Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1085 results found

1085 results found in Lot 2: Cloud software in the category Audit tools

  • Aiimi Insight Engine – Search & Discovery

    AIIMI LIMITED

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.

  • Information Security & Cybersecurity Governance Risk Compliance (GRC) Service

    ICYBERDEFENCE LIMITED

    Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.

  • FIELD IoT Data Collection, Dashboard and Analytics Platform

    TEXUNA TECHNOLOGIES LTD

    IoT Data Collection and Visualisation Solution to standardise data management from satellite or cellular connected sensors, devices and hubs for presentation in a user-friendly interface. Suitable for smart sensors in urban cities, rivers, remote waterways, FIELD harnesses low cost long term IoT connectivity for better decision-making and enhanced operational efficiency.

  • Google Workspace

    Grove Information Systems

    Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.

  • AtlasNXT

    Track24 Limited

    AtlasNXT uses location intelligence to solve security, duty of care, communication and operational challenges. It is designed to optimise user adoption by offering a unified, intuitive experience built on privacy-first principles. We transform modern-day operational delivery, through AI-based automation improving cost efficiencies, whilst boosting productivity, employee satisfaction and trust.

  • SIM Antisocial Behaviour Incident Manager

    BOUNCE AGENCY LIMITED

    The SIM Antisocial Behaviour Manager offers a centralised platform for managing incidents, analysing data, and coordinating responses, enabling you to address community concerns swiftly and efficiently. Incident reporting, case management, data analysis, and community engagement tools help Local Authority Community Safety Teams strengthen collaboration with residents to foster safer communities.

  • Anti-Phishing Simulation, Security Awareness Training, Reporting, Remediation & DMARC

    Lloyds Ventures

    Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.

  • boxxe OKTA

    BOXXE LIMITED

    Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.

  • IRIS Intelligence Asset Management Software

    IRIS INTELLIGENCE LIMITED

    IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.

  • Computacenter - CrowdStrike Application Security Posture Management

    Computacenter (UK) Ltd

    CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • GRC, Risk, Audit and Compliance Management software

    SYMBIANT LTD

    Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.

  • Splunk Software

    APTO SOLUTIONS LIMITED

    Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.

  • Secure Data Driven Decision Making

    SECURECLOUD+ LIMITED

    Securely ingest data from multiple networks/classifications in real-time for analysis, alerting and visualisation using COTS tools or open-source cloud native software. The service can be used for sensor data analysis, predictive data-driven maintenance, geospatial visualisation, sharing situational awareness, alongside integrated AI/ML pipelines for advanced data analysis and enhanced decision making.

  • Computacenter - Varonis SaaS Data Security Platform

    Computacenter (UK) Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • SecurityScorecard - Attack Surface intelligence, Secure Supply Chain

    SOMERFORD ASSOCIATES LIMITED

    SecurityScorecard’s Attack Surface Intelligence detects more unknown unknowns, including those of your third-party vendors and how they pose a risk to your business, arming you with deep contextual insights and attribution to prioritize your next steps - all in one single platform.

  • Compuatacenter - Proofpoint Threat Protection Suite

    Computacenter (UK) Ltd

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • CyberArk Endpoint Privilege Manager (EPM) SaaS

    CYBERIAM HOLDINGS LIMITED

    CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.

  • Netwrix Password Reset

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Case Management for Digital Forensics

    Blue Lights Digital

    Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.

  • Netwrix Password Policy Enforcer

    BYTES SOFTWARE SERVICES LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc

  • HCLTech Volt MX- Rapid Application Development

    HCL TECHNOLOGIES UK LIMITED

    Rapid Application Development IDE Rapid App Development (RAD) platform with power of custom coding, help enterprises build and launch applications faster. Application development platform for building unified digital experiences across all channels. Create mobile and desktop applications in a low code environment. Mobile Application Development. Multi-experience Development Platform.

  • Jigsaw24 - Jamf Software Solutions for Apple

    Jigsaw24

    Jamf Apple device management and associated professional services. Building Unified Endpoint Management solutions for Apple ecosystems. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • Precisely Ironstream

    PRECISELY SOFTWARE LIMITED

    Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.

  • Heimdal Security - Privileged Access Management & Application Control

    Network Utilities (Systems) Ltd

    Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat. Including application management for whitelisting and blocking of running applications.

  • Mimecast Secure Email Gateway - M3RA (Cyber Resilience Pro Plan)

    INTEGRITY360 LIMITED

    Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

  • Netwrix Data Classification

    INTEGRITY360 LIMITED

    Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort.

  • KGN-Software

    KGN SOFTWARE LTD

    KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.

  • Passfort

    MOODY'S ANALYTICS UK LIMITED

    PassFort is a SaaS RegTech provider whose platform automates financial crime & compliance processes. We are on a mission to digitally transform the way compliance professionals work, breaking the compromise between compliance and customer experience in the fight against financial crime.