Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

684 results found

684 results found in Lot 2: Cloud software in the category Log management

  • Netwrix StealthINTERCEPT

    SOFTCAT PLC

    Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.

  • Logpoint Converged SIEM and SOAR

    CYBERLAB CONSULTING LTD

    Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.

  • Cyber Vulnerability Research

    LEIDOS INNOVATIONS UK LTD

    The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.

  • Customer Relationship Management Service

    Viewdeck Consulting Limited

    Our Customer Relationship Management Service offers a comprehensive suite of features designed to streamline your client interactions and boost productivity. With tools for contact management, task tracking, and analytics, you can effectively nurture leads, enhance communication, and drive sales. Experience enhanced efficiency and improved communication, with our customisable CRM solution.

  • Computacenter - Proofpoint CASB

    Computacenter (UK) Ltd

    Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.

  • MTI Hybrid Datacenter- Rationalisation & Migration

    MTI TECHNOLOGY LIMITED

    MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.

  • Falcon Endpoint Detection & Response (EDR)

    Computacenter (UK) Ltd

    Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • HCLTech Domino + Domino Volt

    HCL TECHNOLOGIES UK LIMITED

    A rapid application development platform that enables easy assembly of low code applications. Its proven and competent security model keeps data secure, both on local clients, in transit and on servers. Domino Volt - An agile, easy-to-use, low-code development platform that creates web applications for data collection and process automation.

  • Microsoft Cloud App Security

    VE3 GLOBAL LTD

    Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.

  • Inoapps Customer Billing Management

    INOAPPS LIMITED

    Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Foglight (All products)

    Sandhill Consultants Ltd

    Proactively monitor the health and performance of all your database platforms with a robust database monitoring tool. With Foglight for Databases, DBAs gain unprecedented visibility across their database platforms. From one simple-to-use console, they can quickly diagnose and resolve emerging issues to prevent business interruption.

  • ETL Framework for Analytics

    SIMPSON ASSOCIATES INFORMATION SERVICES LIMITED

    Why waste precious time, money, and resource on setting up your Azure environment, when all the hard work has already been done for you? Our ETL Framework Accelerator has been designed to speed up the development through automation, speeding up the process, so your business can get to insights quicker.

  • altIAM - Identity and Access Management

    ALTIATECH LTD

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IBM Watsonx Generative AI licenses, support and associated solutions

    Agile Business Process UK, LIMITED

    Watsonx is a set of AI solutions, whether customer AI or off-the-shelf AI, designed to help you scale and accelerate the impact of AI. Watson X is an AI and data platform with Gen AI and a set of AI assistants, helping with the proliferation of AI.

  • TRUSTMARQUE TREND MICRO ONE SOFTWARE

    TRUSTMARQUE SOLUTIONS LIMITED

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • Quest On Demand

    Advania

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Ingentive Windows 365

    INGENTIVE LIMITED

    Ingentive offers comprehensive integration of Microsoft Windows 365, delivering a streamlined, secure, and cloud-based desktop solution. Designed to optimise productivity and adaptability for contemporary, dispersed teams, our service ensures a seamless user experience in the ever-evolving landscape of remote work.

  • Portals on Dynamics 365

    Formus Professional Software

    FormusPro is a certified Microsoft Partner who specialises in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • SharePoint Application Development - CoreGov

    CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED

    SharePoint is an open platform that allows for many different technologies to be applied that will enhance business value through custom, tailored applications.

  • Software as a Service and Security as a Service (SaaS)

    BOM Group Ltd

    Whether it be network/Application monitoring or securing physical or data assets in hybrid environments, BOM has the knowledge and partners to ensure the buyer leverages the most suitable tool(s) to suit their needs. Technical architects can advise on which software/hardware is fit for purpose based on the buyers requirements.

  • Computacenter - Palo Alto Cortex XDR

    Computacenter (UK) Ltd

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • BeyondTrust Privileged Password Management Password Safe Cloud

    SOFTCAT PLC

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.