Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • Landlord Accreditation Scheme Web Platform

    ROCKTIME LIMITED

    Rocktime's landlord accreditation software allows councils to provide an effective online platform to manage landlord accreditation through the delivery of E-learning for ongoing CPD accreditation and the management of instructor led training courses. Rocktime's systems can be integrated with legacy CRM/EDRMS systems as well as postcode and online payment systems

  • Customer Relationship Management (CRM)

    TELEFÓNICA TECH UK BUSINESS APPLICATIONS LIMITED

    Microsoft Dynamics 365 for Customer Engagement (CRM) integrates Sales, Marketing, Customer Service, Field Service, and Project Service Automation. It streamlines interactions, offering a unified platform for customer engagement, sales, and marketing. Renowned for flexibility and scalability, it tailors solutions for businesses of all sizes, supporting diverse industry needs seamlessly.

  • Govmail Hybrid Mail

    DSI BILLING SERVICES LIMITED

    Govmail is our hybrid mail solution that enables organisations to reroute their locally-printed documents to our secure production centres for bulk printing and mailing - achieving up to 60% reduction in costs. Supports e-doc channel shift, home worker document production, revenues and benefits printing, offsite document production and mail merge.

  • Qualys Vulnerability Scanning

    ZENZERO SOLUTIONS LIMITED

    Comprehensive vulnerability scanning including internal, external, network, application, compliance and agent-based scanning. Powered by Qualys, our scanning provides continuous assurance, identifies potential security weaknesses and threats across assets and provide actionable remediation advice.

  • CDW Sophos Managed Detection and Response Complete (MDR) Server

    CDW LIMITED

    Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service. You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.

  • SecurityCoach Training - KnowBe4

    RAZOR THORN SECURITY LTD

    SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from existing security stacks to deliver real-time coaching, reinforces security culture and turns insecure user behaviour into an opportunity to train them to have security top-of-mind.

  • UCD Research

    COGWORX LIMITED

    Exploring the wider context in which a user is accessing your product or service so that we can find the best opportunities that would deliver the most value.

  • Compliance Software Solution

    WT DATATECH LTD

    Our cloud-based Solution offers a straightforward, efficient, and powerful tool for managing all governance, risk, and compliance needs, including ISO standards. Our Compliance Solution combines management system integration and risk assurance software to provide the easiest path for your business to attain and uphold ISO certification.

  • Agile Tooling Assessment and Implementation (e.g., Jira, Trello)

    LEFKE IT LIMITED

    LefkeIT specializes in Agile Tooling Assessment and Implementation for Government Departments. Our expert consultants assess needs and recommend and deploy the most suitable Agile tools like Jira or Trello. With tailored setups, we enhance collaboration and efficiency. Trust us for reliable Agile Tooling solutions that optimize project management.

  • Simplify ESG Reporting: Environmental, Social, Governance Software

    Ultan Technologies

    Empower your organisation with our Environmental, Social, and Governance (ESG) reporting system, ensuring compliance and risk management. Transform data into actionable insights, showcasing sustainability commitment to stakeholders. Utilise comprehensive modules for transparency, leveraging insights for sustainable operations and project progress.

  • Proofpoint Archive

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc

  • Netwrix Privilege Secure

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance. bssgc

  • Axym (Secure Data Environment)

    North of England Commissioning Support Unit

    A cloud based data access platform / Secure Data Environment. Axym provides individual data access environments to collaborate and share data securely. Axym combines data provision and management, collaborative analytical workspaces, and information governance support and advice. Axym enables end users to develop analysis on a set of standardised data.

  • Sophos Firewall

    PHOENIX SOFTWARE LIMITED

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Adepsi Legacy Call and Cloud Telephony Platform by SVL

    SVL BUSINESS SOLUTIONS LIMITED

    Adepsi is a legacy data solution that imports and stores audio and meta-data from various different voice recording platforms, providing replay functionality on a simplified, supportable platform running on a highly resilient AWS infrastructure. Once imported, the source legacy platform can be decommissioned and all data is safe and searchable.

  • Change Management and Impact Assessment

    LEFKE IT LIMITED

    LefkeIT specializes in Change Management and Impact Assessment. Our expert team evaluates proposed changes thoroughly, identifying potential impacts on processes, systems, and stakeholders. Through strategic planning and stakeholder engagement, we minimize disruptions and ensure smooth transitions, maximizing the success of change initiatives. Trust us to navigate change effectively.

  • Shadow Data Security Posture Management Monitoring

    DIEGESIS LIMITED

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • CDW AvePoint Opus

    CDW LIMITED

    "Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface. Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."

  • Cisco Secure Access Service Edge (SASE)

    SOFTCAT PLC

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Darktrace Active AI Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc

  • Sophos Zero Trust Network Access (ZTNA)

    PHOENIX SOFTWARE LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Operational area management software

    SMART MANUFACTURING SOLUTIONS TECHNOLOGY LTD

    A fully customisable solution allowing organisations to digitalise operational areas for compliance recording and KPI metrics. A net zero service provider to not affect scope 3 emissions as well as enabling quantified reductions to site emissions from existing processes

  • MediWork - Occupational Healthcare Platform

    KINSEED LIMITED

    MediWork is an occupational healthcare solution, streamlining processes like pre-placement, case management, employee health assessments, sick leave management, and return-to-work procedures. It promotes employee wellbeing, ensures compliance with health regulations, and fosters productivity.

  • Gov360 OpenSky : Intelligent Process Automation

    OpenSky Data Systems

    OpenSky's Intelligent Process Automation service combines low-code, Process Mining, AI, RPA, OCR/ICR and analytics to rapidly automate processes, connect insights and deliver high performance at lower costs. This hyper-automation approach creates adaptive systems that streamline workflows, enhance decision-making and improve customer experiences.

  • Varonis SaaS Data Security Platform

    CM Security Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityRating.com: Third Party Risk & Vendor Risk Management + Attack Surface Management Platform

    Infosec Ventures

    SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.

  • Workspace ONE Assist

    PHOENIX SOFTWARE LIMITED

    VMware Workspace ONE Assist is a real-time remote support solution that enables IT and help desk staff to quickly assist employees with mobile and laptop device tasks or issues, decreasing downtime, maximizing productivity, and improving the overall employee experience.

  • OSINT, WEBINT, SOCMINT & III = BLD COUNTER OPS PaaS

    Blue Lights Digital

    COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.

  • Gov360 OpenSky : Enterprise Data & AI - Data Governance & Security (DGSaaS) - Purview

    OpenSky Data Systems

    OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.

  • MTI SOC and SIEM Managed Service

    MTI TECHNOLOGY LIMITED

    MTI Managed SIEM (Security Information and Event Management) provides a centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, with SC Cleared analysts, is fully integrated with Alien Vault's market leading technology and offers 24*7*365 assurance to your business.