Cloud Communications Featured Article

Soft-ex Included in G-Cloud 5

June 24, 2014

Soft-ex, a subsidiary of WidePoint Corporation, has been awarded inclusion in G-Cloud 5, the latest iteration of the G-Cloud framework of the U.K. Government's cloud computing framework. WidePoint Corporation is a provider of Managed Mobility Services (MMS) featuring Cybersecurity and Telecommunications Lifecycle Management (TLM) solutions.

Soft-ex is a supplier of Telecom Data Intelligence (TDI (News - Alert)) SaaS solutions that provide unique online data intelligence for Communication Service Providers (CSPs) and their Enterprise customers for fixed, mobile and PABX communications. As approved provider for U.K. Government deals, Soft-ex will offer Optimiser TDI, an online tool that proactively pushes key business telecom's information to the desktop by location, department or user, ensuring centralized visibility and control.

Ian Sparling, CEO of Soft-ex commented, "The G-Cloud 5 award to Soft-ex is a reflection of our proven track record and ongoing development in supporting public sector organizations. We have a large number of government customers and the trend now is certainly towards cloud-based services, which offer greater cost efficiencies and more flexible platforms."

Steve Komar, CEO of WidePoint stated, "We are delighted that Soft-ex has been selected by the Crown Commercial Services as part of G-Cloud 5 in the UK market. This award further extends our strong footprint in supplying innovative solutions to the government sector on a global scale." 

In related news, WidePoint Corporation recently announced a new cloud-based identity-as-a-service (IDaaS) offering. The service assigns digital certificates to all types of mobile devices to help protect mobile transactions as well as better manage access to corporate networks, databases and IT assets. The IDaaS “Certificate-on-Chip” service enables secure VPN connections between enterprise networks and end-user devices, without the need for a proprietary software client. It also lets workers download sensitive company data only to properly authorized and configured devices. The service enables IT admins to remotely revoke certificates for devices that were lost or stolen, or to an employee who has left an organization.




Edited by Maurice Nagle

Article comments powered by Disqus