Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

661 results found

661 results found in Lot 2: Cloud software in the category Log management

  • Netwrix PolicyPak

    Softcat Limited

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • Netwrix Enterprise Auditor

    INTEGRITY360 LIMITED

    Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.

  • Real Time Data Broker and Prediction Engine System (RTPI) using SIRI VM SM

    R2P Systems UK Ltd

    RTPI is for users, purchasers and providers of public transport. r2p provide RTPI management tools via our back office, such as single journey cancellations and long-term major diversions (for LED's, TFT displays etc). RTPI includes disruption information, open data management and dissemination systems for Public Transport Real Time Journey Information.

  • Interneuron RPA - Provisioning and Leavers Automation

    Interneuron Ltd

    Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.

  • MTI Trend Micro Cloud Application Security -CAS

    MTI Technology Ltd

    Trend Micro Cloud App Security protects incoming and internal emails from Microsoft 365 and Gmail™ against advanced malware and other threats. It also enforces compliance on other cloud filesharing and collaboration services, including Box, Dropbox, Google Drive™, Microsoft SharePoint online, Microsoft OneDrive for business, and Microsoft Teams.

  • Netwrix Auditor

    Softcat Limited

    Netwrix Auditor is a powerful platform designed to enhance security and compliance by providing comprehensive visibility into IT infrastructure changes and data access. It enables real-time monitoring, auditing, and reporting across a variety of systems, applications, and files, helping organizations ensure data integrity and regulatory compliance.

  • ManageEngine Site24x7: AI-powered monitoring and observability platform for modern IT

    Zoho Corporation Limited

    ManageEngine Site24x7 is an AI-powered observability platform for DevOps and IT operations. The cloud-based platform’s broad capabilities help predict, analyse, and troubleshoot problems with end-user experience, applications, microservices, servers, containers, multi-cloud, and network infrastructure, all from a single console. With intelligent alerting and zero false positives, users achieve 100% uptime.

  • Security Services

    Espire Infolabs Ltd

    Espire helps companies to re-engineer their application landscape for seamless interoperability and interaction between disparate systems. Espire provides effective strategies and solutions against security and compliance challenges based on the industry's standards and all cloud platforms (IaaS ,SaaS, and PaaS environment). Espire provides SOC Consulting, Implementation and Managed services.

  • PiX Image Transfer User Pack

    Design IT Solutions (Trading as Panoptech)

    PiX is a combination of a secure mobile application and server solution, facilitating the secure transfer of imagery from a team on the ground, back into an organisation, with the ability to distribute notifications back out to the team, to enable them view new images.

  • TRUSTMARQUE TREND MICRO ONE PRODUCT SUITE

    Trustmarque Solutions Limited

    Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.

  • AvePoint EnPower for Microsoft 365

    Softcat Limited

    As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.

  • Okta - Identity Access (IAM) Single Sign-On, Multi-factor Authentication, Lifecycle Management

    Somerford Associates Limited

    Okta is a leading identity and access management solution providing single-sign on, multi-factor authentication and provisioning capabilities for all applications. Okta is the foundation for secure connections between people & technology. Using identity information to grant access to applications on any device at any time, enforcing strong security protection.

  • Computacenter - Palo Alto Cortex XSOAR

    Computacenter (UK) Ltd

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • CheckPoint Harmony Endpoint

    Bytes Software Services

    Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response. bssgc

  • SonicWall NSv SERIES VIRTUAL FIREWALL

    Softcat Limited

    The SonicWall NSv Series virtual firewall offers you all the security advantages of a physical firewall with the operational and economic benefits of virtualization. NSv shields all critical components of your private/public cloud environments from resource misuse attacks, cross-virtual-machine attacks, side-channel attacks and common network-based exploits and threats.

  • Wallix Privileged Access Management (PAM)

    IP Performance Limited

    Controlling Access to target resources and applications. Monitor all user sessions. Manage and rotate account passwords. Just-In-time access and application usage. Implement zerotrust methodology

  • Barracuda WAF-as-a-Service

    MISCO TECHNOLOGIES LIMITED

    Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda WAF can defeat today’s most sophisticated attacks.

  • Complete Project Management and Collaboration toolset

    adappt

    A smart and simple user-friendly application. The dynamic features of the product provide a scalable solution to several business modules. The Agile business task manager caters for an easily understandable activity management control system. An efficient time evaluator, progress tracker, enables adding multiple tasks in an organised manner.

  • EVOLVE Purchase to Pay

    Elcom Systems Ltd

    Full purchase to pay process covering requisition, purchase order, receipting, invoicing, payment and returns. Advanced workflows enable effective budget management and create back office efficiencies, control costs and give full transparency. Reporting and analytics tailored to your requirement and integration to 3rd party systems including ERP, Finance, Catalogues and Inventory

  • Logit.io Auditing Compliance Package

    Logit.io

    The Logit.io platform makes logging, metrics and tracing analysis easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Datto Backup and Disaster Recovery As a Service (BaaS, DRaaS)

    QUADRIS LIMITED

    Quadris and Datto work together to provide an industry leading hybrid on-premise and cloud DR and backup solution. An on-premise backup appliance backups up locally, but also syncs this data to a different data centre, this same backup job can be booted live in a DR event.

  • IT Helpdesk Case Management System

    Claritas Solutions Ltd

    Empowers users to have complete control of their IT Helpdesk Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • CrowdStrike Falcon EDR

    BT PLC

    Falcon Insight XDR, an EDR solution, delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.

  • Cisco Enterprise Networking, DNA and Enterprise Agreements by ITGL

    ITGL Limited

    Services to cover all Cisco Enterprise Network Software including DNA Essentials/Advantage/Premium Software, Catalyst Centre Software, Identity Services Engine Software, Enterprise Agreements 3.0 and Cisco Spaces.

  • Edge Health Data Analytics and Software Hub (DASH)

    Edge Health Ltd

    Edge Data Analytics and Software Hub (DASH) is our cloud-powered solution that can be tailored to requirements. Our DASH can be built bespoke for as variety of use cases ranging from data ingestion, curation and storage, to interactive dashboards with predictive and prescriptive analytics solutions.

  • Arctic Wolf Managed Security Operations

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.

  • Trend Micro One

    Bytes Software Services

    Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location. bssgc

  • Vidatum Academic

    Vidatum Ltd

    Vidatum Academic offers a full Research Management System offered in modules from pre- award to post-award stages, including ethical reviews and Export Control, Researcher profiles, outputs, and impact tracking with optional research portal. Vidatum Timesheets covers timesheet compliance for research projects. All modules are supported with a robust reporting console.

  • Endpoint Security - EPDR (Endpoint Protection, Detection and Response)

    Redinet Ltd

    WatchGuard EPDR is a cybersecurity solution for computers and servers that combines a range of endpoint protection with EDR capabilities. It protects against advanced threats, zero-day malware, ransomware, phishing and malware-less attacks and URL & content filtering capabilities. EPDR automates the prevention, detection, containment, and response actions for ultimate security.

  • Barrier Networks Security Information Event Management (SIEM) (Fortinet FortiSIEM)

    Barrier Networks

    Leveraging Fortinet’s FortiSIEM and FortiSOAR, the Protective Monitoring and Automated Remediation solution offers users deep multivendor integration for configuration, change management, log collection & correlation, and Indicators of Compromise to detect and contextualise threats in real-time. Automated remediation through playbooks provides a seamless mitigation capability to security teams.