Search results

15 results found

15 results found containing AWS in Cloud software in the category Mobile device management

  • AWS Marketplace - CPPO (Private Offer) - F5

    FullProxy Ltd

    FullProxy can provide CPPO (Private Offers) for F5 products/services which are already available on AWS Marketplace. These offers can give customers access to discounted prices on the list prices for these services. FullProxy can ensure maximum ROI by additionally providing consultancy to design, configure and maintain these new customer services.

  • Data Warehouse Migrations (AWS Redshift, GCP Bigquery, Azure, Snowflake)


    Migrating your data warehouse can be daunting. Our experts have the experience to help you achieve a successful migration whether it’s from Teradata, Netezza, Oracle or other popular data warehouses to flexible, scalable cloud options such as AWS Redshift, Microsoft SQL Data Warehouse, Google BigQuery or Snowflake.

  • Enterprise Data Platforms (Data Lake on AWS, GCP, Azure Platforms)


    Allow our team to turn your data into business value. Our cloud-native analytics infrastructure is capable of cost-effectively ingesting, integrating, managing, and transforming any type of data. We’ll get your Enterprise Data Platform right the first time, on time through proven methodologies and reference architectures, automation and templates.

  • Check Point Dome 9

    Caretower Ltd.

    CloudGuard Dome9 is a comprehensive software platform for public cloud security and compliance orchestration. Using Dome9, organisations can visualize and assess their security posture, detect misconfigurations, model and enforce best practices, and protect against identity theft and data loss. Dome9 integrates with Amazon Web Services, Microsoft Azure, and Google Cloud.

  • Dev-ops Consulting Services


    Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads

  • Data Engineering Services (Batch, Real-time Data Pipelines)


    Our Data Engineering Services help you get answers from your Big Data. We work closely with our customers to implement Big Data infrastructures that leverage and extend their current infrastructure. Our Data Engineering Services go beyond just “business.” We know what it takes to deliver value for your business.

  • Advanced Analytics Services (Tableau, Power BI, Looker, Big Query)


    Boost your data projects with our analytics expertise, including data architecture, engineering, data modelling, report and visualisation, machine learning, data science and more. Get better ROI on your data faster with our battle-tested team of advanced data experts. Our experience in will unlock the hidden value in all your data.

  • CloudGuard Security


    We provide solutions to protect cloud-based deployments in AWS, Azure and Google Cloud using Check Point's CloudGuard service. Check Point has been the mainstay of our business for over 20 years

  • e2e Cloud Protective Monitoring and SOC Service

    e2e-assure Ltd

    Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, Malware analysis, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google, Oracle, Splunk

  • IT Financial Management Services by ComSci

    Upland Software

    ComSci helps organizations manage and communicate the cost, quality and value of services they deliver (IT Services, Shared Services, or both), driving business alignment and IT transparency. ComSci also provides a managed service offering to streamline monthly data production to enable clients to focus on delivering value, not chasing data.

  • Zscaler Private Access Service

    Truststream Security Solutions

    Zscaler Private Access is a cloud-based service that delivers policy-based, secure access to private applications and assets without the cost, support burden, or security risks of a VPN. It delivers seamless, policy-driven, access to private internal applications and assets whether they are in the cloud, the data center, or both.

  • e2e Cloud Connect Service

    e2e-assure Ltd

    A cloud connectivity service that connects remote users, devices, offices and clouds together over the Internet utilising fixed and mobile VPNs over standard internet connections. Includes MDM for all types of mobile devices. Supports Windows, Mac, Linux, tablets and phones providing secure anywhere access to cloud resources up-to OFFICIAL-SENSITIVE.

  • XMA Bitglass SASE Total Cloud Security (CASB/SWG/ZTNA)

    XMA Limited

    As part of our Digital Workspace technology portfolio, XMA provides Bitglass which combines multi-mode cloud access security broker (CASB), SmartEdge Secure Web Gateway (SWG), and zero trust network access (ZTNA) technologies to form a best-in-class secure access service edge (SASE) offering.

  • Cloud VPN as a Service

    Viewdeck Consulting Limited

    A secure software configured VPN Service for mobile, laptop, desktops and servers access across environments, zones. Secure, scalable service, suitable for deploying to private, secure and Cloud, joining hybrid, legacy, users and data centres. Providing resilient connectivity remote clients to services hosted within a secure zone.

  • Netskope on AWS Marketplace - Secure Web Gateway and Cloud Access Security Broker copy

    Somerford Associates Limited

    Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.