Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

823 results found

823 results found in Lot 2: Cloud software in the category Remote access

  • JaaS, JiVS IMP as a service. Hosted Legacy System Retirement as a Service

    RESULTING LIMITED

    JaaS enables the retirement of legacy, historical data into a compliant, user accessible managed Data Management platform. JaaS is a highly scalable service. Your data is managed with JiVS with a high-level of security and acces to the data. You only pay for what you use, supporting full budgetary certainty.

  • COOLSPIRiT a Databarracks Company: Barracuda Email Protection Premium Plus

    COOLSPIRiT, a Databarracks company

    Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.

  • Endpoint Detection and Response Solutions

    FuseMail

    VIPRE Endpoint Detection & Response provides comprehensive anti-malware and anti-exploit protection for Windows and Mac endpoints.

  • T-Pro Dictate - Dictation, Transcription, Voice Recognition, Ambient Speech Workflow Solution

    T-Pro

    T-Pro Dictate is a hosted platform that delivers speech and ambient voice recognition, digital dictation/transcription technology to boost productivity, reduce costs and drive innovation. Implemented in over 40 NHS Trusts, T-Pro dictate drives efficiency across workflows, settings, devices, and apps for a seamless, consistent, and personalised voice experience

  • KickSecure Premium

    Kick ICT

    We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security. We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.

  • F5 Distributed Cloud Client-side defense

    FULLPROXY LIMITED

    F5 Distributed Cloud Client-Side Defense is a comprehensive security solution that protects web applications and APIs from malicious client-side attacks. It leverages the power of F5's Distributed Cloud Services, delivering robust security capabilities at the edge, closer to users and potential threats.

  • Dashlane Password Manager

    S3 Ltd

    Dashlane Password Manager is always private and secure. Our zero-knowledge patented encryption means not even we can see your passwords and passkeys. Protect more than your passwords with intuitive credential management for your whole organisation. Set, forget, and trust Dashlane to secure your people and data against breaches.

  • CheckPoint - Infinity SOC

    VE3 GLOBAL LTD

    A cloud-based platform empowers SOC analysts to swiftly uncover, investigate, and mitigate attacks with 99.9% accuracy. InfinitySOC utilizes an advanced AI algorithm to identify behavioral patterns, leveraging big data analysis from ThreatCloud to pinpoint active threat indicators.

  • CrowdStrike Falcon® Counter Adversary Operations

    PHOENIX SOFTWARE LIMITED

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • Insite (Hosted) and Insite Everywhere Geographical Information System (GIS) Platform

    CACI LIMITED

    InSite (hosted) & InSite Everywhere is a Geographic Information System (GIS) – a secure hosted or cloud application combining licensed and imported datasets (e.g. household, individual data), analysis, mapping and reporting. It enables definition of geographic areas and analysis of data such as the population who live and work there.

  • Knowbe4 Cyber Security Awareness Training

    SCG CORPORATE LIMITED

    Your employees are frequently exposed to sophisticated social engineering attacks. It is time for a comprehensive approach to effectively manage this problem, managed by people with a technical background. The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.

  • SMS for Dynamics

    BOOMERANG I-COMMS LTD

    Boomerang’s Dynamics 365 plug-in and custom Connector provides seamless integration to Microsoft apps and Power Platform, overcoming broadcast limitations by matching activities with responses. This fosters conversational engagements, recorded in contacts’ timelines for seamless automation and stakeholder interactions. ISO-27001, CyberEssentials,Cyber Essentials Plus certifications ensure data security.

  • EasyVista EV Reach

    Tekwurx Limited

    EV Reach is a SaaS or on-premises software used for remote support and IT process automation.

  • Open Banking Account Information Service (Fully Integrated)

    DGM AGILITY LIMITED

    DGM Agility is an authorised Account Information Service Provider (AISP) which enables us to provide a gateway to the Open Banking service. This service enables access to an aggregation of financial information for an individual or business. We collect, store, and make available the information as a service

  • boxxe Sophos Firewall

    BOXXE LIMITED

    Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.

  • Altia Covert Operations Solution (ACOS) Prison Surveillance (OPT) (PAS) (NOMS)

    ABM Intelligence Limited

    ACOS offers a solution for capturing intelligence within the prison system. Using national forms for authorities, review, renewal and cancellation functions ensure legislative compliance in the intelligence gathering field. RIPA, IPA, GDPR, CCA, HRA compliant. Risk assessment tools identify potential for compromise. Covert capability links with other ACOS modules

  • Becrypt Paradox Edge Hosted Management Service

    BECRYPT LIMITED

    Paradox is a secure Cloud Access desktop platform, developed with and widely deployed across UK Government for securely accessing Cloud based services. Paradox provides an intuitive hosted end user platform for accessing Public or Private Cloud resources, supporting identity management and segregation between infrastructure management and business service delivery.

  • Telecommunications Phone System, Managed VoIP - enableVoice

    EnableIT Technologies Ltd

    enableVoice: A versatile VoIP telephone system. With seamless integration, robust recording features, and budget-friendly pricing, empower your business. Whether you’re at the office with physical phones or part of a remote team using mobile devices, enablevoice ensures connectivity from anywhere in the world, all you need is an internet connection.

  • Falcon Exposure Management

    PHOENIX SOFTWARE LIMITED

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Imperago Door Access Control

    HFX Limited

    Cloud based Imperago door Access Control is simple to install, cost effective, robust, easy to use and up and running in days. See at a glance, exactly where your staff are. Imperago uses card or biometric technology, using the latest smart devices. Utilising the latest contactless and temperature sensing technology.

  • Zscaler for users

    SOFTCAT PLC

    Zscaler for users ensures fast, secure, reliable access to applications and the internet from anywhere. Providing policy-based access to private applications and assets without VPN costs or security risks. Users benefit from our Internet Security platform plus granular, policy-based access to internal resources a single point.

  • Varonis Data Security Platform

    BYTES SOFTWARE SERVICES LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc

  • Evalu-8 Environmental Health & Safety - EHS Software

    EVALU-8 SOFTWARE LIMITED

    Evalu-8 is an innovative EHS software platform designed by industry experts. It is feature-rich, intuitive, and affordable for all organisations. Its goal is to help organisations manage and reduce risks associated with workplace operations, manage environmental impact, ensure compliance with regulatory requirements, and promote the safety and well-being of employees.

  • Microsoft Dynamics Finance and Procurement Platform

    TELEFÓNICA TECH UK BUSINESS APPLICATIONS LIMITED

    Microsoft Dynamics 365 Finance and Supply Chain Management (former Microsoft Dynamics 365 Finance and Operations) is Microsoft “flagship” enterprise resource planning (ERP) system for medium to large organisations.

  • BastionHub

    BLANKBOX TECHNOLOGIES LTD

    BastionHub is a fully audited and high security Privileged Access Management solution. It provides remote Just In Time access to sensitive systems or networks. It allows system owners to grant temporary fully audited access to environments with the ability to revoke access in an instance

  • Bus Operator Performance Reporting

    R2P Systems UK Ltd

    This service allows bus operators and local authorities to report on arrival/departures and lateness of vehicles. It provides detailed arrivals/departure times at bus stops along journeys. At the high level, it provides a complex timetable schedule heading report to see how vehicles are performing against timetables.

  • Micro Focus, now OpenText - NetIQ Identity Intelligence on SaaS

    MICRO FOCUS

    NetIQ Identity Intelligence service provides a cloud-based enterprise service that is intended: To assess risk based on insights from identity information Apply methods to remove excessive, anomalous, or erroneous entitlements Improve the ongoing identity governance process, including risk reporting

  • CrowdStrike Falcon® Counter Adversary Operations

    Computacenter (UK) Ltd

    With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.

  • EVOLVE Spend Management

    Elcom Systems Ltd

    EVOLVE Spend Management, seamlessly integrated Source to Pay process including MultiQuote, eSourcing, Tracker, Tail Spend, eAuction, Contract Management, Catalogues, Inventory Management (inc. Scan4Safety), Community Stores, PPE Central Store, Purchase to Pay (P2P), Analytics, Electronic Trading (PEPPOL access point), Supplier Financing and eMarketplaces. Integration with legacy, supply chain and external systems.

  • SecurEnvoy MFA / Identity Access Platform

    CYBERLAB CONSULTING LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.