Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2172 results found

2172 results found in Lot 2: Cloud software in the category Authentication, identity and access management

  • Privileged Access Management (PAM) & Identity as a Service (IDaaS)

    EXPONENTIAL-E LIMITED

    The PAM Service allows policies and identities to be to be defined and managed for human and non-human (machine) identities requiring privileged credentials. Time bound sessions are monitored, logged, recorded, and stored for compliance and audit. Context aware MFA and SSO are integrated, with remote access for external vendors controlled.

  • Core coc00n Device Protection

    COC00N CYBER LIMITED

    Core coc00n provides highly secure devices without compromising usability. It employs familiar, off-the-shelf hardware such as Apple and Windows devices to ensure that while users benefit from high-level security, the learning curve associated with new or unfamiliar technology is minimized, allowing for a seamless integration into their daily lives.

  • Sophos Endpoint Security, Intercept X, XDR & MTR

    SCG CORPORATE LIMITED

    Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.

  • Altia Covert Operations Solution (ACOS) Community Intelligence / Information in Confidence

    ABM Intelligence Limited

    ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.

  • Barracuda Email Protection Advanced

    QUADRIS LIMITED

    Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.

  • Check Point Harmony Mobile

    LRQA

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Computacenter - CyberArk Endpoint Privilege Manager (EPM) SaaS

    Computacenter (UK) Ltd

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Umbraco CMS Design, Development and Support (Umbraco Platinum Partner)

    NEXER DIGITAL LTD

    Umbraco is one of the world's most popular, and easiest to use, open source web Content Management Systems (CMS). Nexer is a Contributing Platinum Umbraco Partner, the highest level of accreditation possible. We’ve built 250+ websites and digital solutions based on Umbraco. We lead the Umbraco accessibility and sustainability communities.

  • boxxe Cisco ThousandEyes

    BOXXE LIMITED

    ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.

  • Cegeka UK's Secure Portal for Communications Data Disclosure

    CEGEKA UK LIMITED

    Cegeka UK's Disclosure Management System (DMS); an advanced software solution designed to streamline and automate disclosure processes. Organisations can efficiently handle a range of disclosures, retrieving and aggregating data from multiple sources. DMS provides a secure centralised platform for raising, fulfilling, reviewing, and approving disclosure requests, ensuring accuracy and consistency.

  • Dockerization of Development Environments

    LEFKE IT LIMITED

    At LefkeIT, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.

  • Managed SIEM and SOC - Managed Detection and Response (MDR) (Azure Sentinel or IBM QRadar)

    SecurityHQ

    Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.

  • HCL AppScan on Cloud

    INTEC SYSTEMS LIMITED

    HCL AppScan is a dynamic application security testing solution designed for security experts and pen testers to use when performing security tests on web applications and web API. It runs automated scans that explore and test web applications based on one of the most powerful scanning engines available.

  • Council & Local Authority SMS Service

    Reach-Data Ltd

    We offer a dedicated inbound / outbound SMS service specifically aimed at Councils and Local Authorities. All services are housed in UK data centres using dedicated infrastructure and direct connectivity with the mobile networks. We are ISO 27001 accredited with a suitably scoped ISMS covering all services.

  • Akamai Bot Manager

    NETWORK INTEGRATION TECHNOLOGIES LTD

    Bot Manager Premier provides advanced bot detections designed to detect and mitigate the most sophisticated bots, like those typically seen in use cases such as credential abuse, inventory hoarding, gift card balance checking, and other forms of web fraud.

  • Cloud Software

    PROPEL TECH LTD

    Change is the only constant. It drives the need for digital transformation, rethinking how your business uses technology and processes to continuously evolve. We help businesses manage change and become more efficient by finding the right possibilities, using new and evolving technology to achieve digital transformation.

  • Cloud SaaS Products

    BASEEL PARTNERS LLP

    Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.

  • Microsoft 365 Services

    TECHNOLOGY TRANSFORMATION GROUP LTD

    Technology Transformation Group assesses your organisation's software needs to develop a tailored Microsoft 365 Service strategy, leveraging the full potential of your licenses. We analyse existing licensing agreements, identifying cost-saving opportunities and offer guidance on product features such as Word, Excel, and Teams for enhanced productivity, security and team empowerment.

  • UK Sovereign Symmetric Key Agreement - Arqit

    NINE23 LTD

    UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.

  • Netwrix StealthINTERCEPT

    SOFTCAT PLC

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • IBM Security - Verify

    CSI Limited

    IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.

  • Disclosures Manager - Disclosure and Barring Service (DBS) services

    Atlantic Data

    Atlantic Data's Disclosures service provides organizations with an online platform for processing, administering, and managing criminal record checks. This service connects directly to the DBS through its eBulk service. Disclosures Manager is highly configurable with a comprehensive suite of management tools to assist organisations to manage and oversee these checks.

  • Microsoft Entra Internet Access  (PREVIEW

    PHOENIX SOFTWARE LIMITED

    Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.

  • NQM Project Management Platform

    NQUIRINGMINDS LIMITED

    NQM Project Management Platform is a task and project management platform for working across organizations.

  • Arcus Corporate Governance

    ARCUS GLOBAL LIMITED

    Arcus Corporate Governance aids teams managing complaints, freedom of information requests, personal data rights requests, MP and Member enquiries, and other corporate requests. It enables these requests to be logged, allocated, tracked, and aids in collation of answers and approvals. Online forms and publishing FOI responses is included.

  • Pathlock Cloud Application Access Governance (AAG)

    RESULTING LIMITED

    Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • UK Sovereign Zero Trust (ZTNA) - Software Defined Perimeter - Appgate

    NINE23 LTD

    UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.

  • SMS NHS

    BOOMERANG I-COMMS LTD

    Boomerang aids healthcare providers in achieving better outcomes at lower costs through efficient messaging solutions. Our communication service streamlines engagement across various channels, automating tasks to reduce missed appointments, promote messaging and automate manual workforce management burdens. ISO-27001, Cyber Essentials,Cyber Essentials Plus accredited