Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

667 results found

667 results found in Lot 2: Cloud software in the category Log management

  • CrowdStrike Falcon Exposure Management

    SOFTCAT PLC

    CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.

  • Crowdstrike Falcon Exposure Management Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Falcon Exposure Management licences to utilise the power of the Crowdstrike Falcon Exposure Management AI- powered platform for vulnerability management. Crowdstrike Falcon Exposure Management helps security teams complete vulnerability management programs through the entire lifecycle.

  • Check Point Harmony Mobile

    INTEGRITY360 LIMITED

    A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.

  • Kiosk design and development

    MTC MEDIA LIMITED

    mtc provides a full service digital design and development service agency providing a range of specialist services. Our kiosk user interface design and development service is aimed at independent theatre, cinema, and visitor attractions, using Spektrix as their ticket fulfilment and CRM software provider.

  • Cynet360

    INTEGRITY360 LIMITED

    Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.

  • COOLSPIRiT a Databarracks Company: Arctic Wolf Managed Security Operations

    COOLSPIRIT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response

  • Software Licensing

    DBAAS LTD

    We specialize in cloud software licensing solutions, ensuring compliance and cost optimization. Our skilled team assists in selecting ideal licensing models, managing licenses across various cloud platforms, and maximizing software value.

  • Computacenter - CrowdStrike Falcon Data Protection

    COMPUTACENTER (UK) LIMITED

    Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.

  • AppyHive for Education

    APPYHIVE LTD.

    Cloud-based service platform delivering secure, scalable, native mobile apps for educational institutions. Custom-branded, modular and fully tailored to your school’s identity, needs, and growth over time, reflecting the culture, branding, and unique operational needs. Apps are published on your behalf on both Apple App Store and Google Play as standard.

  • Estate & Housing Management

    RAPID INFORMATION SYSTEMS LIMITED

    Our solution enhances Estate and housing quality within the public sector. It prioritises safety, security, and property condition, benefiting Care Takers, Inspection Officers, and Residents. By reducing inspection costs and improving transparency, it is a valuable tool for Local Authorities.

  • Camunda software licenses and professional services

    Agile Business Process UK Limited

    Camunda enables organisations to orchestrate, design and improve processes across people, systems and devises to continuously overcome complexity to increase efficiency, such as automation, standardization and improve compliance. Integrating into the major RPA vendors, Low-code platforms and enterprise applications.

  • Database application

    OMDA HEALTH ANALYTICS LIMITED

    Cloud-based database web application for medical studies, trials and registers.

  • Business Operations Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Forcepoint Next Generation Firewall (NGFW)

    SAPPHIRE TECHNOLOGIES LIMITED

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • SEP2.security Managed Detection & Response (MDR)

    SEP2 LIMITED

    SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.

  • Logit.io Logging as a Service and Observability

    LOGIT.IO LTD

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Entity Resolution Driven Data Analysis And Exploitation Service

    DATA-EDGE ANALYTICS LTD

    The service provides a single view of an entity. It resolves entities (organisations/people/objects) from records, at scale, in real time, with full 'explainability'. The system incorporates data transformation, pipelines, ingestion, storage, alerting, entity analysis, graphing and visualisation tools for users. The system feeds downstream analysis systems.

  • MTI Palo Alto Networks

    MTI TECHNOLOGY LIMITED

    (Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls). Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.

  • Crowdstrike Falcon Next gen SIEM Licences

    MONDAS CONSULTING LTD

    Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    BARRIER NETWORKS LIMITED

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Security Operations for CryptoSpike as a service

    PROACT IT UK LIMITED

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Maxcourse

    Maxinity

    Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.

  • SolarWinds User Device Tracker (UDT) License

    PROSPERON NETWORKS LTD

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    E2E-ASSURE LIMITED

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • Computacenter - Trend Micro One

    COMPUTACENTER (UK) LIMITED

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Altia Covert Operations Solution (ACOS) Source Management

    ABM INTELLIGENCE LIMITED

    ACOS manages all RIPA/IPA authorities and activities. Source Management relates to the recruitment and management of Covert Human Intelligence Sources (CHIS). Centralised location (database) manages: pre-approach, recruitment, registration, Authorisation, reviews, policy logs, contacts, rewards, risk, intelligence (sanitised / unsanitised), deconfliction, compromise, tasking, performance indicators, and all associated activities

  • BeyondTrust Identity Security Insights

    SOFTCAT PLC

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Altia Covert Operations Solution (ACOS) Surveillance Authorities

    ABM INTELLIGENCE LIMITED

    ACOS offers a comprehensive tool for the management of applications for Directed Surveillance, Intrusive Surveillance, Property Interference, Combined (Intrusive and Property) Surveillance and TEI Warrants (all written and urgent). With easy workflow and compliance with RIPA, IPA, Police Act, GDPR, FOIA and HRA this module ensures legislative compliance.