Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

662 results found

662 results found in Lot 2: Cloud software in the category Log management

  • Computacenter - Proofpoint Advanced Package

    Computacenter (UK) Ltd

    Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.

  • Palo Alto Cortex XSIAM

    Xpertex

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.

  • Sophos Zero Trust Network Access (ZTNA)

    Bytes Software Services

    "Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users. bssgc

  • Automated Document Summarization

    DATASUMI LTD

    An advanced solution utilising natural language processing (NLP & LLM) technologies to generate brief yet thorough summaries of extensive documents at an unmatched speed. Featuring accelerated information retrieval, better knowledge retention, and increased productivity across various applications, this groundbreaking method transforms our interactions with large volumes of data.

  • eG Enterprise Manager – Digital Workspace, VDI and Application Monitoring

    Howell Technology Group Limited

    eG Enterprise is a digital end-user experience monitoring solution that incorporates deep domain expertise, actionable insights and analytics required to detect, diagnose, and troubleshoot Apps and IT infrastructure performance problems, and ensure high-performing virtual applications.

  • Computacenter - IBM Security - QRadar on Cloud - SIEM

    Computacenter (UK) Ltd

    QRadar on Cloud integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products

  • Computacenter - CrowdStrike Falcon Exposure Management

    Computacenter (UK) Ltd

    CrowdStrike Falcon® Exposure Management is a powerful ground breaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Barrier Networks Centri for Cisco Security Service Edge (SSE)

    Barrier Networks

    Managed Security Service Edge from Barrier helps organizations provide secure connectivity for hybrid workforces, protecting corporate resources from cyberattacks and data-loss. Cisco Powered Service.

  • Splunk Threat Detection Investigation and Response Suite

    Bytes Software Services

    Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA. bssgc

  • Logit.io Metrics as a Service and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • MTI Quest

    MTI Technology Ltd

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Sophos Zero Trust Network Access (ZTNA)

    CHESS ICT LIMITED

    Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable. ZTNA allows users to securely access network resources. It is also transparent to end users.

  • Micro Focus, now OpenText - ArcSight with Real-Time Threat Detection on SaaS

    MICRO FOCUS

    ArcSight SIEM-as-a-Service with Real-Time Threat Detection (Detect) is a real-time correlation and threat alerting system that increases SOC analyst awareness of critical security incidents in their environment. Detect enables SOC analysts to create correlation rules that generate alerts when specific conditions occur within their event logs.

  • EVOLVE Contract Management

    Elcom Systems Ltd

    EVOLVE Contract Management, covering all contracts, contract register, reminders, suppliers, documents, amendments, extensions and user defined KPIs, reporting and analytics. Integration with other EVOLVE solutions, buy as a module or build your own solution to create seamless Spend Management. Integration with legacy, supply chain and external systems.

  • BeyondTrust Privileged Management

    Bytes Software Services

    BeyondTrust Privileged Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access. bssgc

  • Protective Security Monitoring

    Wanstor Ltd

    As part of an effective Cyber Security strategy, it is important to continually collect and analyse security events to determine if your organisation is under attack. Wanstor's Security Information and Event Management (SIEM) services (Sentinel / Log360) helps your organisation to log, analyse and alert on common cyber security attacks.

  • Ingentive Microsoft Cloud Security

    INGENTIVE LIMITED

    Ingentive offers structured solutions designed to help organisations familiarise themselves with Microsoft's Security suite. Harnessing advanced threat detection algorithms and real-time monitoring, Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your security posture and enhance your defence against emerging threats.

  • BeyondTrust Privileged Password Management

    Bytes Software Services

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts. bssgc

  • Altia Covert Operations Solution (ACOS) Communications Authority Management

    ABM Intelligence Limited

    Altia Covert Operations Solution (ACOS) includes a complete Communications Data Acquisition (CDA) and processing solution. The Comms module provides the automated mechanism for appropriate authorities to submit and acquire Communications Data (AA). Supports searching across the covert activity when taken with other ACOS modules.

  • Netwrix Endpoint Protector

    INTEGRITY360 LIMITED

    Netwrix offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.

  • Varonis SaaS Data Security Platform

    Barrier Networks

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Netwrix ChangeTracker

    INTEGRITY360 LIMITED

    Netwrix Change Tracker enables organizations of all sizes to enhance their security posture by hardening configurations, monitoring changes and delivering superior forensic capabilities that minimize the time and effort needed to identify the cause and scope of a security breach

  • Defense.com

    DEFENSE.COM UK LTD

    Defense.com is an XDR platform that helps you easily detect and respond to cyber threats. Defense.com brings security data from any source into a single platform, making it easy for you to identify, prioritise and remediate threats. We combine advanced technologies with expert SOC analysts to provide 24/7 threat detection.

  • Microsoft Dynamics 365 Business Central

    Moore Stephens Insight Limited

    Microsoft Business Central is a cloud-based, all-in-one business management solution. It’s designed for small and mid-sized organisations, automating and streamlining business processes. It helps manage various aspects of finance, is fast to implement, easy to configure, and adaptable.

  • SaaS Solutions

    Baseel Limited

    Baseel Limited can offer various products in the areas of risk management, security, IT Management, business process, IT governance, and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS.

  • Insight - Quest On Demand

    Insight

    Quest On-Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Infrastructure Pen Testing

    INET

    Our team provide dependable penetration testing for internal and internet facing environments, ensuring protection from cyber threats. Using CREST and CHECK ITHC accredited methodologies we perform state of the art automated vulnerability scanning, and carefully targeted manual testing to deliver an outstanding assessment encompassing internal and external estates.

  • Security Log Management Service (SIEMaaS) as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • Quest On Demand

    Softcat Limited

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and O365 workloads across all tenants from a single dashboard.

  • Falcon Identity Threat Detection & Protection

    Phoenix Software Ltd

    Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.