Lifecycle on a single user friendly platform so you can identify, track and remediate issues faster.

  • Monitoring alerts

    Boomalert Ltd

    Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations. ISO-27001, Cyber Essentials, and Cyber Essentials Plus.

  • CheckPoint CloudGuard Code Security (Spectral)

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use. With Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations. bssgc

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • Drupal CMS – Drupal content management system

    S8080 LIMITED

    ISO27001 certified Drupal platform and Drupal upgrades - Drupal cloud hosted CMS for digital services and websites. S8080’s compliant Drupal platform securely handles multilingualism, CRM, integrations, single sign-on, forms and workflow. Drupal content management system is open-source, easy to use, yet powerful. Mobile, accessible and designed around user’s needs.

  • Yeti Real-Time Anomaly Detection

    BLUE HAT ASSOCIATES LIMITED

    Yeti is a cloud data platform for clients to analyse time series data in real time and flag anomalies. It's a series of Open Source software libraries we have developed to rapidly prototype Machine Learning solutions.