Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

682 results found

682 results found in Lot 2: Cloud software in the category Log management

  • Computacenter - Proofpoint Security Awareness Training

    Computacenter (UK) Ltd

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Netwrix Stealth Intercept

    SOFTCAT PLC

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Powered by Neo: Offline Functionalities and Mobile App

    NEO TECHNOLOGY LIMITED

    Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.

  • CrowdStrike Falcon Insight Extended Detection & Response (XDR)

    SOFTCAT PLC

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    Computacenter (UK) Ltd

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • Check Point Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Identity and Access Management (IAM) Advanced

    SAPPHIRE TECHNOLOGIES LIMITED

    An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Check Point Harmony Endpoint

    Charterhouse Voice & Data

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Neo Technology AWS Managed Services

    NEO TECHNOLOGY LIMITED

    Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.

  • Check Point Harmony Mobile

    Charterhouse Voice & Data

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Patient Centred Care

    Gaiasoft International Limited

    Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    Proact IT UK Limited

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM Intelligence Limited

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.

  • Proact Security Log Management Service (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Neo Technology Digital Document Management Solution

    NEO TECHNOLOGY LIMITED

    Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.

  • Forcepoint Data Guard

    CHESS ICT LIMITED

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • CDW CyberArk Conjur Secrets Manager Enterprise

    CDW LIMITED

    Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.

  • Secure Inmate Telephony (PIN Phone)

    Phonio UK Ltd (Telio)

    Phonio is a PIN Phone telephony solution especially developed for use in the prison environment. Phonio enables secure telephony, allowing inmates greater private contact with permitted recipients. All calling activity is controllable through an advanced intuitive call management platform which includes security monitoring and account administration. Safe and easy!

  • Konsolute Kolumbus - Data Discovery Tool

    KONSOLUTE

    Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.

  • Salesforce - Public Sector Solutions Cloud

    SKYFLO DIGITAL LTD

    Single platform designed to help governments to serve the people faster. Get value quickly with purpose-built data, integration, automation, AI, analytics, UX for public sector. Out-Of-The-Box capabilities to manage citizen services and benefits, deliver authorisations, manage rules and compliance, ensure safety and justice, recruit, onboard, develop public sector employees. SFDC2024GC14

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Netwrix Auditor

    INTEGRITY360 LIMITED

    Detect security threats, prove compliance and increase IT team efficiency with IT audit software from Netwrix

  • Application Security Services

    SALUS DIGITAL SECURITY LIMITED

    Gathering independent assurance of cloud service provision and operation against legal, Government, and Industry standards

  • Call Centre Case Management

    CLARITAS SOLUTIONS LIMITED

    Empowers users to have complete control of your customers journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Voixtel Cloud Telephony Software and Services

    VOIXTEL

    We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.