Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3838 results found

3838 results found in Lot 2: Cloud software in the category Application security

  • Lone worker monitoring

    BOOMALERT LIMITED

    Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations. ISO-27001, Cyber Essentials, and Cyber Essentials Plus.

  • Web Application Security Platform ('WASP')

    JUMPING RIVERS LTD

    Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.

  • SMS Appointments

    BOOMERANG I-COMMS LTD

    An intelligent platform to automate appointment management using our patented threading technology for 2-way messaging. We make it easy to manage appointments and integrate with your booking system / schedule. SMS, EMAIL AND IVR used to set, remind and cancel appointments. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited

  • Enterprise Asset Management Software

    AMX SOLUTIONS LIMITED

    AMX Enterprise is a one-stop asset management solution. Hold a comprehensive inventory of all assets, with customisable interfaces for each asset type (Structures, Flood, Highways, Street-Lighting and more). Manage inspection and maintenance regimes and respond to defects / incidents and enquiries efficiently. Spatially enabled with mobile working and intuitive reporting.

  • Animal Licensing Application Process Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides online self-service animal licensing, data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • MetaCompliance Security Awareness Essentials

    METACOMPLIANCE LIMITED

    MetaCompliance Security Awareness Essentials helps to raise awareness of cyber threats, reduce the risks associated with attacks, and embed a culture of security compliance. Organisations can automate their annual security awareness program and deliver 12 months of awareness activities that engage employees to uphold best practice behaviours, all year round.

  • Powered by Neo: Advanced Artificial Intelligence Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's AI solution elevates tenant satisfaction and operational efficiency by incorporating features such as virtual assistants, predictive maintenance, automated repairs reporting, and flagging urgent cases that need attention, resulting in proactive issue resolution and enhanced communication channels.

  • Orca Security CNAPP

    INTEGRITY360 LIMITED

    Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.

  • CDW Sophos Managed Risk

    CDW LIMITED

    Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Managed Risk, experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks

  • boxxe Delinea Secret Server (PAM)

    BOXXE LIMITED

    Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.

  • Forcepoint Behavioural Analytics (FBA)

    GRADIAN SYSTEMS LTD

    Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • Micro Focus, now OpenText - Vertica Accelerator on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    Vertica Accelerator is a cloud‐based Software‐as‐a‐Service(SaaS) that can create, manage,and monitor Vertica databases (only Vertica Eon mode is supported).Vertica Accelerator provides the Vertica database as a service and a control plane that creates Customer database(s)within a customer provided cloud account, manages the infrastructure and operations, and monitors those created database(s).

  • Patch & Asset Management Solution

    GET SWARMS LIMITED

    Our Service involves the systematic management of software updates and tracking of digital assets within an organization's IT infrastructure. It encompasses processes such as automated patch deployment, asset inventory management, compliance monitoring, and system optimization. Our goal is to ensure the security, reliability, and regulatory compliance of IT systems.

  • Drata Automated Governance, Risk & Compliance Platform

    Security Software Solutions Ltd (S3 Ltd)

    Drata is a security/compliance automation platform that continuously monitors and collects evidence of your security controls, while streamlining workflows to ensure audit-readiness. It’s an all in one GRC platform, integrating with all your SaaS services to bring compliance status of all your people, devices, assets, and vendors into one place.

  • Bizzdesign Horizzon

    BIZZDESIGN UK LTD.

    Bizzdesign Horizzon is an Enterprise Architecture (EA) platform, recognised by major analyst firms. It helps organisations with investment prioritisation, transformation delivery and risk management; presenting multi-dimensional visualisations of the design and transition path to the targeted future. Success should not be a matter of hope. It should be by design.

  • CRM on Dynamics 365

    FormusPro

    FormusPro is a certified Microsoft Partner who specialises in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.

  • Google Chronicle Security Operation Platform, SIEM & SOAR

    KHIPU NETWORKS LIMITED

    Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.

  • Proofpoint Insider Threat Management

    SOFTCAT PLC

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Oracle Cloud Analytics For Applications

    FUJITSU SERVICES LIMITED

    Fujitsu has deep experience in implementing Oracle Analytics Cloud solutions and is well-positioned to help you plan, adopt and integrate Oracle ERP Cloud. Our proven methodologies and standardised tools simplify and accelerate the implementation process while minimising risk.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    ITogether

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • SensorCIS - an Energy Management Software and Service

    Ultan Technologies Ltd

    SensorCIS reduces energy waste, increase energy efficiency, cuts energy costs – by using the tool for analysis, insights and predictions of utility usage and other ESG and sustainability data. It aggregates and analyses meter data and presents this data in clear dashboards. Actions include smart alerts, purchasing decisions, identifying savings.

  • Sentinal One

    COMMUNICATION STEM LIMITED

    Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network

  • Sophos Network Detection and Response

    Chess CyberSecurity Ltd t/a CyberLab

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Sophos Managed Risk

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. Our experienced analysts identify cybersecurity vulnerabilities and potential attacks in your environment so actions can be taken before they disrupt your business. bssgc

  • TRUSTMARQUE FORCEPOINT PRODUCT SUITE

    TRUSTMARQUE SOLUTIONS LIMITED

    Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value

  • Trend Micro One

    INTEGRITY360 LIMITED

    Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.

  • Microsoft Power Platform Implementation Services including Dynamics 365

    WR LOGIC LIMITED

    The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

  • LogRhythm SIEM

    SAPPHIRE TECHNOLOGIES LIMITED

    A security operations service (SOC) tuned and designed for public sector use, effectively building a common SOC for public sector. This allows public sector to individually buy into a common set of standards and processes aligned to public sector threat intelligence.

  • ServiceIAM - Managed Identity Service Platform (MISP)

    CYBERIAM HOLDINGS LIMITED

    CyberIAM's MISP is a Managed Identity Service Platform, offering a set of services tailored to the size and needs of your environment; providing implementation of privileged and identity and access management (IAM and PAM) solutions to protect your identities as well as the management of the software after implementation.

  • Forcepoint Data Loss Protection (DLP)

    CHESS ICT LIMITED

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).