Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

2175 results found

2175 results found in Lot 2: Cloud software in the category Authentication, identity and access management

  • Large Language Models (LLMs) and Generative AI

    WISER TRIBES LTD

    We have a deep experience with working on multiple LLM systems to help public sector organisations unlock the potential of LLM and generative AI safely and in a responsible way. The outcome of adoption of our service results in costs savings and enhancing service creation within your organisation.

  • BeyondTrust Priviledged Remote Access

    BYTES SOFTWARE SERVICES LIMITED

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bssgc

  • SMS Microsoft Connector

    BOOMERANG I-COMMS LTD

    Boomerang’s Dynamics 365 plug-in and custom Connector provides seamless integration to Microsoft apps and Power Platform, overcoming broadcast limitations by matching activities with responses. This fosters conversational engagements, recorded in contacts’ timelines for seamless automation and stakeholder interactions. ISO-27001, CyberEssentials,Cyber Essentials Plus certifications ensure data security.

  • SecurEnvoy MFA / Identity Access Platform

    CHESS ICT LIMITED

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Umbraco Azure AI Search

    Aspire Systems

    Method4 is an Umbraco Gold partner. We have been working with Umbraco for many years delivering high quality Umbraco CMS solutions. We have successfully implemented Azure AI Search (formerly Azure Cognitive Search) as a search service for both the front-end and back-end of Umbraco for a wide range of clients.

  • Licensing Case Management System - verso™ software

    ROCKTIME LIMITED

    Rocktime's verso™ Case Management Software can be used as a stand alone system or fully integrated, tailored to mirror and improve your internal processes. Powering local government licensing schemes, verso™ is a market leading option for licence case management.

  • Check Point Cloudguard Network Security (CGNS)

    NETWORK INTEGRATION TECHNOLOGIES LTD

    CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.

  • Imprivata Identity governance and Adminstration (IGA) - formally Identity Governance

    SOMERFORD ASSOCIATES LIMITED

    Imprivata Identity Governance and Administration provides a policy-based approach to simplify and accelerate secure role-based and least privileged access to systems and applications. The solution simplifies and streamlines the entire user lifecycle, improves auditing processes, and delivers on-demand analytics for faster threat evaluation and remediation.

  • NQM Secure Remote Access

    NQUIRINGMINDS LIMITED

    NQM Secure Remote Access provides administrative level remote access to systems, using highly secure frameworks.

  • Enterprise Solutions

    Espire Infolabs Ltd

    Espire offers Enterprise Solutions using multiple technologies like Salesforce (Sales, Service and Community (Experience Cloud), Dynamics 365, Banner(Education), Recruit, Blue Yonder(JDA), Oracle Transport Management System and Manhattan WMS . We provide consultancy, implementation and managed support and Business_as_Usual services with skilled/certified consultants, and architects for implementation/ integration & migration services.

  • Zero Trust Secure Cloud Hosting Service (ZScaler ZPA Application Layer Security)

    VISIONIST LIMITED

    Design and implementation service for ZScaler Private Access to secure cloud-based hosting environments. Migrate your legacy applications to the cloud, safe in the knowledge that only your approved users and partners can access your application and data in discrete microchannels. Aligned to NCSC Best Practice Guidelines for Zero-Trust Networking.

  • HWRC waste permits

    Pentagull Ltd

    Our waste permit system is a cloud software service that allows organisations to effectively manage access to HWRC sites to permitted vehicles. With a strong emphasis on self-service, the application process is streamlined and reduces the need for staff involvement. Our permit system features a fully customisable online application form.

  • Netwrix Password Reset

    SOFTCAT PLC

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity

  • Robust, Flexible, User-Friendly & Secure Micropayments Platform

    PANLOGIC LIMITED

    Digital giving service Multi-channel donations: mobile/tablet/web, SMS/text, debit/credit, PayPal Gift Aid reclaim White-label cause curation/donation mechanism Self-serve organisational sign-up mechanism Management portal: pipeline status of organisations/causes/donations Reporting portal: stakeholders to see their donations/donor data DONATEevents product for competitive event-based giving/payments Generalist/sector-specific ‘Reason to give’ location-specific signage

  • CloudCover Guardian for Azure

    virtualDCS Ltd

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • Netwrix Password Policy Enforcer

    SOFTCAT PLC

    Frustrate hackers, satisfy auditors, and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Infoshare Address Data Matching

    Infoshare Ltd

    Automated data cleansing and matching for all locations, creating a strong data foundation underpinning analysis; insights; AI and ML and entity matching. It includes validation against Ordnance Survey’s AddressBase Premium and Royal Mail’s Postcode Address File, to offer the most comprehensive address validation service available in the UK.

  • Trustmarque Networking Technologies

    TRUSTMARQUE SOLUTIONS LIMITED

    Provision of a full range of secure networking products and solutions for wired, wireless, and wide-area connectivity with public and private cloud management options.

  • Data Analytics

    ROWDEN TECHNOLOGIES LTD.

    Rowden's Data Analytics Service offers an all-encompassing cloud analytics tool, merging varied data for live, dynamic analysis. It safeguards data integrity via replication and virtualisation, underpinned by solid observability for system dependability. Augmented by automated processing and strict governance, our secure platform is scalable, cutting operational expenses and streamlining workflow.

  • Forcepoint Next Generation Firewall

    Gradian Systems Ltd

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Can be use to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • Proofpoint Essentials

    INTEGRITY360 LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

  • Security Container

    eCora

    The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.

  • SHARE

    MegaNexus Ltd

    SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.

  • Microsoft Entra Private Access  (PREVIEW)

    PHOENIX SOFTWARE LIMITED

    Microsoft Entra Private Access is a Zero Trust Network Access (ZTNA) solution designed to enhance security while boosting user productivity. It replaces traditional VPNs, reducing operational complexity and risk. Users can securely connect to private applications—whether on-premises or across any cloud—from any device and network.

  • Experian Data Management and Single Customer View with ExPin

    Experian

    An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.

  • Barracuda WAF-as-a-Service

    Central Networks and Technologies Ltd

    Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.

  • Laravel Development

    JBi Digital

    Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.

  • Netwrix PolicyPak

    SOFTCAT PLC

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • Powered by Neo: Fire Safety Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Fire Safety solution revolutionises fire safety management in housing sectors. Leveraging advanced analytics and real-time monitoring, our solution ensures proactive risk mitigation and compliance with fire safety regulations. With comprehensive reporting and task management features, we optimise safety protocols, enhancing overall resident safety.

  • Agile Quality Assurance and Testing in Agile Environments

    LEFKE IT LIMITED

    LefkeIT provides Agile Quality Assurance and Testing services tailored for Government Departments. Our expert testers seamlessly integrate testing into Agile workflows, ensuring high-quality deliverables. With adaptive approaches and continuous feedback, we drive efficiency and product excellence. Trust us for reliable Agile QA and Testing solutions in Agile environments.