Search results

10 results found containing exponential-e in Cloud software

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
10 results found

Next Generation Unified Threat Management (NGUTM)

Exponential-e Ltd

Exponential-e Next Generation Unified Threat Management Service (NGUTM) delivers industry-leading security effectiveness with unmatched performance capabilities managed within a single pane of glass and fully visible to our customers.

Next Generation Endpoint Protection

Exponential-e Ltd

Exponential-e’s multi-layered protection includes prevention, detection & response as a unified service. We provide the only platform that defends every endpoint against attack, at every stage in the threat lifecycle - before, during and after an attack.

Hosted Telephony Unified Communications and Collaboration

Exponential-e Ltd

Exponential-e's Hosted PBX & Unified Communications and Collaboration Service provides users with Private Branch Exchange (PBX) functionality from our centralised, resilient voice application servers. Our Hosted PBX Service is a Cloud-based Unified Communications Service which is delivered over our business-only, reliable and low latency network.

Secure Disaster Recovery as a Service (DRaaS)

Exponential-e Ltd

Exponential-e’s Disaster Recovery provides replication, recovery orchestration and automation in one simple solution to ensure business continuity. Enabling your business to recover virtualised applications from any storage to any storage. Providing further realisation of the benefits of virtualisation, and the protecting your organisation wants and needs

Hosted Telephony + Oak Integration, Unified Communications and Collaboration

Exponential-e Ltd

Exponential-e's Hosted PBX & Unified Communications and Collaboration Service (with Oak integration) provides users with Private Branch Exchange (PBX) functionality from our centralised, resilient voice application servers. Our Hosted PBX Service is a Cloud-based Unified Communications Service which is delivered over our business-only, reliable and low latency network.

Cloud Management Platform CMP

Exponential-e Ltd

Exponential-e CMP is an orchestrator providing customers with a single pane of glass from which to manage private clouds, public clouds and hypervisors. It enables the provisioning of virtual machines to multiple clouds and infrastructures, as well as more complex multi-tier, multi-network, multi-server environments via workflows, pre-defined and customisable templates.

SafeNet Trusted Access - Identity as a Service (IDaaS)

Exponential-e Ltd

SafeNet Trusted Access is an access management service that combines the convenience of single sign-on with granular access security. By validating identities, enforcing access policies and applying smart single sign-on, organizations can ensure secure, convenient access to numerous cloud applications from one easy-to-navigate console.

Single Sign On (SSO)

Exponential-e Ltd

Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for cloud based applications. The Okta Identity Cloud is an independent and neutral platform that securely connects employees, partners, contractors and customers to the right technologies at the right time from any device.

Cloud Email Security (Mimecast Email Security M2A)

Exponential-e Ltd

Make email safer with Mimecast M2A. Mimecast extends traditional gateway security with Targeted Threat Protection that addresses ransomware, impersonation, spear-phishing and other advanced threats. An independent archive protects data from human error, technical failure and malicious intent while providing accessibility for employees and admins

Data-loss Security (SecureCircle)

Exponential-e Ltd

Secure Circle protects data regardless of where it is created, consumed and stored without impacting the end user. Secure Circle follows data, automatically securing all derivative works, and providing a complete audit-able log satisfying many regulatory compliance requirements.