Search results

Choose a category

  • All categories
    • Cloud software
      • Accounting and finance (0)
      • Analytics and business intelligence (0)
      • Application security (2)
      • Collaborative working (2)
      • Creative, design and publishing (0)
      • Customer relationship management (CRM) (0)
      • Electronic document and records management (EDRM) (0)
      • Healthcare (0)
      • Human resources and employee management (0)
      • Information and communications technology (ICT) (2)
      • Legal and enforcement (0)
      • Marketing (0)
      • Operations management (0)
      • Project management and planning (0)
      • Sales (0)
      • Schools, education and libraries (0)
      • Software development tools (0)
      • Transport and logistics (0)

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
2 results found

2 results found containing trustis in Cloud software

Managed BYOK Service

Entrust Datacard (Europe) Limited

This service is outsourced means of using Azure/AWS BYOK. Here, a customer imports and controls their domain/tenant/RMS keys. Trustis provide a means to generate your own keys, under best practice controls and bespoke Key Management Policy using HSM experts. The service encompasses key generation/export, backup, archive, audit and re-key processes.

Cryptography-as-a-Service (CaaS)

Entrust Datacard (Europe) Limited

Protect your data and systems in the Cloud using certified high performance HSMs without employing crypto experts or buying expensive hardware and having unused capacity. Hosted and expertly managed in the UK while, crucially, you retain complete control over your encryption keys. Buy what you need when you need it!