Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3890 results found

3890 results found in Lot 2: Cloud software in the category Application security

  • Animal Licensing Application Process Automation - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ licensing software provides online self-service animal licensing, data validation and process transformation. Used as a stand alone system or fully integrated, verso can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.

  • MetaCompliance Security Awareness Essentials

    MetaCompliance Ltd

    MetaCompliance Security Awareness Essentials helps to raise awareness of cyber threats, reduce the risks associated with attacks, and embed a culture of security compliance. Organisations can automate their annual security awareness program and deliver 12 months of awareness activities that engage employees to uphold best practice behaviours, all year round.

  • Powered by Neo: Advanced Artificial Intelligence Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's AI solution elevates tenant satisfaction and operational efficiency by incorporating features such as virtual assistants, predictive maintenance, automated repairs reporting, and flagging urgent cases that need attention, resulting in proactive issue resolution and enhanced communication channels.

  • Orca Security CNAPP

    INTEGRITY360 LIMITED

    Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.

  • CDW Sophos Managed Risk

    CDW LIMITED

    Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Managed Risk, experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacks

  • boxxe Delinea Secret Server (PAM)

    BOXXE LIMITED

    Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.

  • Forcepoint Behavioural Analytics (FBA)

    Gradian Systems Ltd

    Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud

  • ECINS Anti Social Behaviour and Community Safety Reporting and Case Management System

    Empowering Communities

    Encrypted public facing ASB Reporting and Case Review Forms and Reporting Module that integrates with the ECINS ASB and Community Safety Multi-Agency Case Management System. Includes electronic ASB diary sheets and option to integrate with the ECINS Victim Module. Used for over 80 community safety areas of business.

  • Micro Focus, now OpenText - Vertica Accelerator on SaaS

    MICRO FOCUS SOFTWARE UK LTD

    Vertica Accelerator is a cloud‐based Software‐as‐a‐Service(SaaS) that can create, manage,and monitor Vertica databases (only Vertica Eon mode is supported).Vertica Accelerator provides the Vertica database as a service and a control plane that creates Customer database(s)within a customer provided cloud account, manages the infrastructure and operations, and monitors those created database(s).

  • Patch & Asset Management Solution

    GET SWARMS LIMITED

    Our Service involves the systematic management of software updates and tracking of digital assets within an organization's IT infrastructure. It encompasses processes such as automated patch deployment, asset inventory management, compliance monitoring, and system optimization. Our goal is to ensure the security, reliability, and regulatory compliance of IT systems.

  • Drata Automated Governance, Risk & Compliance Platform

    S3 Ltd

    Drata is a security/compliance automation platform that continuously monitors and collects evidence of your security controls, while streamlining workflows to ensure audit-readiness. It’s an all in one GRC platform, integrating with all your SaaS services to bring compliance status of all your people, devices, assets, and vendors into one place.

  • Bizzdesign Horizzon

    BIZZDESIGN UK LTD.

    Bizzdesign Horizzon is an Enterprise Architecture (EA) platform, recognised by major analyst firms. It helps organisations with investment prioritisation, transformation delivery and risk management; presenting multi-dimensional visualisations of the design and transition path to the targeted future. Success should not be a matter of hope. It should be by design.

  • CRM on Dynamics 365

    FormusPro

    FormusPro is a certified Microsoft Partner who specialises in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.

  • Google Chronicle Security Operation Platform, SIEM & SOAR

    KHIPU NETWORKS LIMITED

    Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.

  • Proofpoint Insider Threat Management

    SOFTCAT PLC

    Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.

  • Oracle Cloud Analytics For Applications

    FUJITSU SERVICES LIMITED

    Fujitsu has deep experience in implementing Oracle Analytics Cloud solutions and is well-positioned to help you plan, adopt and integrate Oracle ERP Cloud. Our proven methodologies and standardised tools simplify and accelerate the implementation process while minimising risk.

  • Check Point CloudGuard Network Security - For Azure Virtual WAN

    ITogether

    Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.

  • SensorCIS - an Energy Management Software and Service

    Ultan Technologies

    SensorCIS reduces energy waste, increase energy efficiency, cuts energy costs – by using the tool for analysis, insights and predictions of utility usage and other ESG and sustainability data. It aggregates and analyses meter data and presents this data in clear dashboards. Actions include smart alerts, purchasing decisions, identifying savings.

  • Sentinal One

    COMMUNICATION STEM LIMITED

    Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network

  • Sophos Network Detection and Response

    Cyberlab

    Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows. NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.

  • Sophos Managed Risk

    BYTES SOFTWARE SERVICES LIMITED

    Sophos Managed Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. Our experienced analysts identify cybersecurity vulnerabilities and potential attacks in your environment so actions can be taken before they disrupt your business. bssgc

  • TRUSTMARQUE FORCEPOINT PRODUCT SUITE

    TRUSTMARQUE SOLUTIONS LIMITED

    Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value

  • Trend Micro One

    INTEGRITY360 LIMITED

    Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.

  • Microsoft Power Platform Implementation Services including Dynamics 365

    WR LOGIC LIMITED

    The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365

  • LogRhythm SIEM

    SAPPHIRE TECHNOLOGIES LIMITED

    A security operations service (SOC) tuned and designed for public sector use, effectively building a common SOC for public sector. This allows public sector to individually buy into a common set of standards and processes aligned to public sector threat intelligence.

  • ServiceIAM - Managed Identity Service Platform (MISP)

    CYBERIAM HOLDINGS LIMITED

    CyberIAM's MISP is a Managed Identity Service Platform, offering a set of services tailored to the size and needs of your environment; providing implementation of privileged and identity and access management (IAM and PAM) solutions to protect your identities as well as the management of the software after implementation.

  • Forcepoint Data Loss Protection (DLP)

    CHESS ICT LIMITED

    Follow your data across networks and devices—both at rest, in motion and in use. Create and enforce policies that provision the access and movement of data to prevent data breaches and help ensure compliance with Forcepoint Data Loss Prevention (DLP).

  • Pegasystems Cloud Software - Intelligent Virtual Assistant

    PEGASYSTEMS LIMITED

    Pega is a low-code platform for AI-powered decisioning and workflow automation. We enable organisations to get work done using apps that are secure, scalable, governed, and maintainable. We offer solutions for business process management, digital process automation, and customer/citizen engagement. Intelligent Virtual Assistant is a key feature of the platform.

  • Appvia Wayfinder

    APPVIA LTD

    A developer self-service platform: Provide self-service capabilities to Developers, ensuring secure and consistent infrastructure and application deployments on Azure, AWS and GCP. Manage a fleet of Kubernetes Clusters, (GKE, AKS, EKS) and Helm packages with automated workload identities and package up Terraform modules for self-service with application deployment templates.

  • Access Legal Compliance Software

    ACCESS UK LTD

    Our cloud-based risk and compliance platform helps firms record, track and manage their regulatory and quality standard obligations. The system is used to help them comply with the SRA Standards and Regulations, Lexcel and CQS. We have designed modules to make it easier to complete common risk and compliance activities