Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

667 results found

667 results found in Lot 2: Cloud software in the category Log management

  • Bespoke Software Development

    CREALIS LABS LTD

    Crealis Labs is a digital technology firm producing advanced software systems, throughout their whole lifecycle: planning, analysis, development, deployment and maintenance. Whether you need to upgrade your outdated systems, integrate your data sources, combine your software solutions, connect your applications, or build bespoke solutions, we deliver smarter & faster solutions.

  • Trustmarque Quest On Demand

    TRUSTMARQUE SOLUTIONS LIMITED

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT/Partners/MSPs move faster, tighten security and control hybrid Office365 environments. Migrate, manage, report, secure and recover hybrid AD/Office 365 workloads across all tenants from a single dashboard. One-stop platform for secure SaaS solutions for Office365 migration, management, security.

  • Nexus Managed M365 Defender Endpoint Security

    NEXUS OPEN SYSTEMS LIMITED

    Nexus Managed M365 Defender Endpoint Security gives your organisation the latest best in class Anti-Virus Endpoint Security and Email Security without the headache. The service is built around a simple per device per month cost. Updates and upgrades included.

  • Neo Technology Cloud Optimisation Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Cloud Optimisation Solutions empower organisations to maximise the efficiency and value of their public cloud environments, including Microsoft Azure, AWS, and Google Cloud Platform. Gain control over cloud spending, enhance governance, mitigate risks, and amplify the value derived from cloud deployments.

  • Cyber Security Awareness Training as a Service

    SCG CORPORATE LIMITED

    Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. KnowBe4 as a service is the world’s most popular integrated platform for awareness training combined with simulated phishing attacks and complete outsourced management makes SCCS a leading provider in cybersecurity awareness training.

  • Varonis SaaS Data Security Platform

    CYBANETIX LIMITED

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Neo Technology Data Insights and Analytics Strategy Service

    NEO TECHNOLOGY LIMITED

    Neo Technology's Data Insights and Analytics Strategy Service offers tailored recommendations to enhance your organisation's data capabilities. We provide strategic guidance on operating models, technology solutions, and skill development to integrate data analytics into your digital strategy effectively. Our roadmap ensures incremental value delivery and cost-effective analytics development.

  • Akamai Software Services

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Data & Analytics in Local Government

    VE3 GLOBAL LTD

    In collaboration with Xantura,VE3 offers analytics-driven insights and facilitates proactive intervention to enhance outcomes. Our accredited and established solution, OneView,empowers organizations to securely harness growing amounts of citizen data. It automates case summaries, provides a unified view,utilizes predictive models to identify individuals at risk, and comprehends trends and demand drivers.

  • Akara Cloud

    Akara Robotics

    Akara Cloud is a room management and analytics platform. It provides a web-based dashboard where hospital administrators and other key management stakeholders can access data and actionable insights on a range of key operational metrics, such as room turnaround, to help them to improve operational efficiency, clinical workflow and quality.

  • Check Point Harmony Endpoint

    LRQA

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.

  • Akamai Akamai Cloud Computing

    SOFTCAT PLC

    Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

  • Barracuda Endpoint XDR

    SCG CORPORATE LIMITED

    Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources

  • Mydex Safe, Secure Cloud for service integration and tranformation (SSC)

    MYDEX DATA SERVICES COMMUNITY INTEREST COMPANY

    The need for transformation to locally integrated operational services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. The SSC allows organisations across varying sectors and regulatory environments, working together to deliver joined-up services.

  • Lifebit Platform: Cloud-Based Trusted Research Environment

    LIFEBIT BIOTECH LIMITED

    Lifebit Trusted Research Environment (TRE),Trusted Data Lakehouse, TrustOps (Airlock, DRTC) are secure computing environments for researchers to remotely access large-scale biomedical data. The Lifebit Platform allows researchers, teams and large organisations to collaboratively and securely access, manage and analyse large-scale biomedical data over cloud environments or hybrid infrastructures (HPC-Cloud).

  • Rapid7 Managed Threat Complete - Managed SIEM/SOC and Vulnerability Management

    ITHQ LTD

    Rapid7’s MTC managed service - prepare for, detect, and respond to threats in your environment. Rapid7 supports your team to accelerate your proactive, responsive, and strategic security maturity and extend your security operations by providing customised security guidance and hands-on 24x7x365 monitoring, threat hunting, incident response, and exposure management.

  • Altia Covert Operations Solution (ACOS) Undercover Operations

    ABM INTELLIGENCE LIMITED

    Altia Covert Operations Solution (ACOS) for managing undercover operations. Providing management of authorities and risk assessments, psychometric assessments, legend building, online work, deployments, compromise, and resulting intelligence for dissemination. CCA, RIP(S)A, IPA, GDPR, HRA compliant. ACOS provides a solution, managing covert activities from authority to cessation including RRD compliance.

  • Track Record Facilities

    JACOBS U.K. LIMITED

    Many customers managing building data need to comply with the Building Safety Act. Budget restrictions and need for a “digital golden thread” drives businesses to seek efficiencies and tools to digitisation. Track Record is a configurable, auditable, user-friendly web-based and mobile app solution used to demonstrate statutory and regulatory compliance.

  • Activtrak - Compliance, Security and Productivity

    Glemnet Ltd

    ActivTrak is a workforce productivity and analytics application that helps organizations understand how and what people do at work. Our cloud-based user activity monitoring software provides contextual data and insights that enable mid-market organizations to be more productive, secure, and compliant.

  • USM Anywhere SIEM Licences

    MONDAS CONSULTING LTD

    Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.

  • Barracuda 24X7 O365 Detection & Response

    SCG CORPORATE LIMITED

    Office 365 Security Monitoring is a managed security product that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.

  • Powered by Neo: Advanced Complaints Management

    NEO TECHNOLOGY LIMITED

    Neo Technology's solution revolutionises complaints management, offering features like triage and routing, timeline control, ombudsman engagement tracking, follow-on repairs, a complaints dashboard, and enhanced workflow and action plan tracking for compliance, customer satisfaction, operational efficiency, and data-driven insights.

  • Cribl Stream

    4 DATA SOLUTIONS LIMITED

    Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure. Achieve full control of your data, empowering you to best support your business goals.

  • i-moran Pay

    I-MORAN LTD

    i-moranPay is a cloud software that provides an easy and secure route for small and medium businesses to take payments online without going through the hassle of setting up an e-commerce store before hand.

  • Computacenter - ProofPoint Insider Threat Management

    COMPUTACENTER (UK) LIMITED

    Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.

  • Computacenter - CrowdStrike Falcon Next Gen SIEM

    COMPUTACENTER (UK) LIMITED

    CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.

  • Relationship Management Service

    VIEWDECK CONSULTING LIMITED

    Providing enterprise scale, fully configurable Relationship Management supporting Account Management, Customer Management, Partner management, Contacts, Calendar, Case management, email integration, campaign management, inbound and outgoing calls scheduling and task allocation. Includes reporting, dashboarding, visualisation, Workflow, Billing. Support for Mobile Devices. Secure Vertical Solutions across Local government, Education, NHS Client Base.

  • Office 365 Migration (Quest On Demand)

    OGEL IT LTD

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Splunk Software License

    BRIGHT CONSULTING SERVICES LIMITED

    The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. As Premier Splunk Reseller and Professional Services Partner BRIGHT brings 16+ years of experience and provide E2E solutions for ITOps, Security, Compliance, RiskManagement, Business analytics.

  • Lacework - Cloud Security, Polygraph Data Platform

    SOMERFORD ASSOCIATES LIMITED

    Lacework offers automated anomaly detection providing consistent visibility, context, and security across cloud environments, providing customers with the ability to detect attack activity stemming from known and unknown threats. Lacework uses data and automation facilitating the security of multi-cloud environments, helping customers prioritise risk, so they can innovate with confidence.