Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

536 results found

536 results found in Lot 1: Cloud hosting in the category Intrusion detection

  • DCO CSOC Cloud Protective Monitoring

    Nortal UK

    The DCO [Defensive Cyber Operations] CSOC Cloud Protective Monitoring service provides industry best practice services to monitor and protect cloud services in both public and private cloud hosting environments and tenants. Architecture and consultancy for these environments can also be provided to ensure a holistic security offering.

  • Multi Domain Data Fusion

    SECURECLOUD+ LIMITED

    A single-pane-of-glass environment in which data is ingested/fused from multiple domains, including cross-network data feeds, private-network streams, open-source internet/data repositories, empowering/enabling communities to respond to complex/unpredictable scenarios. User groups can analyse real-time/historic data to exploit information advantage aiding decision-making and effective operations. Supports static and deployed environments at OFFICIAL/SECRET/ABOVE SECRET.

  • Google Cloud Platform (GCP) - Compute

    TELANA LIMITED

    Compute Engine offers scalable and flexible VM computing capabilities, able to utilise certain CPUs, GPUs, or Cloud TPUs. Cloud VMware Engine is a managed VMware-as-a-Service that is designed for running VMware workloads. App Engine offers fast development, deployment, and scalability, with no need to worry about hardware, patches or backups

  • Accenture Cloud Hosting And Smart Managed Services

    ACCENTURE (UK) LIMITED

    Smart Managed Service - running client services using best in class cloud infrastructure services, demonstrating DevOps and service automation to transform how organisations can run and evolve business critical, high scale and high availability services.

  • Logit.io Application Performance Monitoring and Tracing Service

    Logit.io

    The Logit.io platform makes logging and metrics analysis easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Trustmarque Palo Alto Networks VM-Series Next-Generation Firewall

    TRUSTMARQUE SOLUTIONS LIMITED

    Palo Alto Networks Next-Generation Firewalls and Security Operating Platform is the industry’s most advanced prevention solution for highly evasive zero-day malware/exploits. Our service uses unique approaches that combine dynamic/static analysis, innovative machine learning (AI) techniques, and an advanced analysis environment to detect and prevent evasive cyber threats.

  • Firewall

    FLAT ROCK TECHNOLOGY LIMITED

    We cover all phases of cloud application development – from research, through design, development, implementation, maintenance and support. As part of our services package we provide firewall services, support and maintenance.

  • Managed Cloud Hosting

    Konica Minolta Business Solutions (UK) Ltd

    Managed cloud hosting provides a public or private cloud that is secure and scalable. Expert support teams and system monitoring available 24/7. ISO accredited to 27001, UK datacentres provide high-availability server infrastructure, providing a resilient service. Designed specifically with the needs of education, NHS and local government in mind. http://www.konicaminolta.co.uk/en-gb/industry-verticals/technology-solutions-for-the-public-sector/g-cloud

  • Fully Managed Google Cloud Platform Cloud Hosting

    DIGITAL CRAFTSMEN LIMITED

    Fully-managed, highly-secure autoscaling Google Cloud Platform hosting for public and third-sector organisations who want complete peace of mind with their cloud infrastructure. Supported by a 24/7/365 UK-based service desk, full ITIL documentation, a 99.95% availability guarantee, fully qualified GCP architects and a dedicated account manager.

  • Managed Cloud Services

    Incline IT Limited

    Innovative Cloud in Enterprise IT is the origins of our name (Incline IT). We use best of breed cloud native technologies with our innovative and thought leading service architecture to deliver first class IT Services with real-time compliance which is both unique and unrivalled.

  • Ingentive Microsoft Sentinel / Cloud SIEM

    INGENTIVE LIMITED

    Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring. Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.

  • Cloud Hosting and Infrastructure Support Services

    AJACO

    AJACO provide Cloud Hosting and Infrastructure Support Services. Our Services include Technical Assurance, Technical Trials, SharePoint end-to-end Administration, Security Assurance, Mobile Device and Threat Management, Quality Assurance, User Based and Performance Testing. AJACO and its service providers ensure projects are delivered in line with project requirements, budget and quality expectations.

  • LocalGov Drupal AWS Cloud Hosting

    ZOOCHA LIMITED

    LocalGov Drupal is the publishing platform created by councils, for councils. It is a publicly owned asset that is designed to deliver a better digital experience for citizens, improves service outcomes, and saves money. Our managed AWS hosting enables councils to leverage the benefits of LocalGov Drupal.

  • boxxe Fortinet Security Information Event Management & Automated Response

    BOXXE LIMITED

    Leveraging Fortinet’s FortiSIEM and FortiSOAR, the Protective Monitoring and Automated Remediation solution offers users deep multivendor integration for configuration, change management, log collection & correlation, and Indicators of Compromise to detect and contextualise threats in real-time. Automated remediation through playbooks provides a seamless mitigation capability to security teams.

  • Logit.io Logging as a Service (LaaS)

    Logit.io

    The Logit.io platform makes logging and metrics analysis easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • ISN - Cloud Connectivity on Demand (EoD)

    Intuitive Systems & Networks

    ISN are a Cisco networking and security specialist that can provide cloud connectivity on demand. A 100MB internet connection can be boosted to 500MB for a month then back to 100MB. ISN would only charge for the month the additional bandwidth this is delivered using Ethernet on Demand.

  • Palo Alto Cloud Hosting

    XPERTEX LTD

    Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.

  • DXC Technology Network Consulting and Advisory

    ENTSERV UK LIMITED

    Network assessment and consulting service provides Network Strategy and road-map for DXC customers based on audits & assessments. It Supports the strategy through network architecture & design backed by a business case.

  • Managed Network Services

    CYBERFORT LIMITED

    Cyberfort's Managed Network Services offer customisable connectivity solutions tailored to your requirements. Whether it's managed networks, firewalls, private MPLS links, DDoS protection, or load balancing, we collaborate to design and construct a secure, interconnected network, empowering your business with reliability and flexibility.

  • Any Oracle and SAP System in the Azure Cloud

    Support Revolution Limited

    We will migrate your Oracle and SAP systems from an on-premise or cloud environment to our Azure hosted cloud. We will then provide support for your Oracle and SAP systems in our Azure Cloud

  • Lawful Interception & Data Analytic Solutions

    THALES UK LIMITED

    Thales offers a comprehensive array of data acquisition and analysis. The Thales portfolio ranges from Lawful Interception (LI) data collection and mediation, in compliance with ETSI standards, to a wide set of monitoring probes and also includes a data analytics platform for turning raw data into actionable evidence.

  • UNITE: Secure Core Elite

    Infinity Group

    UNITE: Secure Core simplifies security infrastructure management by providing proactive monitoring, updates, and protection for business identities, applications, devices, and data. As an IT Manager, you’ll appreciate its comprehensive defence against cyber threats, including malware, viruses, phishing attacks, and data breaches.

  • Azure Managed Service

    Professional Data Management Services Limited

    Bringing together the flexibility of Microsoft Azure services and PDMS’ experience in delivering managed services, our offering provides a secure Azure hosted solution with a single point of contact. We design, configure & implement Azure solutions. We provide Microsoft's Azure Cloud solutions on a fully managed service basis.

  • EUROPEAN DYNAMICS Hosting Services - EDHS

    EUROPEAN DYNAMICS UK LTD

    EDHS are modern hosting services offered from EUROPEAN DYNAMICS' (ED) Tier-3 datacentres in the EEA. ED has ISO9001, ISO27001, and ISO20000-1 certifications and comply with UK GDPR requirements resulting in reliable and secure hosting services at affordable prices for all UK public sector customers. Add-on service options exist.

  • mnemonic - Endpoint Detection and Response (EDR)

    SOMERFORD ASSOCIATES LIMITED

    The Argus Endpoint Responder is a service that extends the Argus Managed Defence service directly to Customer’s endpoints, including servers, laptops and desktops. This service module adds detection capabilities, powerful triage tools, and added efficiency to the incident response process. Compromised endpoints can be isolated.

  • Fully Managed Amazon Web Services Cloud Hosting

    DIGITAL CRAFTSMEN LIMITED

    Fully-managed, highly-secure autoscaling Amazon Web Services hosting for public and third-sector organisations who want complete peace of mind with their cloud infrastructure. Supported by a 24/7/365 UK-based service desk, full ITIL documentation, a 99.95% availability guarantee, fully qualified AWS Architects and a dedicated account manager.

  • BT Managed Firewall Security Next Gen Full VAS (Virtual)

    BT PLC

    Provision of a virtualised “next generation” firewall, incorporating NGFW features such as AntiVirus, URL Filtering, IPS / IDS, anti-malware and anti-bot. Provision of a security product wrap to include pricing, ordering, change, assurance, invoicing and associated managed service wrap.

  • Managed Network Services

    Akhter Computers PLC

    Cyberfort's Managed Network Services offer customisable connectivity solutions tailored to your requirements. Whether it's managed networks, firewalls, private MPLS links, DDoS protection, or load balancing, we collaborate to design and construct a secure, interconnected network, empowering your business with reliability and flexibility.

  • Managed Firewall Service

    Redcentric Solutions Limited

    A Fortinet powered Managed Firewall service with a choice of a shared platform, dedicated firewalls hardware or virtual firewalls. Our fully Managed Firewall Service is configured to meet customer firewall security requirements and is monitored 24/7 to give our customers total peace of mind.

  • IBM Cloud Virtual Private Cloud (VPC) (IaaS)

    IBM UNITED KINGDOM LIMITED

    IBM Cloud Virtual Private Cloud (VPC) lets Clients create a fully customizable, software-defined virtual network with isolation on IBM public cloud. IBM Cloud VPC provides custom network topologies, flexible subnet sizes, and enhanced security.