Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

669 results found

669 results found in Lot 2: Cloud software in the category Log management

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Altia Covert Operations Solution (ACOS) Source Management

    ABM Intelligence Limited

    ACOS manages all RIPA/IPA authorities and activities. Source Management relates to the recruitment and management of Covert Human Intelligence Sources (CHIS). Centralised location (database) manages: pre-approach, recruitment, registration, Authorisation, reviews, policy logs, contacts, rewards, risk, intelligence (sanitised / unsanitised), deconfliction, compromise, tasking, performance indicators, and all associated activities

  • BeyondTrust Identity Security Insights

    Softcat Limited

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Altia Covert Operations Solution (ACOS) Surveillance Authorities

    ABM Intelligence Limited

    ACOS offers a comprehensive tool for the management of applications for Directed Surveillance, Intrusive Surveillance, Property Interference, Combined (Intrusive and Property) Surveillance and TEI Warrants (all written and urgent). With easy workflow and compliance with RIPA, IPA, Police Act, GDPR, FOIA and HRA this module ensures legislative compliance.

  • CrowdStrike Falcon Next Generation SIEM

    BT PLC

    CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Cybereason EDR Licences

    MONDAS CONSULTING LTD

    Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.

  • Computacenter - Palo Alto Cortex XSIAM

    Computacenter (UK) Ltd

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Keyfactor Command

    UNSUNG LIMITED

    Manage & automate digital/TLS certificates in cloud, on-premise & hybrid environments with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • Cloud SaaS services

    BASEEL PARTNERS LLP

    Baseel Partners LLP can offer various products in the areas of risk management, security, IT Management, business process, IT governance, and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS.

  • StarTraq Dome for Traffic Enforcement

    StarTraq Limited

    A browser-based solution used to process any traffic or environmental offence, fine, PCN, permit or licence. Consisting of a back-office system and smartphone app, it provides: full case management, automated workflow, document management, batch scanning, batch printing, template management, reporting, payment collection and appeals management.

  • Varonis SaaS Data Security Platform

    Phoenix Software Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • MTI- Cyber Security

    MTI Technology Ltd

    MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected. Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.

  • Quest On-Demand

    Bytes Software Services

    A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc

  • Lepide Data Security Platform

    Softcat Limited

    It enables user to subscribe and use the service as SaaS application. This will help users to analyze permissions on SharePoint Online server objects.

  • Active Wolf Managed Security Platform

    XTRAVIRT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • CrowdStrike Falcon Cloud Security

    Softcat Limited

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Netwrix Privilege Secure

    INTEGRITY360 LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.

  • Graylog Security Cloud

    Cloud 21 Limited

    Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Graylog to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Graylog Cloud Security as a service.

  • Digital IoT Tracking and Resource Management

    ishelp.co.uk Ltd

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • MTI Managed Microsoft Defender for Endpoint (MDE) / (XDR)

    MTI Technology Ltd

    We provide a fully Managed Microsoft Defender Service, monitored by our 24x7x365 UK SOC using SC cleared SecOps analysts. We fully configure your Microsoft Defender deployment, to prevent attacks, detect, analyse, and respond to alerts and security issues using the Defender tooling.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • MTI Trend Micro Vision One

    MTI Technology Ltd

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • AppealsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    AppealsPro is a fully-hosted, cloud-based, legislatively compliant, school appeals management solution that enables Appeal Clerks to administer school admission appeals (including Grammar schools), exclusion reviews and transport appeals. The system also comes with a fully integrated Appellant Portal, School Portal and an optional Panellist Portal (for sending Panel Packs securely).

  • Generative AI for Enterprise with Amazon Q

    DATASUMI LTD

    Datasumi elevates your business by leveraging the power of generative artificial intelligence (AI) through Amazon Q Business. Our all-encompassing training and consulting service, Q Insights, is committed to assisting you in realising the complete value of this innovative technology.

  • Cloud software

    Mentz GmbH

    As a software provider for public transport related solutions, MENTZ provides applications into cloud based environments. These are used by public sector organisations such as Local Transport Authorities, Public Transport Executives, County and City Councils to plan their timetables and provide Journey Planner information for their users.

  • ComplaintsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.

  • BT Managed Endpoint Security CrowdStrike

    BT PLC

    The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.

  • AI for Cybersecurity to Detect Threat Formation

    Ve3 Global Ltd

    The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.

  • Income Management and Enterprise Cash Receipting

    Digital Modus Ltd

    Digital Modus Supplier Relationship Manager (SRM) simplifies and automates contract management from initiation through renewal, ensuring compliance and optimising negotiation outcomes. Utilise dynamic dashboards to monitor supplier performance metrics in real-time, ensuring compliance with SLAs, KPI Tracking and continuous improvement. Ensure transparency and compliance with procurement legislation and best practices.

  • Cloud Red Teaming Services

    SALUS DIGITAL SECURITY LIMITED

    Red Teaming is the process of using Tactics, Techniques, and Procedures (TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.