Search results

809 results found

809 results found in Cloud software in the category Remote access

  • Microsoft Azure Cloud Services

    Cloud Cover IT Limited

    Microsoft Azure is an ever-expanding set of cloud services to help your organisation overcome business challenges. It offers the freedom to build, manage and deploy applications on a massive, global network using your favourite tools/frameworks. We provide advice, guidance, supply, delivery and transition services for adopting Microsoft Azure Cloud Technologies.

  • Argonaut - Traffic Signal Control

    Idox Software Limited

    Traffic signal control providing fixed time, adaptive control, traffic signal prioirty and remote monitoring fo traffic signals. Compatible to all UK standards, the solution is entirely modular in design ensuring that all signals and algorythms are supported using the underlying architecture.

  • Microsoft Office 365 E5

    BIST Group

    Office 365 E5 - includes all the features of Office E3 plus higher advanced features, such as Teams/Skype Business Dial-in Conferencing and Meeting Broadcast, Power BI Pro, Delve Analytics, and advanced security and compliance features, such as Advanced eDiscovery, Advanced Security Management, Advanced Threat Protection, and Customer Lockbox.

  • ExtraHop Reveal (x) - Cloud Native Network Detection and Response

    CyberWhite Limited

    Reveal(x) providies unparalleled Visibility, Anomaly & Threat Detection and Response. It is compatible with major cloud providers plus on-premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats and anomalous behaviours, provides 360-degree visibility of network traffic, fast investigation workflows and response automation.

  • Paradox Edge Hosted Management Service

    Becrypt Ltd

    Paradox is a secure Cloud Access desktop platform, developed with and widely deployed across UK Government for securely accessing Cloud based services. Paradox provides an intuitive hosted end user platform for accessing Public or Private Cloud resources, supporting identity management and segregation between infrastructure management and business service delivery.

  • Mobile Secure Communications Platform

    MEDICARE NETWORK LIMITED

    Our integrated (Al-powered) Secure Communications solution with Closed-User Group functionality enables you to fully secure and manage your complete enterprise communications stack, from PABX to Mobile calls, Email, Instant Messaging, Video calls and File sharing, whilst giving accurate voice to text transcription and indexing, simplifying, reducing effort, time and cost.

  • CyberArk CorePAS

    Blue Cube Security Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Idaptive B2C App Access copy

    Avari Solutions

    Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

  • Automated Communications & Payments

    illion Digital Tech Solutions Ltd

    We build fully managed automated communication solutions for business to consumer organisations to improve customer engagement and lower cost to serve. illion digital tech solutions utilises SMS, email, Web, Interactive Voice Messaging, Interactive Voice Response & payment gateway technologies as alternatives to call centre agents and letters.

  • Environmental and Flood Risk Asset Management Software

    AMX Solutions Ltd

    Fully customisable Asset Management eXpert software for LLFA's, Flood Risk and Natural Environment management teams. Comprehensive FCERM inventory collection, recording inspections, planning maintenance and detailed reporting on all flood risk assets. Consistent with Environment Agency and Natural Resources Wales Datasets. Manage Drainage,SUDS, Instruments, Defences, Structures, Civils, Land and more.

  • Secure Identity and Access Management Service

    Viewdeck Consulting Limited

    Secure Identity Management Service for Web, Desktop, Mobile applications, providing federated secure OAUTH2, OpenID and SAML based services to applications. Options to support High Availability, Mobile and many patterns. Private service for secure workloads. Provides standard token based, stateless session authentication.

  • EVOLVE Spend Management

    Elcom Systems Ltd

    EVOLVE Spend Management, seamlessly integrated Source to Pay process including MultiQuote, eSourcing, Tracker, Tail Spend, eAuction, Contract Management, Catalogues, Inventory Management (inc. Scan4Safety), Community Stores, PPE Central Store, Purchase to Pay (P2P), Analytics, Electronic Trading (PEPPOL access point), Supplier Financing and eMarketplaces. Integration with legacy, supply chain and external systems.

  • Citrix Content Collaboration (ShareFile)

    Howell Technology Group Limited

    Citrix Content Collaboration is an enterprise file sync and sharing service, satisfying both data security and user needs. Businesses can build a custom-branded and confidential virtual workspace in which users can access, sync and edit content anytime, anywhere and across all devices, with an audit trail.

  • Microsoft Dynamics 365 Business Central (on-premise) Licenses

    Total Enterprise Solutions

    Microsoft Dynamics 365 Business Central is a market leading ERP solution that allows you to improve efficiency and streamline your business processes. Providing a centralised integrated platform from which to run your entire organisation on. We provide the associated licenses and license management service to ensure complete compliance.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bsscloud

  • Jet Reports for Microsoft Dynamics 365 Business Central Licences

    Total Enterprise Solutions

    JetReports offers flexibility in the way reports and data are configured and consumed. Create bespoke reports, exactly how you require, without compromising data with copy and paste.

  • Microsoft SharePoint Electronic Document and Records Management (EDRM)

    TECHNOLOGY SERVICES GROUP

    TSG have successful experience delivering EDRM projects using Microsoft SharePoint. Electronic document and records management solutions are designed to store documents & records using associated metadata, which is then categorised within a classification scheme and enabled for search optimisation for all users to retrieve records. Linked to HMS systems,

  • ExtraHop Reveal(x) – Cloud Native Network Detection and Response

    Cisilion Limited

    Reveal(x) is a market leading Cloud Cyber Security Platform, providing unparalleled Visibility, Anomaly & Threat Detection and Response. Compatible with all major cloud providers, including AWS, MS Azure and Google Cloud Platform as well, on premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats.

  • NXG Forensics

    FISCAL Technologies Ltd.

    NXG Forensics is a P2P risk management platform providing a continuous and preventative approach, combating supplier fraud, compliance issues, duplicate payments and invoicing errors. NXG uses forensics and artificial intelligence (AI) to identify exceptions and their root cause, driving process improvement, reducing risk, and protecting working capital and business reputation.

  • Argonaut - Alerts

    Idox Software Limited

    For Subscribed Users - travel alerts allow these users to be automatically notified when a change in the user’s defined route occurs. Users may then register for SMS and email alerts and may define the time periods for when they would like to be alerted.

  • SVGC Military Partners Cloud Software

    SVGC Limited

    SVGC Military Partners Platform is a cloud-based platform hosting a range of services and applications that support the assessment of foreign capabilities. Users can build, access and share services and applications quickly and easily to enhance capability management decisions.

  • Public and Hybrid Cloud Services

    Altiatech Ltd

    Altiatech’s Cloud Services supports your digital transformation, delivering a comprehensive solution to deploy, host and support your cloud environments with a mix of public or hybrid cloud solutions. Designed to maximise your cloud adoption quickly and securely, our services include Microsoft Azure, Amazon Web Services and Google Cloud Platform.

  • Microsoft Office 365 E3

    BIST Group

    Provides enterprise-class hosted email and access to both online and offline office apps (Word, Excel, OneNote and PowerPoint) and advanced document management functionality: Archiving, Right management and data loss prevention. The availability of offline apps will allow use to multiple user devices and full access to collorative tools

  • Computacenter - VMware Workspace One

    Computacenter (UK) Ltd

    Computacenter provides VMware Workspace ONE - a secure enterprise platform delivering and managing any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

  • Microsoft Defender Advanced Threat Protection (ATP)

    Bechtle direct Ltd.

    Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Microsoft Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture.

  • Check Point SandBlast Mobile

    SEP2 LIMITED

    SandBlast Mobile provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats against both mobile devices and data upon these devices before any damage can be caused.

  • Netskope - Secure Web Gateway and Cloud Access Security Broker

    Somerford Associates Limited

    Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.

  • Olympus MedPresence - Virtual Clinical Video Collaboration

    KEYMED (MEDICAL & INDUSTRIAL EQUIPMENT) LIMITED

    MedPresence, a secure virtual cloud video collaboration solution which integrates with any clinical video source (eg endoscopy camera) enabling instant access to a procedure room from anywhere in the world - participants can interact and communicate, just as if they were in the room together, leading to increased clinical efficiency.

  • Secure Remote Desktop as a Service (Raspberry Pi)

    Visionist

    Developed in response to COVID-19 Coronavirus, our secure zero trust desktop device enables departments to securely connect to corporate cloud services without VPN infrastructure. Delivered as a Kiosk device, configured to connect to Google Docs, Classroom, Office365. A low cost solution to support remote operations

  • GeDaP KeyTalk Certificate and Key Management System

    TeamLogic Systems Ltd

    KeyTalk’s crypto Certificate and Key Management System (CKMS) automates the management, distribution and installation of certificates (PKI) from multiple public and internal CA’s to any endpoint device running on any OS. The patented software automates short-lived (1-sec) certificate distribution Build-in hardware recognition of endpoint devices provides optional extra authentication factor.