Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

671 results found

671 results found in Lot 2: Cloud software in the category Log management

  • Automated Vulnerability and Penetration Testing Solution

    VE3 GLOBAL LTD

    Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.

  • Crowdstrike Falcon Complete MDR Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.

  • RedactXpert - Redaction Solution

    SIMPSON ASSOCIATES INFORMATION SERVICES LIMITED

    RedactXpert - AI Auto Redaction Software Tool. The only auto text redaction tool developed using Microsoft’s Azure Cognitive Services. RedactXpert improves accuracy, efficiency and speed of redacting Personal Identifiable Information (PII) within a variety of document types.

  • SentinelOne EDR Licences

    MONDAS CONSULTING LTD

    Purchase SentinelOne EDR licences to utilise the power of the SentinelOne’s Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the SentinelOne EDR for signs of malicious activity on your network.

  • Cybeready Autonomous Cyber Security Awareness Training

    SCG CORPORATE LIMITED

    An Autonomous Security Awareness Program Built For The Enterprise A complete, fully-managed training program that transforms security culture. Pairing the most advanced training solutions: including phishing simulation, awareness training & compliance.

  • Cribl Software

    APTO SOLUTIONS LIMITED

    Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution.

  • SolarWinds Log Analyzer (LA) License

    Prosperon Networks Ltd

    SolarWinds® Log Analyzer (LA) is a powerful log management tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualisation, you can quickly and easily gain out-of-the-box visibility into the performance and availability of your IT infrastructure.

  • Managed SOC Service

    Factory Internet Ltd

    Factory provide a Cloud Based SOC and SIEM Service. Our service has fully management and analyst support along with support for onboarding data. We provide full EDR/XDR functionality with Log Collection from Cloud, SaaS, Network and hundreds of different technologies.

  • Varonis Data Security Platform

    INTEGRITY360 LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation

  • Crowdstrike Falcon Next Gen SIEM

    4 DATA SOLUTIONS LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Netwrix Threat Manager

    INTEGRITY360 LIMITED

    Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed

  • SecurEnvoy MFA / Identity Access from Chess Cyber Security

    ARMADILLO SEC LTD

    SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.

  • Security Software Services - Splunk, Sentinel, Crowdstrike, SentinelOne, Tenable, Cribl, Qualys

    ADARMA LIMITED

    Log aggregation platforms that transform data into operational intelligence. It enables organisations to search, analyse, monitor, visualise and act on massive streams of data generated by websites, applications, networks, mobile and other devices. Applications include IT Operations & Service Intelligence, Security & Compliance, and Big Data Analytics.

  • AssetTracker Pro Logistics

    HAYMAN.DEV LTD

    Asset management and tracking is a multiplatform, multi-device driven system for information control for tomorrow. We listen and drive off the shelf or bespoke requirements to record, track, audit and report of your data. Providing you with a blended approach to giving you the needed information at hand.

  • Computacenter - CheckPoint Cloud Native Application Protection Platform (CNAPP)

    Computacenter (UK) Ltd

    CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.

  • EverFox Zero Trust Content Disarm and Reconstruction (ZTCDR)

    SOFTCAT PLC

    ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.

  • F5 Distributed Cloud

    CYBIT LIMITED

    F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.

  • Powered by Neo: Enhanced Contractor Collaboration with Open APIs

    NEO TECHNOLOGY LIMITED

    Neo Technology's Open APIs empower contractors with seamless access and integration capabilities. Contractors can initiate repairs, access data, and upload documentation securely. Features include comprehensive API documentation, authentication, scalability, and developer support. This fosters enhanced contractor engagement, improves operational efficiency, encourages innovation, and cultivates ecosystem partnerships.

  • Check Point Harmony Endpoint

    INTEGRITY360 LIMITED

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • CrowdStrike Falcon Data Protection

    SOFTCAT PLC

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • Microsoft Power Platform

    TOTAL ENTERPRISE SOLUTIONS LIMITED

    Microsoft Gold Partner providing Power Platform services and license management. Power Automate creates automated workflows across apps/ services to synchronize files, get notifications and collect data. PowerApps creates Mobile Apps, operating across Android, iOS, Windows – and with almost any Internet browser using a low code no code approach.

  • Advanced Repair Management Solutions - Propsys360 Powered by Neo

    NEO TECHNOLOGY LIMITED

    Propsys360 streamlines every stage of the repairs lifecycle, from logging faults and triaging priorities to scheduling operatives, tracking progress and analysing data, ensuring faster first-time fixes, reduced downtime and happier residents. Automated workflows, mobile apps and intuitive dashboards unite teams, optimise parts usage, drive compliance and protect long-term asset value.

  • Cloud SIEM as a Service

    VIEWDECK ENGINEERING LIMITED

    Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.

  • Chinchill.hr

    FAT POTATO LIMITED

    Chinchill.hr is a cutting-edge human resources and client management software. It aims to streamline HR processes, improve employee management, and enhance organisational efficiency through user-friendly features and customisable solutions.

  • KPI & Data Integration

    RAPID INFORMATION SYSTEMS LIMITED

    The solution helps transforms data across Education, Welfare, and Housing sectors in Local Government. It enables collaboration among Educational Institutions, Welfare Professionals, Housing Officers, and Council Tenants. Key features include streamlined workflows, data reliability, compliance assessment, and efficient KPI data collection.

  • Managed Detection and Response (MDR) as a service

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Mydex Identity as a Service (IDaaS)

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    Secure identity service supporting registration, authentication and on-going management of a privacy-protecting, GDPR-compliant identity service which can be integrated into any environment supporting open standards and protocols. The service is extensible to support a range of multi-factor authentication mechanisms, profile management, identity assurance and age verification to meet diverse needs.

  • Forcepoint Data Guard (FDG)

    Gradian Systems Ltd

    Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.

  • RSign: eSignatures Made Easy

    RPOST UK LIMITED

    RSign® is the award-winning eSign and eForms feature-rich and affordable solution by RPost®. Recognized by IDC MarketScape and Aragon Research, RSign ensures compliance, security, and convenience. It integrates seamlessly with platforms like Outlook and Salesforce. Streamline workflows, reduce eSignature costs, and improve customer service. Choose RSign - just switch it!

  • Sophos Intercept X Advanced

    OSTRATTO LTD

    Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.