Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

682 results found

682 results found in Lot 2: Cloud software in the category Log management

  • Delinea Platform - Privileged & Identity Access Management (PIM & PAM)

    Barrier Networks

    Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.

  • Logpoint Converged SIEM and SOAR

    ARMADILLO SEC LTD

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.

  • Human Risk Management & Mitigation, Phishing Simulation, Security Awareness Training & DMARC

    Lloyds Ventures

    HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.

  • Security Operations for CryptoSpike as a service

    Proact IT UK Limited

    Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:

  • Maxcourse

    MAXINITY SOFTWARE LIMITED

    Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.

  • SolarWinds User Device Tracker (UDT) License

    Prosperon Networks Ltd

    SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.

  • e2e Cloud Protective Monitoring XDR SOC Service

    e2e-assure Ltd

    SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography

  • Computacenter - Trend Micro One

    Computacenter (UK) Ltd

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.

  • Altia Covert Operations Solution (ACOS) Source Management

    ABM Intelligence Limited

    ACOS manages all RIPA/IPA authorities and activities. Source Management relates to the recruitment and management of Covert Human Intelligence Sources (CHIS). Centralised location (database) manages: pre-approach, recruitment, registration, Authorisation, reviews, policy logs, contacts, rewards, risk, intelligence (sanitised / unsanitised), deconfliction, compromise, tasking, performance indicators, and all associated activities

  • BeyondTrust Identity Security Insights

    SOFTCAT PLC

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. https://www.beyondtrust.com/products/identity-security-insights

  • Altia Covert Operations Solution (ACOS) Surveillance Authorities

    ABM Intelligence Limited

    ACOS offers a comprehensive tool for the management of applications for Directed Surveillance, Intrusive Surveillance, Property Interference, Combined (Intrusive and Property) Surveillance and TEI Warrants (all written and urgent). With easy workflow and compliance with RIPA, IPA, Police Act, GDPR, FOIA and HRA this module ensures legislative compliance.

  • CrowdStrike Falcon Next Generation SIEM

    BT PLC

    CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Cybereason EDR Licences

    MONDAS CONSULTING LTD

    Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.

  • Computacenter - Palo Alto Cortex XSIAM

    Computacenter (UK) Ltd

    Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents

  • Keyfactor Command

    UNSUNG LIMITED

    Manage & automate digital/TLS certificates in cloud, on-premise & hybrid environments with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.

  • Cloud SaaS services

    BASEEL PARTNERS LLP

    Baseel Partners LLP can offer various products in the areas of risk management, security, IT Management, business process, IT governance, and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS.

  • StarTraq Dome for Traffic Enforcement

    StarTraq Limited

    A browser-based solution used to process any traffic or environmental offence, fine, PCN, permit or licence. Consisting of a back-office system and smartphone app, it provides: full case management, automated workflow, document management, batch scanning, batch printing, template management, reporting, payment collection and appeals management.

  • Varonis SaaS Data Security Platform

    PHOENIX SOFTWARE LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • MTI- Cyber Security

    MTI TECHNOLOGY LIMITED

    MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected. Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.

  • Quest On-Demand

    BYTES SOFTWARE SERVICES LIMITED

    A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc

  • Lepide Data Security Platform

    SOFTCAT PLC

    It enables user to subscribe and use the service as SaaS application. This will help users to analyze permissions on SharePoint Online server objects.

  • Active Wolf Managed Security Platform

    XTRAVIRT LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • CrowdStrike Falcon Cloud Security

    SOFTCAT PLC

    Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.

  • Netwrix Privilege Secure

    INTEGRITY360 LIMITED

    Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.

  • Graylog Security Cloud

    CLOUD 21 LIMITED

    Delivering our focused cyber security services to the NHS and healthcare, we work in partnership with Graylog to offer licensing, renewals, initial discovery/readiness, solution design, migration/adoption, support/optimisation and management of their Graylog Cloud Security as a service.

  • Digital IoT Tracking and Resource Management

    ISHELP.CO.UK LIMITED

    ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.

  • MTI Managed Microsoft Defender for Endpoint (MDE) / (XDR)

    MTI TECHNOLOGY LIMITED

    We provide a fully Managed Microsoft Defender Service, monitored by our 24x7x365 UK SOC using SC cleared SecOps analysts. We fully configure your Microsoft Defender deployment, to prevent attacks, detect, analyse, and respond to alerts and security issues using the Defender tooling.

  • Cisco Umbrella Cloud Service

    QUADRIS LIMITED

    Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.

  • MTI Trend Micro Vision One

    MTI TECHNOLOGY LIMITED

    Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk. Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR

  • AppealsPro

    FCS SOFTWARE SOLUTIONS LIMITED

    AppealsPro is a fully-hosted, cloud-based, legislatively compliant, school appeals management solution that enables Appeal Clerks to administer school admission appeals (including Grammar schools), exclusion reviews and transport appeals. The system also comes with a fully integrated Appellant Portal, School Portal and an optional Panellist Portal (for sending Panel Packs securely).