Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

3871 results found

3871 results found in Lot 2: Cloud software in the category Application security

  • Acronis Cyber Protect (Backup, Security, Management) - Per Device Model

    MISCO TECHNOLOGIES LIMITED

    Acronis Cyber Protect offers a revolutionary approach to cyber protection by integrating data protection with cybersecurity. This integrated method eliminates complexity challenges, delivers better protection against today’s threats, and maximizes efficiency by saving time and money. Features include Backup, Disaster Recovery, Security, Vulnerability & Patching, email security, data loss prevention

  • CheckPoint - CloudGuard Cloud Security Posture Management

    VE3 GLOBAL LTD

    VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.

  • Identity Verification Data Protection (GDPR) Service

    EQUINE REGISTER LIMITED

    Identity Verification Data Protection (GDPR) service verifies the identity of users for access to secure Equine Register Services. The service supports Data Protection/GDPR compliance enabling data subjects to exercise their rights under DPA/GDPR. The service is interoperable with our other services including the Digital Stable and Central Equine Database.

  • Netwrix Endpoint Protector

    BYTES SOFTWARE SERVICES LIMITED

    oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.  bssgc

  • Prisma Cloud

    LRQA

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • Street Lighting Asset Management Software

    AMX SOLUTIONS LIMITED

    AMX for Street Lighting Asset Management is designed for high-volume, incident-prone street lighting and electrical highway assets with intricate connectivity. The software supports inspection and maintenance programmes, incident management, KPI reporting and data import-export, enabling compliance with CSS, CIPFA, HAMFIG, TR22 and BSCP520. AMX Mobile supports remote and mobile working.

  • TryHackMe: AWS Cloud Security Training

    TryHackMe Ltd

    TryHackMe offers online Cloud Security training to businesses, government and educational organisations. With gamified modules available 24/7, users can expand their cybersecurity skills while enhancing their cloud security expertise. TryHackMe offers these training opportunities for people using a variety of real-world scenarios.

  • COOLSPIRiT a Databarracks Company: Arctic Wolf Managed Security Operations

    COOLSPIRIT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response

  • PROMIS (Performance Reporting Optimisation MIS) for Transition

    Gaiasoft International Limited

    AI supported transition for portfolio oversight, outcomes delivery, learning and impact: Performance management, M&E, Monintoring, Evaluation, Reporting, Learning (MERL). PROMIS coordinates Delivery Units. Large scale transition eg to Net Zero, Risk Management, Conflict-Prevention, Cyber-Security, NPPF, National Development, NHS Prevention Programme, Preventive Healthcare Transition, healthspan. Coalitions for Reform (C4R).

  • Icarus

    IDOX SOFTWARE LTD

    Icarus is a Real Time Passenger Information (RTPI) system that enables passenger information and fleet management. Users can view the real time location of all vehicles within the fleet and generate reports showing statistics on vehicle operation, timeliness and movements.

  • Portnox

    ITogether

    Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.

  • Salesforce Mobile App Development

    DEFENCE DATASEC LTD

    "Defence DataSec specializes in Salesforce Mobile App Development, tailored for government departments. Our expert developers create secure, user-friendly mobile apps to enhance government operations, citizen engagement, and data accessibility. We ensure seamless integration with Salesforce, enabling efficient on-the-go functionality for government entities and their constituents. "

  • Conversation API

    BOOMERANG I-COMMS LTD

    Boomerang’s RESTful API ensures a secure, functional, high-performance messaging experience. With substantial throughput and redundancy, it meets enterprise needs for instant global messaging. Boomerang's built-in intelligence ensures accurate message matching, empowering developers to create automated conversational workflows seamlessly. ISO 27001, Cyber Essentials, and Cyber Essentials Plus Accredited.

  • Arcus Development Monitoring

    ARCUS GLOBAL LIMITED

    Arcus Development Monitoring aids Local Authorities to manage activities within the Planning Service in regards to the monitoring of housing, open space and commercial developments. It provides access to information allowing officers and citizens to make decisions based on up to date information.

  • Software Licensing

    DBAAS LTD

    We specialize in cloud software licensing solutions, ensuring compliance and cost optimization. Our skilled team assists in selecting ideal licensing models, managing licenses across various cloud platforms, and maximizing software value.

  • Broadcom/Symantec Email Security Service (ESS)

    GRADIAN SYSTEMS LTD

    Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data.

  • Enterprise Password Management - in partnership with Bitwarden

    Qnetix Ltd

    A majority of hacking-related breaches succeed through stolen or weak passwords. Empower employees to generate strong, unique passwords and share them securely whilst keeping all business passwords and other sensitive information in an end-to-end encrypted vault.

  • Infonova Digital Business Platform

    BEARINGPOINT LIMITED

    Cloud-Native Infonova Digital Business Platform (DBP) hosted on AWS and utilizing AWS (serverless) technologies. Infonova DBP enables customers for an ecosystem play; allows to experiment, innovate & test with quick turnaround cycles; brings a marketplace new digital services; is build and provides new technologies and new and innovate business models

  • OKTA

    INTEGRITY360 LIMITED

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • CDW Proofpoint P0 Bundle

    CDW LIMITED

    Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.

  • Madigan Solutions Partner Identity

    Madigan Solutions

    Madigan Solutions User Management Tool (UMT) is a SaaS delivered platform for administering the lifecycle of users not currently managed within an HR system. The platform can provide business logic and lifecycle processes to non-employee user types such as Contractors; Consultants; Suppliers/Vendors; Guests; Purchasers; Robots; Tenants; and Custom-Defined User Types.

  • Mimecast Cyber Resilence Pro Plan

    QUADRIS LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Moving Traffic by Unity5

    UNITY FIVE LIMITED

    Moving Traffic by Unity5 revolutionises traffic enforcement management. With seamless integration, tech agnosticism, and cloud-native architecture, it offers unmatched efficiency and adaptability. From school streets to urban areas, customers gain real-time insights and proactive enforcement capabilities.

  • LexisNexis® ThreatMetrix

    LEXISNEXIS RISK SOLUTIONS UK LIMITED

    ThreatMetrix provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.

  • Sypro Risk Manager

    SYPRO MANAGEMENT LIMITED

    Sypro RM - Sypro Risk Manager - a solution for identifying and ensuring an organisations' assets/documents and procedures are compliant, managing statutory compliance (inc. asbestos & legionella) and assessing and mitigating risk (assessing likelihood .v. impact) - links to Sypro Contract Manager-Sypro CM, NEC, NEC3, NEC4 contract management, social value

  • Animal Welfare Service (Livestock, Equine and Companion Animals)

    EQUINE REGISTER LIMITED

    Enables law enforcement, local authority, welfare organisation and biosecurity representatives to manage and report animal welfare incidents in real-time. Check animal registrations from various sources (microchip, UELN, passport) and update the National Animal Registration, Central Equine and Central Canine and Feline Databases. Supports 3rd party interoperability with integrated front ends.

  • Computacenter - CrowdStrike Falcon Data Protection

    COMPUTACENTER (UK) LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • MTI Firewall Managed Service

    MTI TECHNOLOGY LIMITED

    MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times. The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.

  • Tenable One (Standard and Enterprise)

    KHIPU NETWORKS LIMITED

    Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. Enterprise option include tools for breach & attack mitigation and insight into the external attack surface. Includes other Tenable point products.

  • Requirement Traceability Matrix (RTM) Creation

    LEFKE IT LIMITED

    LefkeIT excels in Requirement Traceability Matrix (RTM) Creation, ensuring alignment between stakeholders, development, and testing teams. Through meticulous documentation and tracking, we facilitate traceability, verification, and validation of requirements throughout the project lifecycle, ensuring transparency and accountability in project delivery.