Search results

2047 results found

2047 results found in Cloud software in the category Security

  • Bilingual open source content management system - CMS for Welsh / English digital service or website

    S8080 Limited

    Open source, cloud-hosted CMS for Welsh/English bilingual digital services and websites. S8080’s GDPR compliant open source CMS platforms securely handle CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around your bilingual user’s needs.

  • Automation Anywhere A2019 (Solution Provider)

    Procensol

    Procensol helps to modernise and automate business processes. Providing tangible business outcomes underpinned by proven low-code technologies, our Intelligent Automation solutions orchestrate a more efficient use of resources. People, technology, data, and digital workers, working in harmony, achieving more with less. Procensol has the expertise to accelerate your digital transformation.

  • Ascema Sensitive Data Discovery and Extraction, Data Loss Prevention and Automated Classification

    Brookcourt Solutions

    The Ascema platfom supports two solutions: Ascema Sensitive Data Discovery and Extraction; Ascema Data Loss Prevention and Automated Classification. Ascema locates, protects, extracts, classifies and remediates sensitive information across enterprise applications, including O365, GSuite, Atlassian (Confluence) and Alfresco, PCs/laptops (windows/Mac/Linux), cloud applications, servers and S3 buckets in real time.

  • Civica Software Asset Management (SAM Managed Service)

    Civica UK Limited

    Civica’s award winning SAM Managed Service provides hosted Snow Licence Manager portal, delivered from Civica’s own UK-based ISO27001 accredited data centres. Customers benefit from high levels of security, quality and integrity. We provide the platform and infrastructure to support your SAM program, so that you don't have to.

  • Stratiam Network Services for Cloud

    Intergence Systems Limited

    Intergence offers Stratiam; a multi-source data visualisation tool for end-to-end IT services that include Cloud Hosting, Applications, Wide-Area and Local-Area Network delivery and end user experience. Stratiam delivers unique insight into cloud and IT service end-to-end visualisation to IT help desk support teams, IT consultants and CIOs.

  • Mimecast Secure Email Gateway - S2

    Bytes Software Services

    Same features as S1 , but with the addition of comprehensive protection for Internal and outbound mails and attachments (including URL scanning, multi-layered attachment checks and DLP), plus removal of malicious or undesirable mail. bsscloud

  • Unauthorised Encampments Case Management System

    Empowering Communities

    Our Unauthorised Encampments Case Management System gives power to the practitioner to securely share information individually, locally, cross border or nationally. It can be used as a stand alone case management system or a multi-agency sharing or search tool to complement legacy systems.

  • Falcon X Threat Intelligence Solution

    Softcat Limited

    CrowdStrike FALCON X provides actionable threat intelligence capability using a holistic approach so entire organizations may understand adversaries, motivation, tradecraft, tooling, with analytical features to be used by security and intelligence teams. Features include indicators of compromise, adversary profiles, intelligence reports, sandboxes, malware searching, and more.

  • CybSafe

    Pentesec Ltd

    CybSafe is a British cyber security technology company. Their AI-driven security awareness training platform uses GCHQ accredited content, advanced analytics, psychology and behavioural science to measure, understand and report on cyber security culture, increase employee engagement and demonstrably reduce human-cyber and data protection risk.

  • Microsoft Enterprise Mobility + Security

    European Electronique

    European Electronique is a specialist provider of Microsoft's Enterprise Mobility and Security (EMS) solutions. We can provide a range of services to take advantage of the benefits mobility brings. EMS offers a suite of integrated solutions which manage user identity, application delivery and data security across cloud and local infrastructures.

  • SaaS Cloud Monitoring with Elasticsearch, Logstash & Kibana (ELK)

    Logit.io

    Logit provides a fully managed realtime cloud log monitoring SaaS platform built on Elasticsearch, Logstash and Kibana (ELK) which is auto scalable, secure and compliant. Use the Logit platform for container monitoring, cloud observability, logging, metrics, APM, SIEM and much more. All services are ISO27001 certified.

  • CDW Mimecast Secure Email Gateway - M3R

    CDW Limited

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Pathways Case Management System (CMS)

    i2N Ltd

    Pathways CMS case management system has bolt-on modules for youth and adult justice. Functionality: record creation, intelligent search, user defined workflow, document management, appointment scheduling, case notes, diary management, dashboards, custom fields. Underneath its specialist justice capability is a core case management system, easily adapted for any sector.

  • Microsoft 365 E5 Security

    Softcat Limited

    This new package includes advanced threat protection services including Microsoft Threat Protection (Azure Advanced Threat Protection (ATP), Windows Defender ATP, and Office 365 ATP including Threat Intelligence), as well as Microsoft Cloud App Security and Azure Active Directory. #SoftcatCloud

  • Exchange Online Plan 2

    Phoenix Software Ltd

    Exchange Online Plan 2 provides email, contact management and calendaring with unlimited storage, anti-malware and spam filtering, data leakage protection (DLP), and legal hold. Access using Outlook client, tablet / phone apps and browsers. Interact with Shared & Group Mailboxes, Public Folders, OneDrive, Office, 3rd party apps.

  • The Splunk Platform

    NETbuilder Ltd

    Splunk monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, artificial intelligence, packaged applications and open APIs, alongside Phantom for security operations, VictorOps (DevOps) for incident management and SignalFX for application performance monitoring.

  • Managed File Transfer

    WIZUDA

    The Wizuda MFT solution provides a centralised hub through which data transfers are automated and managed securely and compliantly giving full end-to-end accountability. From real-time streaming to scheduled transfers, Wizuda MFT ensures your data gets to where it needs to be, when it needs to be, and within SLA timeframes.

  • Forcepoint Advanced Malware Detection (AMD)

    CHESS ICT LIMITED

    Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.

  • Arcus Building Control

    Arcus Global Limited

    Arcus Building Control is built in partnership with Building Control teams across the UK using the Salesforce platform. The solution provides for both application processing and for the wider needs of the service, including performance management and, uniquely, marketing of the service, supporting both client retention and increasing market share.

  • Vulnerability Management

    SureCloud Limited

    With ever increasing levels of cyber crime, it is critical that organisations identify and remedy the high severity vulnerabilities which are exposing critical IT assets to threats. SureCloud provides full vulnerability life cycle management, including identification, correlation, assessment, remediation and reporting.

  • Thycotic Secret Server Cloud Privilege Access Management

    ProofID Ltd

    Thycotic Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, out of the box reports to demonstrate compliance.

  • Arcus Food Hygiene

    Arcus Global Limited

    Arcus Food Hygiene is for local authority Food Hygiene Officers, a cloud based, mobile-by-default, all-in-one solution. Workflow built into the software alerts officers of upcoming, urgent and overdue tasks to enable them to easily manage their caseload and respond appropriately to urgent requests.

  • Cryptography-as-a-Service (CaaS)

    Entrust Datacard (Europe) Limited

    Protect your data, systems or eIDAS compliant signing keys e.g. for remote signatures using Managed PKI with TrustedX, using certified high performance HSMs. Avoid employing crypto experts, buying expensive hardware or unused capacity. Hosted and expertly managed in the UK with you retaining complete control over your keys.

  • SMS: NHS Serve SMS Platform

    Mobisoft Corporation Ltd.

    An SMS solution to replace NHSmail. NHS Serv integrates seamlessly with existing appointment handling software via API. NHS Serv is fast becoming the solution of choice for many Hospitals, NHS Trusts and local Surgeries. NHS Serv includes technologies taken directly from our PROTECT platform, trusted by many governments globally.

  • ICT Relocation - Data Centre

    Network 2 Supplies Ltd

    Relocating Cloud IT can be complicated. We will audit the physical hardware and provide a comprehensive inventory. We will provide assurance that all items are transported following being safely packed, in one of our fleet of tracked vehicles.

  • LogPoint CORE SIEM

    CHESS ICT LIMITED

    LogPoint's modern Security Incident and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure and enables enterprise security professionals to view activities within their environment.

  • ExtraHop Reveal(x) – Cloud Native Network Detection and Response

    Cisilion Limited

    Reveal(x) is a market leading Cloud Cyber Security Platform, providing unparalleled Visibility, Anomaly & Threat Detection and Response. Compatible with all major cloud providers, including AWS, MS Azure and Google Cloud Platform as well, on premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats.

  • Online Conferences

    NTT Cloud Communications UK Ltd

    Bring established conferences to an online audience or go for an entirely virtual option extending the reach of your event. NTT CC’s virtual events combine keynote presentations with multi-track breakout sessions to bring the conference environment to the desktop, Live assistance available for participants and onsite support for organisers.

  • Auth0 Identity Platform

    Auth0 Ltd.

    Auth0 Identity Platform is a cloud-based identity management service that helps organizations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.

  • SentinelOne Autonomous AI Endpoint Security Platform

    CYBANETIX LIMITED

    SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.