Search results

570 results found in Cloud software in the category Secure content and threat management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
570 results found

VMware AirWatch - Part of Workspace ONE

Phoenix Software Ltd

VMware Workspace ONE (includes AirWatch)- a secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernises traditional IT operations for the mobile-cloud era.

Microsoft 365 E5

Bytes Software Services

Cloud Productivity & Security. Licensing suite for Office 365 Enterprise E5, Enterprise & Mobility Suite E5 and Windows 10 Enterprise E5 bsscloud

Virtual Data Room

Admincontrol AS

Virtual Data Rooms (VDRs) from Admincontrol are custom-designed to streamline and support due diligence processes. In the data room institutions can share confidential documentation and perform Q&A rounds in an intuitive and secure environment. A Virtual Data Room ensures rapid, transparent and secure information sharing.

CDW ProofPoint Essentials

CDW Limited

ProofPoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time.

Okta

Generation Digital

Okta Solutions provides the following modules: Single Sign-On frees people from password chains; Provisioning lets IT leaders and administrators automate user onboarding and offboarding; Universal Directory is an exible, cloud-based user store; Mobility Management puts user identities at the center; and Adaptive Multifactor Authentication allows customers to secure their applications.

Secure Application Server Service GC10-ASC-SAS1

Viewdeck Consulting Limited

Secure managed application hosting, providing management and delivery of an extensive range of native or 3rd party applications in a patched, secured, contained service. Supports a wide range of technologies under a fully configured DevOps environment with integrated Monitoring, Event Management, Monitoring etc.

Wandera Secure Mobile Gateway

Wandera

The Wandera Service provides customers with a Secure Mobile Gateway (SMG) which compresses mobile data, enforces acceptable usage policies, provides multi-level mobile threat detection by scanning on device and in the cloud, and provides data usage reporting to business organisations to help protect business data and avoid mobile bill shock

SharePoint Cloud Intranet - Fresh

Content and Code Ltd

Using years of experience in SharePoint and Microsoft Office 365 projects, Content and Code created Fresh SharePoint cloud intranet. Fresh offers a simplified communication and collaboration solution enabling organisations to cut through options, features and user requirements and rapidly deploy and leverage the SharePoint intranet platform and its core tools.

Digital Managed Operations

PA Consulting Services Limited (UK)

PA implements and provides cloud based solutions, from strategy, to design and sourcing, to implementation and managed services. Our comprehensive service includes first, second and third line support, application maintenance and defect resolution. We provide the technologies, tools and processes to significantly enhance the efficiency and quality of ICT services.

Mobile and Fixed Identity Verification - Secure Gateway VMIV GC10-IAS-MFS1

Viewdeck Consulting Limited

A Mobile and Fixed Identity Verification Secure Gateway Services, delivering a secure audited interoperability with the VMIV (Viewdeck Mobile Identity Verification) Law Enforcement, Border and Humanitarian Services and national infrastructure capabilities. Bilateral capability, both Transmission and Receiving in secure environments, cross-Agency interoperability, fully monitored/audited, combined load-balancing for resilient service integrity.

Big Red Button - Click

Quorum Cyber Limited

Traditional anti-malware products need to be installed on every corporate device. Maintaining and updating client based anti-malware software is a difficult task. Click provides a different approach, sitting at your gateway monitoring all outbound DNS requests and preventing users from interacting with malicious sites.

Symantec Cloud Access Security Broker - CASB

Symantec (UK) Ltd

Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly IaaS and PaaS. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

Data Access Governance

Symphonic Software

Symphonic provides access authorisation software driven by user-definable organisational policies. Our solution protects/enables access on the principles of Context awareness (for example, is citizen consent present) and fine granularity (for example protecting single data cells if necessary).

Bramble Hub - Mvine for Distributed Digital Identity Management

Bramble Hub Limited

Mvine for Distributed Digital Identity Management works alongside GOV.UK Verify ID assurance. Process more identity attributes with Citizen consent. Cloud software for Central and Local Government, and Devolved Administrations aligning their digital services to the Government Transformation Strategy. Available today for procurement from the Digital Marketplace under G-Cloud framework.

Managed Security Services

RE-SOLUTION DATA LTD

Re-solution provide comprehensive managed security solutions utilising Cisco’s CloudCenter platform. CloudCenter is an application-centric hybrid cloud management platform that securely provisions infrastructure resources and deploys applications to data centre, private cloud, and public cloud environments.

Identity and Access Management

Texuna

Identity Assurance IdP with Access Management Lifecycle supporting mission-critical enterprise authentication and authorization services. Secure access to local, cloud, mobile applications with centralized IAM policies. Integrate identity information across user journey lifecycle to control access centrally. Single Sign-On/Off and access governance for behavior tracking and attribute exchange between integrated systems.

PCS Managed AntiVirus / AntiMalware

PCS BUSINESS SYSTEMS

This fully managed antivirus solution maximises protection against hard to detect threats and both known & potential viruses.

Sophos Central Security Products

Levett Consultancy Ltd

Levett Consultancy provides the range of Sophos Central products, including; Sophos Central - Sophos XG Firewall & Wireless Products Sophos Endpoint, Encryption, Mobile 8, & Server. Sophos Phish Threat

McAfee Multi-Access from O2

Telefonica UK Limited

McAfee Multi Access from O2 is a security service that allows customers to protect all their devices, including smartphones, tablets and PCs. Provisioned and managed through a cloud-based portal with flat-monthly charges, the solution allows business administrators to deploy McAfee Total Protection, Mobile Security and TrueKey on a 5(+1)licence basis.

SharePoint Consultancy

Sundown Solutions Ltd

We provide full, onsite consultancy for any form of SharePoint work, and provide guidance and best practice on all areas of the platform, which can often include: training, custom development, identity management, security auditing, governance planning, data integration, search configuration, branding, migration support, user adoption planning, and more. .

Mobile Device Security / Enterprise Mobility Management / UEM (MobileIron)

Bridgeway Security Solutions

The MobileIron solution secures and manages devices, apps and data. A PSN-compliant, multi-platform mobile management solution offering mobile device security, mobile app management, remote access control and more, while maintaining the native experience. Hybrid or private cloud available. Bridgeway provides MobileIron EMM support and optionally, a fully managed service.

Exchange Online Plan 2

Gaia Technologies Plc

Email, contact management and calendaring with unlimited storage, anti-malware and spam filtering, data leakage protection (DLP), and legal hold. Access using Outlook client, tablet / phone apps and browsers. Interact with Shared & Group Mailboxes, Public Folders, OneDrive, Office, 3rd party apps. See https://products.office.com/en-gb/exchange/compare-microsoft-exchange-online-plans

Sandblast Mobile

Ultima Business Solutions Ltd

SandBlast Mobile (previously known as MTP or Capsule) provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats.

Projectfusion OFFICIAL

OD Consultancy Ltd

UK hosted with UK data residency, Projectfusion Official is trusted by the Home Office, many LA’s and Police forces. Secure collaboration and file storage for classified data, supporting File Sharing, Project, Program, Case and Task management with approvals and custom workflows. Secure portal and extranet includes a powerful IOS client.

Design & Build

ORM

We create digital products and services such as websites that play a vital role in delivering a superior customer experience. The platforms and applications we develop use the latest technical architectures, microservices, API integrations and development frameworks that take full advantage of cloud technologies and scalability.

Zscaler Web Security from O2

Telefonica UK Limited

Zscaler is a global cloud-based information security company that provides Internet security, web security, next generation firewalls, sandboxing, SSL inspection, antivirus, vulnerability management and granular control of user activity in cloud computing, mobile and Internet of things environments.

Exabeam Security Intelligence Platform

CYBANETIX LIMITED

Exabeam uses data science for behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection. Exabeam's User and Entity Behavior Analytics (UEBA) provide insider threat detection, tracking anomalous behavior and suspect movements within your organization, while also securing your cloud services, machines, devices, and IoT assets.

Enterprise File Fabric

Storage Made Easy

Storage Made Easy (SME) provide a File Fabric for complete data management. Data on-cloud or on-premises can be viewed and managed from a single screen. Data is audited, encrypted, searchable and can be securely shared. The solution is focused on productivity, security of data and GDPR compliancy.

Ideal Cloud Suite: Office 365 Productivity Platform

Ideal Networks Ltd

A comprehensive Office 365 Productivity Platform to ensure that all enterprises can benefit from best-of-breed Identity & Access Management, SaaS, Public Cloud and email security and point-in-time Backup and Disaster Recovery as a Service

Identity and Access Management Service (IdAMS)

Incremental Group

Incremental Group offers Identity and Access Management (IdAM) solutions, providing the Public Sector with expert advice on maintaining customer privacy and data security. Incremental Group orchestrates the identity provisioning and de-provisioning process for all identity types and understands the application of biometric recognition systems enabling speed, accuracy and user experience.

Web Proxy Server as a Service GC10-ASC-SLA

Viewdeck Consulting Limited

Secure managed Web Proxy service, delivering reverse proxy capabilities and separation for web applications. Provides load balancing, resilience, and HA in n-tier architecture. Security enforcing through separating Application Hosts from direct user connections. Supporting a range of security features providing a resilient platform, including optional security enhancing configuration.

Health & Care Online Account

Sitekit

Health & Care Online Account gives a citizen an assured online identity he or she can use to transact with health and care services. The citizen has the choice of using a GOV.UK Verify identity, or a social identity (e.g., Facebook, Google, Microsoft) suitably secured through a vouching process.

Akamai Enterprise Application Access

Akamai Technologies Ltd

Enterprise Application Access (EAA) is a new approach to remote access. It provides a unique, secure, and more convenient alternative to traditional remote-access technologies such as VPNs, RDP, and proxies. EAA ensures no one can get to applications directly because applications are hidden from the Internet and public exposure.

Insider Threat Services on Darktrace

HIVE LOGIC LIMITED

Insider threat services directly address the fact that most security breaches are at least assisted by insiders. The most significant security breaches will involve insider threats for example through password compromise. Insider Threat services guards against motivated malicious insiders and accidental negligence by employees to greatly reduce corporate data loss.

Extract, Transform and Load (ETL) Server as a Service (VETL) ​​GC10-SAS-ETL1

Viewdeck Consulting Limited

VETL Enterprise class Extract, Transform and Load Solution, supports Big Data integration. Suitable for one-off migrations or constant data transformation. Visual data manipulation to join sources and data together. Integration and migration services across wide range of sources SQL, Hadoop HDFS, HBase, Hive, Pig, Sqoop, Google BigQuery and NoSQL databases.

CDW Checkpoint Capsule Cloud

CDW Limited

Check Point Capsule Cloud uses a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.

SentinelOne Core & SentinelOne Complete from O2

Telefonica UK Limited

SentinelOne Endpoint Protection Platform unifies prevention, detection, and response in a single agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with fully automated, policy-driven response capabilities, and complete visibility with full-context, real-time forensics.

Cyber Intelligence Analysis Service

SecureCloud+ Limited

Cyber Intelligence Analysis Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET, (including NATO and MISSON) and TOP SECRET delivers threat intelligence operational support, to protect against high-profile intrusion, identity theft and data exploitation. Collaborative analysis of cyber alerts and advisories enables behavioural analysis of potential threat actors.

Cloudera Enterprise Data Hub

Cloudera Inc

Cloudera Enterprise software enables an Enterprise Data Hub – a scalable platform to store and analyse all your data. It includes CDH, the world’s most popular open source Hadoop-based platform, advanced system management and data management tools plus support and community advocacy from our Hadoop developers and experts.

Microsoft Cloud App Security

Think S3 (S3 Consulting Ltd)

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Imperva Incapsula

ULTRIS LIMITED

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Azure Information Protection P2

Insight

Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data. See http://www.microsoft.com/en-us/cloud-platform/azure-information-protection-features

Sophos

Complete IT Systems

Centralize Your Network Security with Sophos. Next-Gen Endpoint Security with Advanced Threat Prevention, Always-On Encryption, UTM Firewall Appliances, Mobile Management, Web and Email Gateway Appliances, Wireless Access Points, Server Virtualization and Network Scanning for Ransomware

CenturyLink Network Protection Service

CenturyLink Communications UK Limited

The service accompanies CenturyLink Internet Circuits for customers who require upstream rate limiting and filtering. The service cost-effectively mitigates risk of DDoS attacks by the application of Rate limiting, ACLs and Null routing. The service is provided with a 30 minute SLA guaranteed response time for volumetric DDoS attack.

Web Collaboration and Wiki Service (VWCW) GC10-VMP-WIK1

Viewdeck Consulting Limited

The Viewdeck Web Collaboration and Wiki Service VWCW, is a collaboration, Wiki, and enterprise project website ideal for intranets, extranets or cross organisational working. The power of the Wiki allows teams to share content across domains and locations in a flexible secure way.

Azure Active Directory P1

Akhter Computers PLC

A full suite of identity management capabilities including multi-factor authentication, device registration, self-service password management, self-service group management, privileged account management, role based access control, application usage monitoring, rich auditing and security monitoring and alerting

McAfee Web Gateway Cloud Service

Caretower Ltd.

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users.

Reliance acsn Two-Factor Cloud Authentication

Reliance acsn

Reliance acsn offer its Cloud Authentication Service, 'Authenticate', which delivers all the benefits of soft-token strong authentication, but cloud-hosted, so you don’t need to buy or maintain additional infrastructure. It acts as a key component in protecting user identity and securing access to a client’s protected systems and services.

CTG Secure Portal for Communications Data Disclosure

Computer Task Group (UK) Limited

CTG provide custom, secure Information Disclosure portals delivering workflow automation and self-service between public sector departments, law enforcement and the private sector. CTG cloud based solutions can be configured to support a wide range of disclosure workflows including RIPA, RDHI, DRD, FOI, DPA and other security sensitive regulations.

Zscaler Private Access Service

Truststream Security Solutions

Zscaler Private Access is a cloud-based service that delivers policy-based, secure access to private applications and assets without the cost, support burden, or security risks of a VPN. It delivers seamless, policy-driven, access to private internal applications and assets whether they are in the cloud, the data center, or both.

Nexus Managed Antivirus & Web Filtering

Nexus Open Systems Ltd

Nexus Managed Anti-Virus and Web Filtering Service gives your organisation the latest best in class Anti-Virus Endpoint Security without the headache. The service is built around a simple per device per month cost – there are no upfront or ongoing installation, upgrade, licencing or management fees. Updates and upgrades included.

Check Point CloudGuard for SaaS

Phoenix Software Ltd

CloudGuard SaaS is a cloud service that prevents attacks on enterprise SaaS applications, blocks cybercriminals from taking over employee accounts and provides data security for SaaS applications.The solution supports a multitude of enterprise SaaS application including Microsoft Office 365, Google G-Suite, BOX, Citrix ShareFile and more

SBL Freja ID: Identity & Secure Access Management

Software Box Limited (SBL)

Freja eID provides a strong identity solution to allow secure access to systems for customers and users. Multi Factor Authentication (MFA) and 2 Factor Authentication (2FA) improves user experience and removes fixed passwords. Enables compliance with GDPR and CoCo amongst other Cyber Security requirements. Supports Tokens and Soft Tokens.

Content Threat Removal Cloud Platform (Assured)

MDS Technologies Limited

The Content Threat Removal Cloud Service provides information exchange control when data is moved between security domains or across perimeter gateways. It protects a range of file transfer, Web browsing and machine-to-machine use cases. Service tailoring meets an organisation’s specific sharing needs, supporting user compliance and addresses organisational security risks.

Mobile Threat Defense

Pradeo Security Systems

Pradeo Security Mobile Threat Defense solution offers a complete, automatic and seamless mobile threat protection securing Apps, Network and Devices. The solution aligns with your organization security policies & preserves business agility. Pradeo MTD is integrated with major MDM's.

Office 365 Enterprise E5

New Signature UK Limited

E3 (Office apps and Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management) plus Phone System call management, PSTN-Conferencing, Business Intelligence, PowerBI-Pro, Delve Analytics, Personal-Org Analytics, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery.

Viewdeck Visualisation of Data Service Kibana® (VSVL) GC10-SAS-VSL1

Viewdeck Consulting Limited

VSVL is a Logstash® cloud service, that enables the ingestion of data from a multitude of sources simultaneously. Ability to ingest a variety of inputs to pull in large quantities from common sources.. VDIS supports transformation and the ability to visualise in services like Elasticsearch®.

Elasticsearch Service

Softcat Limited

Hosted/managed Elasticsearch & Kibana brought to you by the creators of the Elastic Stack to help you with logging, app search, site search, security analytics (SIEM), metrics, APM, and more. Elastic Cloud ships with X-Pack features including monitoring and security features like default encryption at rest and native authentication.

Web Proxy Server as a Service (VWPS) - PaaS GC10-PAS-SLA1

Viewdeck Consulting Limited

Secure managed Web Proxy service, delivering reverse proxy capabilities and separation for web applications. Provides load balancing, resilience, and HA in n-tier architecture. Security enforcing through separating Application Hosts from direct user connections. Supporting a range of security features providing a resilient platform, including optional security enhancing configuration.

Projectfusion STANDARD

OD Consultancy Ltd

EU hosted with EU data residency, Projectfusion Standard is trusted by many LA’s and Police forces. Secure collaboration and file storage supporting File Sharing, Project, Program, Case and Task management. Credit Card/GPC payment only.

Big Data Security Information & Event Monitoring (SIEM) Service

Moortec Solutions Ltd

Moortec’s SIEM Monitoring-as-a Service provides a powerful, scalable and secure platform for receiving, processing and analysing system and security events in real-time. Utilising Apache Metron and associated open source products, the service removes the complexity and burden of building a similar service offering on your own on-premise or cloud infrastructure.

Imperva Incapsula

Truststream Security Solutions

Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.

Lexis Diligence - Enhanced Due Diligence solution

LexisNexis

Lexis Diligence brings into one, simple online tool the intelligence to conduct global enhanced due diligence and comply with legislation for anti-money laundering (AML), anti-bribery & corruption (ABC). The solution enables checks on individual or company backgrounds (KYC), negative news, sanctions and politically exposed persons (PEPs) and company litigation history.

Anti Phishing Protection – Security Awareness and Training

Rivington Information Security

Rivington provides Anti Phishing and Security Awareness testing and training solutions. Our service offers knowledge assessment, simulated phishing attacks and interactive training which have been proven to help reduce successful phishing attacks and malware infections.

Civica Financials LIVE

Civica UK Limited

Cloud based, fully integrated finance system - Genera/ Nominal, Sundry Debtors, Purchase 2 Pay (digital automated invoice matching), Assets, Cash Management Ledgers and full reporting/dashboard visualisation. Can be extended to deliver full ERP functionality utilising other Civica Cloud products. Fully managed service including software & system administration via help desk.

Imperva SecureSphere Cloud DAM

ULTRIS LIMITED

SecureSphere Data Activity Monitoring and Database Firewall provides enterprise-class protection, audit analysis, automated processes and reports running natively on AWS and Azure. SecureSphere data protection solutions protect databases from attack, reduce risk and streamlines compliance by enabling organizations to leverage common infrastructure, both in AWS, Azure and on-prem.

CACI Impulse Education Management Information System

CACI UK Ltd

IMPULSE is a modular, web-based education system that allows greater efficiency by using a centralised, core pupil record. This innovation gives you a holistic view of a child's educational activity, and their family circumstance, through using advanced reporting functionality, portals, dashboards, and mobile access.

Secure Blockchain Service

SecureCloud+ Limited

Secure Blockchain Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET,MISSION SECRET,TOP SECRET provides a distributed ledger-based mechanism eradicating flaws in security typically introduced by human error or threats. The service reduces the risk of single points of failure, improves traceability providing a single source of truth.

Security Incident Detection & Response

C2 CYBER LTD

This is a cyber security service to help an organisation detect and respond to attacks. Our cloud platform collects relevant system data, has a set of threat use cases that analyse it, and then provides timely and understandable reports that describe the incident and provide guidance for the response.

CyberGator Cyber Monitoring Saas Service

Auriga Consulting Ltd

Security Event Monitoring can be costly. Auriga’s CyberGator bucks this trend and is a first to market of its type. CyberGator is a cost effective, subscription-based Cyber Security Monitoring SaaS service, that is agile, intuitive and real-time, offering much more than security monitoring alone. Security health and alerting are included

Payment Card Industry (PCI) Approved Vendor Scanning (ASV)

SureCloud Limited

The SureCloud PCI ASV scanning solution helps organisations meet PCI Requirements 11.2.2. SureCloud offer a simple, easy to use approach to schedule, run and track PCI ASV scans. All PCI ASV scanning activity is powered through the SureCloud Platform and backed by CESG CHECK and CREST Approved Penetration Testing team.

Data Loss Prevention Cloud Service Connector for Cloud Access Security Broker (CASB)

Gradian Systems Ltd

The Symantec Data Loss Prevention Cloud Service Connector is a Symantec Data Loss Prevention detection service deployed in the cloud that enables you to monitor content and identify information policy violations in cloud applications.

Security Awareness Training (ulearn) & Simulated Phishing (uPhish)

usecure

usecure provides Security Awareness training and simulated phishing as well as a GAP analyses tool. This incorporates an evaluate - educate - simulate approach in our user-focused Security stack.

Microsoft Secure Productive Enterprise E5

Insight

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E5, Enterprise Mobility + Security E5 and Windows 10 Enterprise E5. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

Ivanti Asset Manager

Ivanti UK Ltd

Ivanti IT Asset Management (ITAM) manages them throughout their lifespan. Discover, normalize, and reclaim your IT assets to avoid the financial risk of mismanaged hardware and software.Losing track of assets puts your organization at risk from non-compliance, software overspend, hardware downtime, or even security threats from theft or loss.

​​Secure Linux, Apache, MySQL and Php (LAMP) Application Service GC10-ASC-SLA1

Viewdeck Consulting Limited

Secure managed Web Software service, delivering a LAMP (Linux, Apache, MySQL, Php) application Service. Supports a wide range of web based applications (php, or perl based) in a patched, secured container service. Provides a range of security features providing a resilient platform, plus managed, monitored and backup services.

Website Security Testing

Borwell

This is a Cloud based security testing service. It allows us to test an organisation’s website for SQLi vulnerabilities, Cross Site Scripting (XSS) vulnerabilities and test for defacement. It is a fully automated scan.

Hospital Productivity Service

PA Consulting Services Limited (UK)

PA’s cloud hosted Hospital Productivity Service provides access to high quality performance and productivity information and benchmarking. Visualising data from clinician to organisation level, it creates actionable insights for improvement. Coaching from PA’s healthcare experts embeds evidence-based decision-making to enable faster and more effective productivity, performance, quality and financial improvement.

McAfee Web Protection

Bytes Software Services

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users. bsscloud

Office 365 SaaS

Ultima Business Solutions Ltd

Office, Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management plus Cloud-PBX call management, PSTN-Conferencing, Business Intelligence, PowerBI, Delve Analytics, Personal-Org Analytics, cybersecurity, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery.

Microsoft Cloud App Security

Gaia Technologies Plc

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

Check Point Capsule Cloud

Phoenix Software Ltd

Check Point Capsule Cloud solves security dilemmas by using a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network. It delivers the protection of Check Point Software Blades using a cloud-based service, leveraging real-time protection against threats with ThreatCloud.

TheOneView

EMIS Ltd

Easily access the information you need to plan, manage and report on all your governance, risk and compliance (GRC) requirements. Modules for Risk, Business Continuity Management, Audit, Business Impact Assessments, Checks, Document Management and others. Designed to drive business value whilst effectively managing all areas of GRC. Mobile apps available.

Simulated Phishing Awareness Platform

Digi2al Limited

Phishing is the most common cyber attack. Our phishing awareness platform creates user resilience and drives awareness by simulating and testing real phishing, (spearphishing and whaling). Including phishing user testing, training & education modules, with detailed reporting and metrics on phishing vulnerability. User cyber security behaviour training is GDPR compliant.

Cloud Security

HIVE LOGIC LIMITED

The cloud security service, or Cloud Access Security Broker (CASB), secures all monitored cloud usage, including hypercloud. It analyses the risks and enforces appropriate controls through a wealth of constantly updated controls. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need.

WordPress CMS

Pulsion Technology Limited

We specialise in responsive website design, using the WordPress Content Management System (CMS). We create WordPress websites with a mobile first design strategy, ensuring a quality and consistent user experience on all platforms and devices. Our WordPress CMS experts will ensure your website is cost-effective, highly scalable and easily maintained.

Continuous Delivery as a Service GC10-DOS-CDS1

Viewdeck Consulting Limited

Continuous Delivery as a Service provides a control over your software and infrastructure deployments, by automating integration across both infrastructure and application code. This gives your operations and development teams a common platform for developing, testing and deploying cookbooks, applications and more. Agility in the end to end capability.

DMARC Analyzer - Detect and prevent email phishing and spoofing

DMARC Analyzer

The main goal of DMARC is to detect and prevent email spoofing. Prevent brand abuse, scams and gain full insight on your email channel with DMARC Analyzer. 360° visibility and governance across all email channels.

End Point (Endpoint) security services on Check Point

HIVE LOGIC LIMITED

EndPoint (or End Point) protection is aimed at protecting all our devices all of the time even when we are mobile. Controlling access and encouraging safe usage. Applies to laptops, PCs, tablets, mobile phones (of all flavours). Management and Monitoring also available

Anti Virus

Green Cloud IT Ltd

Anti virus, internet security, anti spam, email security and adaptive defence.

Cloud Direct Microsoft 365 Business and Enterprise

On Direct Business Services Limited

Microsoft 365 includes Office 365, Windows 10, and Enterprise Mobility + Security, giving businesses everything to stay secure, engage employees, increase collaboration, simplified management and protection from complex threats. In two flavours, Business and Enterprise, we helped bring Business to market; one of two UK partners on the private preview.

IBM Security - Mobile Security MaaS360

IBM United Kingdom Ltd

Cognitive UEM is the future of mobile management and security. Managing endpoints plus their users and data is a time-consuming task with conventional mobile device management (MDM) and enterprise mobile management (EMM) solutions. Cognitive unified endpoint management (UEM) approach that consolidates the management of smartphones, tablets, laptops, desktops, wearables&IoT

Viewdeck Freedom of Information Service (VFOI) ​​GC10-SAS-VFI1

Viewdeck Consulting Limited

Viewdeck VFOI is a lifecycle request and case management management solution built on a secure cloud platform. It provides organisations with an electronic workplace, with all required workflow, document, records management, as well as integrated collaboration functions for comprehensive case management, email integration, and by mobile users on tablet devices.

Sophos Security Suite

Bechtle direct Ltd.

Broad Portfolio of solutions to address edge to endpoint security, with next generation intelligence

Mobile and Fixed Verification for Humanitarian Assistance ​​​​GC10-IAS-MFV1

Viewdeck Consulting Limited

Cloud-based Mobile and Fixed Identity Verification management for Humanitarian agencies, Suite of capability enabling officers to scan, capture and transmit, or validate and verify Travel Identity Documents, Passports, Visas, Permits, against Travellers and Citizens in a Mobile and hostile environment. Secure platform, suitable for deployment in sensitive and overseas environments.

Evolve EMR in the Cloud

Kainos Evolve Limited

Award-winning Evolve Medical Record platform supports Digital Maturity programmes through removal of paper from the care process. Secure, audited storage and management of patient documentation, promoting paperless working through digital workflows and electronic forms. Provided as a fully managed service, delivered securely in the cloud.

Check Point Capsule Cloud

Ultima Business Solutions Ltd

Employees expect to work whenever and wherever it’s convenient; however use of laptops and online behaviors put your network at risk. Check Point Capsule Cloud solves this security dilemma by using a cloud based security container to enforce your in-network security policy on laptops used outside of the corporate network.

Netwrix Auditor for Exchange (Compliance Tool)

Gaia Technologies Plc

Netwrix Auditor provides enterprise-wide visibility into on-premises and cloud-based systems and applications to help you establish proper information security controls and validate that those controls are aligned with the following specific provisions of the GDPR data privacy regulation: https://www.netwrix.com/GDPR_Compliance.html ------ For the latest service updates, please see: https://www.netwrix.com/exchange_server_auditing.html

ServiceNow

TeamUltra Limited

ServiceNow offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades

Viewdeck Fraud Identification Service (VFAS) GC10-SAS-VFA1

Viewdeck Consulting Limited

Fraud detection, identification and analysis techniques to visualise and mine your data. Rich multimedia, automatic data translation identifying relationships and building views of related items. Single View of data delivering unprecedented data discovery, automated process to combat fraudulent activity and criminal intent. Advanced machine learning, predictive analysis techniques identifying risks.