Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1085 results found

1085 results found in Lot 2: Cloud software in the category Audit tools

  • Sophos Intercept X Advanced with XDR

    Cyberlab

    Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.

  • Exchange Online Protection

    VE3 GLOBAL LTD

    Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.

  • DocuBot

    VE3 GLOBAL LTD

    DocuBot is an AI-powered extension that integrates with CRM systems and enterprise platforms, providing intelligent conversational access to internal documents. It enhances user engagement, streamlines document retrieval, and boosts operational efficiency through advanced AI-driven natural language processing capabilities.

  • Email Authentication Platform, incorporating SPF, DKIM, DMARC, BIMI, MTA-STS & TLS-RPT.

    Infosec Ventures

    EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program. We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.

  • Permit to Work (PTW) Software

    Ultan Technologies

    Permit to Work (PTW) software enables effortless creation, request, and management of permits for hazardous works. Enhanced visibility ensures effective communication and safety control among stakeholders.

  • Cyber SOC/SIEM as a Service

    ICYBERDEFENCE LIMITED

    The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.

  • PowerConnect for SAP solution and Splunk

    SOMERFORD ASSOCIATES LIMITED

    PowerConnect is certified SAP add-on which can extract high-fidelity, real-time and historical SAP telemetry data ready for analysis and visualisation in Splunk.

  • SafetyQube Environment, Health and Safety (EHS) Software

    Kingsfield Computer Products Ltd

    SafetyQube is a top rated, feature rich, easy to use, customisable and affordable EHS software recommended by >90% of customers. With comprehensive modules available on both desktop and mobile, SafetyQube helps organisations stay safe, efficient and compliant.

  • Computacenter - Proofpoint Security Awareness Training

    Computacenter (UK) Ltd

    Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.

  • Netwrix Stealth Intercept

    SOFTCAT PLC

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Computacenter - IBM WatsonX.Governance

    Computacenter (UK) Ltd

    WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.

  • Sentinel Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.

  • Palo Alto Cortex XSOAR

    SOFTCAT PLC

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Powered by Neo: Offline Functionalities and Mobile App

    NEO TECHNOLOGY LIMITED

    Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.

  • Sophos Firewall

    CHESS ICT LIMITED

    Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.

  • Computacenter - Proofpoint Core P0

    Computacenter (UK) Ltd

    Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.

  • Cloudflare Zero Trust Network Access (ZTNA)

    Cloudflare, Inc.

    Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • NAZAR X Managed SOC Detection and Response

    COMMUNICATE TECHNOLOGY LIMITED

    Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service

  • SAS® Fraud Insights

    SAS SOFTWARE LIMITED

    SAS® Fraud Insights on G-Cloud provides an innovative way of joining massive amounts of data to visualise new patterns and trends across complex fraud and audit typologies. SAS uses its powerful visualisation, data quality and machine learning technologies together with speed-of-thought analysis to find and detect fraud fast at scale.

  • Check Point Harmony Endpoint

    SOFTCAT PLC

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • CDW AvePoint Policies for Microsoft 365

    CDW LIMITED

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • Multi-Agency Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms. Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.

  • Happiest Minds SaaS services

    Happiest Minds Technologies

    We partner with cloud service providers such as AZURE, AWS, and GCP, consult clients to fulfil their needs, and offer the required software subscription services. In addition to advising clients on the best subscription, we also provide additional value-added services that OEM providers may or may not offer.

  • Cloudlake Backup for M365

    AUTODATA PRODUCTS LIMITED

    Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.

  • Check Point Harmony Endpoint

    Charterhouse Voice & Data

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Neo Technology AWS Managed Services

    NEO TECHNOLOGY LIMITED

    Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.

  • Vulnerability Assessment and Intelligence Services as a service (VAaaS)

    Proact IT UK Limited

    Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM Intelligence Limited

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.

  • Digital Experience Analytics SaaS platform

    CONTENT SQUARE LTD

    Outcome: understand service users digital journeys and experience. Our analytics platform analyses billions of digital behaviours, providing session replay, unique metrics, journey maps, visualisations, and recommendations to increase engagement, reduce costs to serve, improve user experience and identify issues / errors / bugs / frustration / fraud.

  • Proact Security Log Management Service (Microsoft Sentinel)

    Proact IT UK Limited

    Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).