Search results

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
1427 results found

1427 results found in Cloud software in the category Security

  • DevOps Infrastructure Automation and Continuous Delivery Server

    Viewdeck Consulting Limited

    Infrastructure and Application Automation for Cloud and on-Prem provides DevOps, Configuration Management, Quality Assurance, and repeatable delivery of Windows and Linux based solutions. Delivering ‘Infrastructure as Code’, enables rapid repeatable deployment of new services. Using standard Cookbook and recipes, simplifies deployment of virtualised environments.

  • Workspace ONE

    VMware UK Limited

    VMware Workspace ONE is the secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

  • Concepta Security Services

    NVT Group

    Concepta Security Services are a suite of cyber-security solutions which, when applied synchronously, provides peace of mind regarding the IT infrastructure's security status. Concepta Security Services monitors key systems and provides real time actionable alerts. It is available in three variations; Essentials, Advanced or Complete dependant on the prevailing requirements.

  • Microsoft Secure Productive Enterprise E3

    Bechtle direct Ltd.

    Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3 and Windows 10 Enterprise E3. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

  • SD WAN

    Nokia UK Ltd

    Create a single, cohesive cloud environment using Nuage Networks Virtualized Network Services (VNS) to automate branch site connectivity and help buyers and enterprises reduce operational overhead and launch new services faster. This integration helps you maximise the efficiency and effectiveness of your IT operations across multiple sites and technologies.

  • Environmental Crime Case Management System

    Empowering Communities

    Our Environmental Crime Case Management System gives power to the practitioner to securely share information individually, locally, cross border or nationally. It can be used as a stand alone case management system or a multi-agency sharing or search tool to complement legacy systems.

  • Automated Mobile Application Security Testing

    Kryptowire

    Kryptowire analyzes Android and iOS mobile applications for compliance with internationally-recognized security and privacy standards such as the National Information Assurance Partnership (NIAP) Protection Profile for Application Software and the General Data Protection Regulation ( GDPR).

  • Nexus Managed Email Security Services

    Nexus Open Systems Ltd

    Nexus partner with the best of breed in Cloud Security to deliver a fully Managed Email Security Service. This gives you a critical defence to protect against advanced threats and data loss. With our comprehensive enterprise-grade email protection, you and your organisation can breathe easier.

  • Office 365 Exchange Advanced Threat Protection Plan 1

    Phoenix Software Ltd

    Protect your email in real time against unknown and sophisticated attacks, through automatic analysis and detonation of suspicious content and unsafe URL links, when included in emails. Gain insights in to who is being targeted and the category of attacks, including blocked message investigations and URL trace capabilities.

  • Night Time Economy Case Management System

    Empowering Communities

    Our Night Time Economy Case Management System gives power to the practitioner to securely share information individually, locally, cross border or nationally. It can be used as a stand alone case management system or a multi-agency sharing or search tool to complement legacy systems.

  • SIRCS-Farm Watch Management System

    Empowering Communities

    SIRCS - Farm Watch Management System is a secure, encrypted online database which enables the fast and easy logging, identification and reporting of information, better communication between partners and the quick and easy storage, recording and sharing of data, reports and images to assist in evidence building.

  • Umbraco CMS - content management system - ISO 27001 certified - private cloud

    S8080 Limited

    Umbraco private cloud hosted CMS for websites and digital services, ISO27001 certified. S8080's GDPR compliant Umbraco CMS platform securely handles multilingualism, CRM, integrations, single sign-on, forms and workflow. Umbraco content management system is open-source, easy to use, yet powerful. Umbraco CMS is mobile optimised, accessible and designed to user’s needs.

  • Organised Crime Groups Case Management System

    Empowering Communities

    Our Organised Crime Groups Case Management System gives power to the practitioner to securely share information individually, locally, cross border or nationally. It can be used as a stand alone case management system or a multi-agency sharing or search tool to complement legacy systems.

  • Symantec Data Loss Prevention Cloud Service Connector for Web Site Security Service

    Bytes Software Services

    The Symantec Data Loss Prevention Cloud Service Connector is a Symantec Data Loss Prevention detection service deployed in the cloud that enables you to monitor content and identify information policy violations in web traffic. bsscloud

  • Victim Services Case Management System

    Empowering Communities

    Our Victim Services Case Management System gives power to the practitioner to securely share information individually, locally, cross border or nationally. It can be used as a stand alone case management system or a multi-agency sharing or search tool to complement legacy systems.

  • Paradox Edge Hosted Management Service

    Becrypt Ltd

    Paradox is a secure Cloud Access desktop platform, developed with and widely deployed across UK Government for securely accessing Cloud based services. Paradox provides an intuitive hosted end user platform for accessing Public or Private Cloud resources, supporting identity management and segregation between infrastructure management and business service delivery.

  • Microsoft Cloud Services Consulting

    ClearPeople Ltd

    Utilising years of experience in Microsoft Azure, Office 365, SharePoint 2007, SharePoint Online, SharePoint 2010, SharePoint 2013, SharePoint 2016 and Sitecore projects, ClearPeople deliver Cloud Planning and Assessment services to rapidly deploy and leverage digital solutions driving productivity, improving efficiency and sharing knowledge.

  • iManage Work Productivity Cloud

    iManage EMEA Limited

    iManage is the industry’s leading work product management application, empowering professionals to create, manage, collaborate on, govern and secure, all work product from anywhere on any device in a single user experience, turning lost time into productive time.

  • OKTA

    RemiTech Limited

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, mobile device management and provisioning capabilities for cloud based applications.

  • Barrier Networks Simulated Cofense Phishing Service

    Barrier Networks

    Employee Conditioning for Resiliency Against Phishing. Our Phishing Simulation campaign will educate your users, helping to create another strong defensive control in your security posture. Furthermore, it is designed to change risky behaviour and enable employees to recognize and report malicious phishing email.

  • Version Recon copy copy copy

    Pen Test Partners LLP

    Version Recon is an easy-to-use patch update alerting service, that emails you updates as they are released. Because it is not a patch manager it doesn't deploy patches for you, and doesnt require access or permissions to your systems or services. It supports all software and firmware!

  • Symantec Email Security.cloud

    Symantec (UK) Ltd

    Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data.

  • Okta API Access Management

    Avari Solutions

    Your custom apps are increasingly modern with an API backend. Secure enterprise data and enable developers to focus on the user experience. Control access for any type of user or service in one place. Create, maintain and audit API access policies.

  • Community Stakeholder Management System

    Empowering Communities

    The Community Stakeholder Management Solution is a secure Multi Channel Solution to help teams to efficiently develop, maintain and communicate with stakeholders from one secure place. Practitioners can quickly search and find individuals they need and the public can access a public-facing registration form that automatically populates a searchable database.

  • Phishing As A Service

    CyberWhite Limited

    The service starts with an initial, automated employee assessment to benchmark individual users phishing recognition skills. Each user is then automatically graded, and based on performance levels, a training campaign comprised of short, staged, real-world phishing attacks is tailored to help improve the employees’ awareness of malicious email messages.

  • Video Scene and IoT analytics

    Nokia UK Ltd

    The IMPACT Scene Analytics solution augments Operation Centre’s capabilities by turning surveillance cameras into intelligent IoT sensors. Abstract information vectors are derived from each video feed, including motion, direction, velocity, and density for real-time anomaly detection. Patented machine learning developed by Nokia Bell Labs leverages pattern recognition and behavioural knowledge.

  • Symantec Managed Endpoint Detection and Response

    Symantec (UK) Ltd

    Adversaries are using sophisticated and pervasive TTPs to exploit vulnerabilities within organisations. Symantec MEDR combines market-leading Symantec EDR, big data analytics, Symantec's Global Intelligence Network, and teams of highly trained Symantec SOC analysts to actively hunt, investigate, and remediate threats so you don’t have to.

  • Mobile Threat Defence (MTD) - App Vetting Service

    Nine23

    Provides real time mobile threat detection on phones, tablets and other mobile devices, as well as the networks they are on, and analyses apps for malicious activity pre-release and during use. Multiplatform protection and analysis tool for unified endpoint management. UK partner for zimperium - zIPS zIAP zSCAN

  • Symantec Email Security.cloud (ESS)

    Bytes Software Services

    Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data. bsscloud

  • Phoenix-Complaints/FOI/Subject Access Requests System

    Empowering Communities

    Phoenix-Complaints/FOI/Subject Access Requests System is a secure, private cloud based solution for the management of complaints, Freedom of Information and Subject Access Requests.