Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

969 results found

969 results found in Lot 2: Cloud software in the category Systems monitoring

  • NAble Monitoring and Update service

    Central Networks and Technologies Ltd

    N-Able is used to monitor physical and virtual devices in a customer's networks.

  • Robotic Process Automation (RPA) and Intelligent Automation (IA) Services

    VE3 GLOBAL LTD

    Robotic Process Automation (RPA) is our expertise and service category. VE3 delivers straightforward solutions, empowering businesses to operate more efficiently. We offer flexible support services that adapt to your evolving needs, addressing real challenges to deliver tangible, measurable benefits for you and your users.

  • Cloud Insights

    NETAPP

    NetApp Cloud Insights is a monitoring tool that gives you visibility into your complete hybrid cloud infrastructure. With Cloud Insights, you can monitor, troubleshoot and optimize all your resources including your public clouds and your private data centers.

  • Knowledge Graph Platform and Delivery

    VE3 GLOBAL LTD

    The Knowledge Graph Platform and Delivery service offers a robust framework for integrating diverse data sources into a unified, searchable graph structure. This platform enhances data discovery, relationship mapping, and analytics, empowering organizations to derive meaningful insights and make informed decisions through a visually interactive and intuitive interface.

  • Tenable Vulnerability Management

    SAPPHIRE TECHNOLOGIES LIMITED

    Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical. Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations

  • Proact Security Log Management Service (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).

  • Forescout NetSec Core

    CHESS ICT LIMITED

    The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.

  • Forescout Cyber Assurance

    BYTES SOFTWARE SERVICES LIMITED

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance. bssgc

  • Chrome Education Upgrade License

    Levett Consultancy Ltd

    Chrome Education Upgrade empowers IT to create educational environments for teachers and learners to thrive in, with enhanced management, security, and support capabilities for ChromeOS Devices. Remotely manage, provision, deploy, and implement ChromeOS policies to streamlining arduous IT tasks, and enable users to be more productive using technology.

  • CheckPoint CloudGuard Code Security (Spectral)

    BYTES SOFTWARE SERVICES LIMITED

    CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use. With Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations. bssgc

  • Yeti Real-Time Anomaly Detection

    BLUE HAT ASSOCIATES LIMITED

    Yeti is a cloud data platform for clients to analyse time series data in real time and flag anomalies. It's a series of Open Source software libraries we have developed to rapidly prototype Machine Learning solutions.

  • Nerdio Manager for AVD - (simplify, automate, and optimise use of AVD)

    HOWELL TECHNOLOGY GROUP LIMITED

    Nerdio Manager for AVD (Azure Virtual Desktop) is a management platform designed to enhance and simplify the deployment, administration, and scaling of Azure Virtual Desktop environments. Accelerate deployment, minimize costs, and reduce complexity of cloud-delivered Windows and Windows applications. Save up to 80% on Azure costs and deployment time

  • TAK Server Federation

    ROWDEN TECHNOLOGIES LTD.

    Rowden's TAK Server Federation service seamlessly connects TAK servers across agencies, organisations, and borders, ensuring secure, scalable, and sovereign data exchange. With VPN integration and FedHub access, it facilitates robust inter-organisational and inter-country operations, enhancing coordination and situational awareness across government entities. Accredited to OFFICIAL-SENSITIVE.

  • Trustmarque Palo Alto Cortex XDR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • KnowBe4 - Email Phishing and Security Awareness Training

    SOMERFORD ASSOCIATES LIMITED

    KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.

  • Occamsec InCenter Penetration Testing, Threat Hunting Platform.

    Barrier Networks

    Incenter SaaS platform : continuous penetration-testing, automation and human testers, continually test for vulnerabilities in applications, infrastructure and software. Penetration-Testing: Ethical hacker team providing penetration testing to find vulnerabilities and risk. Threat Hunting: Consulting looking for IOC within organisation. "Teaming": Assessing attack vectors (Red), Defensive team (Blue) and mix (Purple)

  • AvePoint Policies and Insights for Microsoft 365 Management

    Essential Computing

    AvePoint Policies & Insights for Microsoft 365 helps to find, prioritise, and fix permissions, membership, and configuration issues across your workspaces. Monitor Microsoft 365 objects, including Teams, Groups, users, SharePoint, and OneDrive. Get control over your content, external sharing, and settings

  • GenAI-Powered Sentiment Analysis Platform

    DATASUMI LTD

    Our Sentiment Analysis Platform, driven by advanced Generative AI technology, provides a refined approach for evaluating public sentiment, feedback, and social media data designed explicitly for government programs. This platform offers vital insights for improving reputation management and enhancing public engagement strategies.

  • Log Management ( FortiAnalzyer)

    FULLPROXY LIMITED

    FortiAnalyzer is a centralized logging, analytics, and reporting appliance. It's designed to provide organizations with comprehensive visibility into their network security infrastructure. It collects, analyzes, and correlates log data from Fortinet security devices, including firewalls, switches, access points, and more, to help organizations monitor and manage their security posture effectively.

  • Dynamics 365 and PowerPlatform Business Value Assessment ROI Build

    VE3 GLOBAL LTD

    VE3 introduces the Business Value Assessment ROI Navigator, meticulously crafted to assist in formulating, strategizing, and implementing business transformation endeavors. Comprising a structured three-stage process encompassing Envisioning, Business Value Assessment, and Solution Assessment, this tool is tailored to equip you with insights and preparedness for navigating disruptive changes.

  • Forescout Cyber Assurance

    Cyberlab

    With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.

  • Indoor Air Quality Monitoring with IoT and AI Powered Digital Twin

    SmartViz Ltd

    Enhance Air Quality with SmartViz’s IoT and AI-powered digital twin Using low cost IoT sensors and integration with occupancy monitoring, BMS and energy management, SmartViz delivers real-time monitoring, trend analysis and predictive models to boost building performance. Improve productivity and wellbeing. Optimise space. Reduce energy. Save cost. Achieve Net Zero.

  • Atlassian Managed Services

    Adaptavist UK Services LTD

    Adaptavist Managed Services Premium is a support service for Atlassian software products, such as Jira, Confluence, and Bitbucket, in an Adaptavist hosted environment or in a client's private cloud, with service delivery manager, monitoring, backups, and SLA. Adaptavist can provide training, add-on development, licensing, and professional services including migration.

  • ALVAO Service Desk

    ALVAO s.r.o.

    ALVAO is an ITSM solution fully integrated with Microsoft 365. Service Desk is a friendly interface for requesters with a Microsoft look and feel - possibly even without leaving their MS Teams or Outlook client. A powerful tool implementing ITSM best practices for internal IT services teams.

  • Security Detection and Visibility (SIEMaaS) as a service

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution

  • E-Surveys and Feedback

    Leicestershire Health Informatics Service

    On line responsive mobile friendly real time surveys for data collection, feedback forms; suitable for service users, patient and staff, such as Friends and Family Test, Patient Experience; Equality and Diversity Monitoring, Service and Customer Satisfaction, Organisational Performance, for Continuous Improvement and Quality, Internet and Intranet / Secure Encrypted Forms

  • Sophos Firewall

    PHOENIX SOFTWARE LIMITED

    XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Adepsi Legacy Call and Cloud Telephony Platform by SVL

    SVL Business Solutions Ltd

    Adepsi is a legacy data solution that imports and stores audio and meta-data from various different voice recording platforms, providing replay functionality on a simplified, supportable platform running on a highly resilient AWS infrastructure. Once imported, the source legacy platform can be decommissioned and all data is safe and searchable.

  • Splunk Observability Suite

    BYTES SOFTWARE SERVICES LIMITED

    "Splunk Observability allows organisations to solve problems in seconds with the only full-stack analytics-powered and OpenTelemetry-Native Observability Solution. Explore user experience, troubleshoot issues, remediate and more! Consists of Splunk Infrastructure Monitoring (SIM), Application Performance Monitoring (APM), Real User Monitoring (RUM), Splunk Synthetic Monitoring (SSM), IT Service Intelligence (ITSI). bssgc

  • Shadow Data Security Posture Management Monitoring

    DIEGESIS LIMITED

    Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.