Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

662 results found

662 results found in Lot 2: Cloud software in the category Log management

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • Check Point Harmony Endpoint

    Softcat Limited

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Cylance MDR

    BlackBerry UK Limited

    CylanceMDR™ provides 24x7x365 detection and protection. Our team is comprised of world-champion experts, and our platform is powered by pioneering Cylance® AI technology for threat protection augmented with proprietary and threat intelligence. CylanceMDR includes hands-on onboarding, alert-triage, investigation, managed threat hunting, digital forensics, incident response (IR), and critical event management.

  • Multi-Agency Case Management System

    Claritas Solutions Ltd

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Check Point Harmony Endpoint

    Charterhouse Voice & Data

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Neo Technology AWS Managed Services

    NEO TECHNOLOGY LIMITED

    Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.

  • Check Point Harmony Mobile

    Charterhouse Voice & Data

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Patient Centred Care

    Gaiasoft International Limited

    Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    Proact IT UK Limited

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM Intelligence Limited

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.

  • Proact Security Log Management Service (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Neo Technology Digital Document Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW Limited

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • Konsolute Kolumbus - Data Discovery Tool

    KONSOLUTE

    Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.

  • Salesforce - Public Sector Solutions Cloud

    SKYFLO DIGITAL LTD

    Single platform designed to help governments to serve the people faster. Get value quickly with purpose-built data, integration, automation, AI, analytics, UX for public sector. Out-Of-The-Box capabilities to manage citizen services and benefits, deliver authorisations, manage rules and compliance, ensure safety and justice, recruit, onboard, develop public sector employees. SFDC2024GC14

  • Log Management ( FortiAnalzyer)

    FullProxy Ltd

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Call Centre Case Management

    Claritas Solutions Ltd

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Voixtel Cloud Telephony Software and Services

    VOIXTEL

    We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.

  • Collaboraite® Data and AI Solutions

    COLLABORAITE LTD

    Collaboraite® work with you to design secure data & AI solutions to solve your operational challenges, through design thinking and agile delivery. We create: (a) Bespoke, secure, human-centred solutions leveraging data, analytics and AI capabilities enabling digital transformation. (b) Data & AI products securely hosted and integrated in Long Arm®.

  • Security Detection and Visibility (SIEMaaS) as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • Compliance Software Solution

    WT DATATECH LTD

    Our cloud-based Solution offers a straightforward, efficient, and powerful tool for managing all governance, risk, and compliance needs, including ISO standards. Our Compliance Solution combines management system integration and risk assurance software to provide the easiest path for your business to attain and uphold ISO certification.

  • Sophos Firewall

    Phoenix Software Ltd

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Shadow Data Security Posture Management Monitoring

    Diegesis Limited

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.

  • Cisco Secure Access Service Edge (SASE)

    Softcat Limited

    Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.

  • Sophos Zero Trust Network Access (ZTNA)

    Phoenix Software Ltd

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Varonis SaaS Data Security Platform

    CM Security Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • OSINT, WEBINT, SOCMINT & III = BLD COUNTER OPS PaaS

    Blue Lights Digital

    COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.