Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

671 results found

671 results found in Lot 2: Cloud software in the category Log management

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IBM Watsonx Generative AI licenses, support and associated solutions

    Agile Business Process UK, LIMITED

    Watsonx is a set of AI solutions, whether customer AI or off-the-shelf AI, designed to help you scale and accelerate the impact of AI. Watson X is an AI and data platform with Gen AI and a set of AI assistants, helping with the proliferation of AI.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    TRUSTMARQUE SOLUTIONS LIMITED

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Quest On Demand

    Advania

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Ingentive Windows 365

    INGENTIVE LIMITED

    Ingentive offers comprehensive integration of Microsoft Windows 365, delivering a streamlined, secure, and cloud-based desktop solution. Designed to optimise productivity and adaptability for contemporary, dispersed teams, our service ensures a seamless user experience in the ever-evolving landscape of remote work.

  • Portals on Dynamics 365

    Formus Professional Software

    FormusPro is a certified Microsoft Partner who specialises in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • SharePoint Application Development - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    SharePoint is an open platform that allows for many different technologies to be applied that will enhance business value through custom, tailored applications.

  • Software as a Service and Security as a Service (SaaS)

    BOM Group Ltd

    Whether it be network/Application monitoring or securing physical or data assets in hybrid environments, BOM has the knowledge and partners to ensure the buyer leverages the most suitable tool(s) to suit their needs. Technical architects can advise on which software/hardware is fit for purpose based on the buyers requirements.

  • Computacenter - Palo Alto Cortex XDR

    Computacenter (UK) Ltd

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • BeyondTrust Privileged Password Management Password Safe Cloud

    SOFTCAT PLC

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.