Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1097 results found

1097 results found in Lot 2: Cloud software in the category Audit tools

  • Cornerstone HCM - Human Capital Management for Public Sector

    Cornerstone OnDemand

    Unified Human Capital Management combines our core solutions, Recruiting and Onboarding, Learning and Performance-Management with Cornerstone’s core HR-Management solution. One platform for Recruitment, Onboarding, Learning, Skills Development, Goals, Performance, Careers, Succession, HR,Planning. HCM Solutions are available as standalone modules.Our solutions are tightly integrated with the addition of Talespin, virtual-reality learning.

  • Sophos Firewall

    BYTES SOFTWARE SERVICES LIMITED

    "XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc

  • Micro Focus, now OpenText - ArcSight Security Incident and Event Management (SIEM) on SaaS

    MICRO FOCUS

    Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.

  • boxxe CloudHealth by VMware

    BOXXE LIMITED

    CloudHealth is the most trusted software platform for accelerating global business transformation in the cloud. Now part of VMware, CloudHealth is the enterprise platform of choice for more than 7,000 organisations worldwide that rely on it to optimise, secure, and govern the largest and most complex multi cloud environments.

  • Gov forms digital form builder cloud software

    GOVFORMS LIMITED

    Proven Gov forms digital service builder cloud software delivers out-of-the-box, cost effective, creation of digital journeys, forms or surveys for HM Government and Local Authorities. Easy to use browser-based SaaS. GOV.UK design patterns. GDS accessibility compliant. No coding needed. Submit data with APIs. Integrate with: Microsoft, Salesforce, ServiceNow and more.

  • Aiimi Insight Engine – Search & Discovery

    AIIMI LIMITED

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.

  • Information Security & Cybersecurity Governance Risk Compliance (GRC) Service

    ICYBERDEFENCE LIMITED

    Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.

  • FIELD IoT Data Collection, Dashboard and Analytics Platform

    TEXUNA TECHNOLOGIES LTD

    IoT Data Collection and Visualisation Solution to standardise data management from satellite or cellular connected sensors, devices and hubs for presentation in a user-friendly interface. Suitable for smart sensors in urban cities, rivers, remote waterways, FIELD harnesses low cost long term IoT connectivity for better decision-making and enhanced operational efficiency.

  • Google Workspace

    Grove Information Systems

    Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.

  • AtlasNXT

    Track24 Limited

    AtlasNXT uses location intelligence to solve security, duty of care, communication and operational challenges. It is designed to optimise user adoption by offering a unified, intuitive experience built on privacy-first principles. We transform modern-day operational delivery, through AI-based automation improving cost efficiencies, whilst boosting productivity, employee satisfaction and trust.

  • SIM Antisocial Behaviour Incident Manager

    BOUNCE AGENCY LIMITED

    The SIM Antisocial Behaviour Manager offers a centralised platform for managing incidents, analysing data, and coordinating responses, enabling you to address community concerns swiftly and efficiently. Incident reporting, case management, data analysis, and community engagement tools help Local Authority Community Safety Teams strengthen collaboration with residents to foster safer communities.

  • Anti-Phishing Simulation, Security Awareness Training, Reporting, Remediation & DMARC

    Lloyds Ventures

    Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.

  • boxxe OKTA

    BOXXE LIMITED

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • IRIS Intelligence Asset Management Software

    IRIS INTELLIGENCE LIMITED

    IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.

  • Computacenter - CrowdStrike Application Security Posture Management

    Computacenter (UK) Ltd

    CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • GRC, Risk, Audit and Compliance Management software

    SYMBIANT LTD

    Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.

  • Splunk Software

    APTO SOLUTIONS LIMITED

    Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.

  • Secure Data Driven Decision Making

    SECURECLOUD+ LIMITED

    Securely ingest data from multiple networks/classifications in real-time for analysis, alerting and visualisation using COTS tools or open-source cloud native software. The service can be used for sensor data analysis, predictive data-driven maintenance, geospatial visualisation, sharing situational awareness, alongside integrated AI/ML pipelines for advanced data analysis and enhanced decision making.

  • Computacenter - Varonis SaaS Data Security Platform

    Computacenter (UK) Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityScorecard - Attack Surface intelligence, Secure Supply Chain

    SOMERFORD ASSOCIATES LIMITED

    SecurityScorecard’s Attack Surface Intelligence detects more unknown unknowns, including those of your third-party vendors and how they pose a risk to your business, arming you with deep contextual insights and attribution to prioritize your next steps - all in one single platform.

  • Compuatacenter - Proofpoint Threat Protection Suite

    Computacenter (UK) Ltd

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    CYBERIAM HOLDINGS LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Netwrix Password Reset

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Case Management for Digital Forensics

    Blue Lights Digital

    Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.

  • Netwrix Password Policy Enforcer

    BYTES SOFTWARE SERVICES LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc

  • HCLTech Volt MX- Rapid Application Development

    HCL TECHNOLOGIES UK LIMITED

    Rapid Application Development IDE Rapid App Development (RAD) platform with power of custom coding, help enterprises build and launch applications faster. Application development platform for building unified digital experiences across all channels. Create mobile and desktop applications in a low code environment. Mobile Application Development. Multi-experience Development Platform.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • Precisely Ironstream

    PRECISELY SOFTWARE LIMITED

    Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.

  • Heimdal Security - Privileged Access Management & Application Control

    Network Utilities (Systems) Ltd

    Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat. Including application management for whitelisting and blocking of running applications.