Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • IRIS Intelligence Governance, Risk, and Compliance (GRC) System

    IRIS INTELLIGENCE LIMITED

    IRIS Intelligence Governance, Risk, and Compliance (GRC) System helps organisations manage uncertainty, achieve targets and increase awareness and compliance across the organisation. It facilitates the design and implementation of control frameworks, risk mitigation, and the creation and roll-out of policies. The system supports ISO27000, ISO31000, NIST among others.

  • CrowdStrike Falcon Exposure Management

    INTEGRITY360 LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Mimecast Cybergraph

    INTEGRITY360 LIMITED

    Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Dynamics 365 and PowerPlatform Business Value Assessment ROI Build

    VE3 GLOBAL LTD

    VE3 introduces the Business Value Assessment ROI Navigator, meticulously crafted to assist in formulating, strategizing, and implementing business transformation endeavors. Comprising a structured three-stage process encompassing Envisioning, Business Value Assessment, and Solution Assessment, this tool is tailored to equip you with insights and preparedness for navigating disruptive changes.

  • CIPHR Connect - CIPHR iRecruit Secure Online Recruitment Software as a Service

    CIPHR

    Provision of SaaS Online Recruitment Software, ISO27001 certified solution managing Official and Official-Sensitive data. Manage recruitment throughout the process; Vacancy Approval, Talent Attraction, Candidate Portal, Recruitment Workflow, Onboarding and documents. Business systems integration, including HR, Candidate Testing and Psychometric Testing providers. Implementation, consultancy and managed services.

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Egress Protect - Email Encryption

    S3 Ltd

    Egress Protect guards against data breaches by reducing human activated risk. Easy to use, certified encryption with flexible user controls and automatic encryption options supports your security policy.

  • Street Entertainer Licensing Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides Street Entertainer Licensing Automation , data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • Call Centre Case Management

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Sophos Central Email Advanced

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption. bssgc

  • Forescout Cyber Assurance

    Cyberlab

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.

  • Software Development

    IT LABS D.O.O.E.L.

    Our cloud software development service encompasses the entire software development lifecycle, from initial concept and design to deployment and maintenance. These services are tailored to the unique requirements of clients. We are specialized in delivering software solutions in: EdTech, FinTech, Automotive, E-commerce, Gaming & Entertainment, Business Consulting, Legacy &Government projects.

  • Microsoft Entra ID governance

    PHOENIX SOFTWARE LIMITED

    Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.

  • CyberArk CyberArk Conjur Secrets Manager Enterprise

    INTEGRITY360 LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • Police SMS

    BOOMERANG I-COMMS LTD

    Intelligent, automated, threaded messaging designed for the Police. Multi-channel broadcasts, conversational SMS, Email and voice messaging, and appointment management all from an easy-to-use user interface, email inbox or integrated through API. A communication solution for the Police to streamline and manage workflows. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • 2FA API solution

    BOOMERANG I-COMMS LTD

    Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.

  • Sophos Intercept X Mobile

    SOFTCAT PLC

    Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.

  • Voixtel Cloud Telephony Software and Services

    VOIXTEL

    We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.

  • boxxe Tenable Web Application Scanning

    BOXXE LIMITED

    Simple, scalable and automated vulnerability scanning for web applications.

  • Decommissioning as a service (DaaS) On-site Data Bearing Media Destruction

    Network 2 Supplies Ltd

    Data destruction and disposal/recycling of legacy equipment is central to managing a system migration to Cloud. N2S offer onsite data destruction for hardware. Certificates listing hard drive serial numbers as proof of destruction are provided. All resultant waste will be disposed of in-line with the WEEE regulations.

  • Collaboraite® Data and AI Solutions

    COLLABORAITE LTD

    Collaboraite® work with you to design secure data & AI solutions to solve your operational challenges, through design thinking and agile delivery. We create: (a) Bespoke, secure, human-centred solutions leveraging data, analytics and AI capabilities enabling digital transformation. (b) Data & AI products securely hosted and integrated in Long Arm®.

  • Check Point Harmony Email and Collaboration

    ITogether

    Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.

  • Security Detection and Visibility (SIEMaaS) as a service

    PROACT IT UK LIMITED

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • UK Engage Secure online meetings with voting

    PIN Communications

    Our secure online meetings with voting solution is used for online and hybrid meetings. It’s easy to use and flexible. With advanced voter authentication or single sign on. It manages proxy voting and live in meeting voting processes, and can be branded with client’s logo, colour scheme and imagery.

  • Microsoft .Net App Rearchitecture using Power Apps Platform

    CEOX SERVICES LTD

    Ceox’s Microsoft .NET App Rearchitect using Power Apps enables Public Sector Organisations to move legacy business apps to a modern, secure, scalable platform. Use Microsoft’s Low-Code Business Application platform, built on Dataverse, to quickly and efficiently deliver engaging modern applications which meet the needs of both users and the organisation.

  • Backup, and Disaster Recovery Services with DATTO

    TECHNOLOGY SERVICES GROUP

    TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup. This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.

  • Penetration Testing Solution

    GET SWARMS LIMITED

    Penetration Testing Solution offered by Get Swarms provides comprehensive assessments to bolster organisation security. By simulating real-world cyber-attacks, we uncover vulnerabilities in networks and applications, enabling proactive defense measures. Detailed reports are produced together with proposed remediations to support ongoing cyber defence strategy.

  • Getvisibility Synergy DSPM+

    Gradian Systems Ltd

    Quickly gain full visibility and context for your data, whether in motion or at rest, across on-premises and cloud environments. Enhanced by the power of our customisable, accurate, and explainable AI Mesh, this is a game-changer for security in Generative AI usage and governance.