Search results

15 results found containing egress in Cloud software

Choose a category

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
15 results found

Egress Secure Workspace

EGRESS SOFTWARE TECHNOLOGIES LTD

Egress Secure Workspace, cloud-based collaboration platform designed to help users share and collaborate internally and with external customers and supply chain. Leveraging government certified key management, Egress Secure Workspace not only allows users to effectively collaborate on information and projects, but also ensures data is kept secure at all times.

Egress Email and File Protection

EGRESS SOFTWARE TECHNOLOGIES LTD

Egress Email and Protection service certified and accredited by NCSC as suitable for transferring OFFICIAL and OFFICIAL-SENSITIVE data under the current Government Classification Scheme. Offered as a fully hosted service or a private cloud, Egress enables users to encrypt, share, revoke access and audit data in real-time.

Egress Email Protection

EGRESS SOFTWARE TECHNOLOGIES LTD

Egress Email Protection includes Email Encryption and file transfer; enabling users to encrypt, revoke access and audit data in real-time. Risk-based Protection; uses trends and historic email conversations combined with contextual awareness to predict a potential breach. The solution alerts users to mistakes when sending emails and potentially malicious intent.

Egress Secure Web Form

EGRESS SOFTWARE TECHNOLOGIES LTD

Egress Secure Web Form is a secure and simple-to-use online mechanism for sharing sensitive information and large file attachments between external users and organisations, managing the lack of security between a hosted web service and a corporate network.

Egress e-Discovery and Analytics

EGRESS SOFTWARE TECHNOLOGIES LTD

Egress Compliance, Audit and Reporting is an archiving, compliance and reporting solution designed to help organisations understand the data they are holding, keep track of how their users are securing sensitive data, and perform investigations in order to comply with regulatory requirements.

Egress Secure Mail Relay and Email Hygiene

EGRESS SOFTWARE TECHNOLOGIES LTD

The Egress Secure Mail Relay and Email Hygiene Service enables Government organisations to transition from Legacy Public Sector Networks to the Internet but maintain an increased level of assurance.

Egress Enhanced Email Protection Package (HMG Standard)

EGRESS SOFTWARE TECHNOLOGIES LTD

The Egress Enhanced Email Protection Package (HMG Standard) provides organizations with a email discovery, classification, encryption and protection against the accidental send of messages. The service also provides enhanced key management as well as compliance, audit and reporting capabilities on their email environment.

Egress Secure Mail Relay, File Sharing and Collaboration

EGRESS SOFTWARE TECHNOLOGIES LTD

The Egress Secure Mail Relay, File Sharing and Collaboration Service enables organisations to join a secure community for the exchange of unstructureed data, up to OFFICIAL, across the Internet and PSN boundaries. The service can coexist with existing email services.

Egress Risk-based Protection

EGRESS SOFTWARE TECHNOLOGIES LTD

Risk-based Protection uses trends and historic email conversations combined with contextual awareness to build patterns and relationships that can predict a potential breach. The solution alerts users to mistakes when sending emails, provides the ability to manually and automatically classify emails and files and warns administrators about potentially malicious intent.

Egress Secure Managed File Transfer

EGRESS SOFTWARE TECHNOLOGIES LTD

Secure, automated email and file encryption service certified and accredited by NCSC as suitable for transferring OFFICIAL and OFFICIAL-SENSITIVE data under the Government Classification Scheme. The service seamlessly integrates with existing business processes and infrastructure, enabling users to automate the encryption and bulk transfer of data internally and externally.

Email Encryption for G-Suite

Netpremacy Limited

Egress Email for G-Suite service certified and accredited by NCSC as suitable for transferring OFFICIAL and OFFICIAL-SENSITIVE data under the current Government Classification Scheme. Offered as a fully hosted service or a private cloud, Egress enables users to encrypt, share, revoke access and audit data in real-time.

TrapJaw

UK Allied Associates

TrapJaw is Allied's cutting edge network security offering, providing a user-friendly network monitoring and forensics dashboard for network and security analysts.

Azdio Technical Services Limited Cloud Healthcare Software Services

AZDIO TECHNOLOGY SERVICES LTD

Azdio Technical Services Limited provides a full suite of Cloud Healthcare Software Services, including scoping, UI, data import/export, application analytics/ scaling, in-transit/operational/staff security/asset protection, availability/resilience, identity/authentication support in a secure, certified and documented way, training/demonstrations as required, and ongoing support of products it builds along with its partners'/other selected products.

Secure Browse Down Cloud Desktop

Parico Limited

Parico’s Secure Browse Down Cloud desktop delivers a highly secure and performant browsing experience that enables unfettered, geographically dispersed internet access without compromising the assurance and security of internal systems and networks.

Azdio Limited Cloud Software Health Services

Azdio Limited

Azdio Limited provides a full suite of Cloud Software Health Services, including scoping, UI, data import/export, application analytics/scaling, in-transit/operational/staff security/asset protection, availability/resilience, identity/authentication support in a secure/certified and documented way, training/demonstrations as required, and ongoing support of products it builds along with its partners'/other selected products.