Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1087 results found

1087 results found in Lot 2: Cloud software in the category Audit tools

  • Secure Data Environment - SDE

    HITACHI DIGITAL SERVICES UK LIMITED

    Fully integrated, cloud-native solution enabling healthcare research and analytics teams to securely access and collaborate on diverse data sets through tailored, self-service analytics workspaces used for collaborative clinical research and analysis.

  • Trustmarque Logpoint Converged SIEM and SOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to monitor, detect and alert on security events/incidents within an IT environment. It provides a comprehensive/centralised view of infrastructure security posture, activities and automated playbooks in response to events.

  • Charity Case Management System

    CLARITAS SOLUTIONS LIMITED

    Empowers case managers to support customers at every stage of their journey. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.

  • Microsoft 365 Backup

    virtualDCS Ltd

    Backup Microsoft Office 365 data at the click of a button. Our fully browser managed solution provides a feature-rich office 365 backup solution and allows you to be secure in the knowledge that Veeam is protecting your data securely in the UK.

  • NEC Connect SaaS

    NEC SOFTWARE SOLUTIONS UK LIMITED

    NEC Connect SaaS comprises POLE(Person, Object, Location, Events data) Services with core module packages: Investigation, Intelligence, Custody, Case Preparation with optional modules; Mobile, Partner Platform, Public Engagement, Property Management, Digital Asset Management, Inform(facial recognition), Proactive Management Plan, Digital Business Services, BLADE(adaptive data migration), Management Information, Missing Persons and Digital Evidence.

  • Civica Lynx CSG

    CIVICA UK LIMITED

    The Lynx CSG product set is Civica's accredited next generation of PNC gateway which builds on the functionality of earlier generations providing access to multiple services offered by PNC, deployable on desktops, laptops and in-vehicle solutions. Quick set up and easy to use; saving installation costs and reducing training.

  • Focus112 copy

    Focus Data Services Ltd

    Focus Data's design systems tailored for both communication providers and law enforcement agencies, facilitating the streamlined handling of requests, retrieval, and analysis of communication data. Efficiently manage the acquisition of communication data from cellular service providers and transform it into actionable intelligence, benefiting operational inquiries and court proceedings.

  • Okta - Auth0 - Identity Management Platform

    SOMERFORD ASSOCIATES LIMITED

    Auth0 Identity Platform is a cloud-based identity management service that helps organisations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.

  • Powered by Neo: Housing Insights Compliance & Reporting Tool

    NEO TECHNOLOGY LIMITED

    Neo Technology's Housing Insights Compliance & Reporting Tool offers a comprehensive solution for managing compliance and generating insightful reports in the housing sector. It enables efficient tracking, analysis, and reporting of various compliance metrics, ensuring regulatory adherence and informed decision-making.

  • CloudCover Guardian for Azure

    CCS Media Limited

    An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).

  • CoLiberty - LPS

    COALESCENT LIMITED

    Designed by the public sector. CoLiberty is a cloud-based, secure platform which provides Responsible Bodies with a digital toolkit to empower non-expert staff to conduct assessments, administer, collaborate, case manage and report on applications for authorisation under the LPS scheme. CoLiberty allows organisations to share history across Responsible Body boundaries.

  • Kineo Totara TXP - Totara Learn and Perform

    City and Guilds Kineo Limited

    Kineo Totara TXP is our all-in-one learning management system (LMS) and talent experience platform (TXP) that uses technologies built to work together to close the skills gap and open our clients' learning ecosystem. We provide a fully managed service to take each client’s learning strategy to new heights.

  • XDR - Extended Detection & Response - Office 365 Monitoring

    Network Utilities (Systems) Ltd

    Managed security solution that collects, aggregates, and normalises log data from Office 365 tenants using an analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Detects Business Email Compromise and identify threat like behaviour i.e. unauthorised access, admin changes, impossible logins, mass file downloads, and brute force attacks.

  • SolarWinds Security Event Manager (SEM) License

    Prosperon Networks Ltd

    SolarWinds® Event Manager (SEM), formally SolarWinds Log & Event Management is a powerful SIEM solution. Combining log management, correlation, forwarding, reporting, file integrity monitoring, user activity monitoring, USB detection and prevention, threat intelligence, and active response into a virtual appliance, that’s easy to deploy, manage, and use.

  • Orca Security

    BLUEFORT SECURITY LIMITED

    Provides a Cloud-Native zero-touch approach to cloud security. Operates a patent-pending “SideScanning” technology, which delivers 100% security visibility and coverage across customer’s entire cloud environment. Utilizes a context engine combining workload and cloud configuration details to build a unified data model and visual map of all cloud based critical assets

  • ServiceNow (ITSM/ITOM/CSM) - Implementation - by SCC

    SPECIALIST COMPUTER CENTRES PLC

    Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM). SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.

  • Netwrix PolicyPak

    INTEGRITY360 LIMITED

    PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings

  • AvePoint Policies for Microsoft 365

    Avepoint UK Ltd

    AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.

  • STREAM Integrated Risk & Assurance Manager

    ACUITY RISK MANAGEMENT LIMITED

    STREAM Integrated Risk Manager provides a holistic environment to capture integrated risk use cases within a Cloud infrastructure and provide clear reports. These use cases include Enterprise Risk, Cyber and IT, ISMS, Control and Compliance Assurance, Incidents, Audits and Findings, Policy, Business Continuity, Privacy, Vendor and Supply Chain, Vulnerability.

  • Logpoint Converged SIEM and SOAR

    Cyberlab

    Logpoint's platform brings together Security Incident and Event Management(SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure.

  • BeyondTrust Identity Security Insights

    INTEGRITY360 LIMITED

    BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.

  • Netwrix ChangeTracker

    BYTES SOFTWARE SERVICES LIMITED

    Netwrix Change Tracker helps organisations to enhance their security posture, through the process of hardening configurations and monitoring for unauthorized changes to criticial system files - in real time. The solution includes a comprehensive library of CIS certfied benchmark reports, designed to reduce the attack surface. bssgc

  • Full Stack Observability

    FORFUSION LTD

    Gain end-to-end visibility to confidently plan and deploy your hybrid cloud, whilst obtaining valuable insights through real-time workload performance. Our experts help you to leverage application and infrastructure monitoring tools to reliably validate success, so you can tailor your approach to addressing potential issues in hybrid or multi-cloud environments.

  • Managed SIEM as a Service (SIEMaaS)

    Proact IT UK Limited

    Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support.

  • Web penetration testing

    ISOTOMA LIMITED

    Even when hosting in the cloud, the security of your web application is your responsibility. Isotoma's penetration testing service helps ensure your application is secure against the most common techniques used by hackers today.

  • Office 365 Advanced eDiscovery

    VE3 GLOBAL LTD

    Advanced eDiscovery reduces your eDiscoverycosts by using machine learning to analyse relevant data, to allow more efficient document review and data reduction decisions. You can work with data stored in Exchange Online, SharePoint Online, OneDrive for Business, and Teams for Business.

  • Cloud Security

    FORFUSION LTD

    Leverage end-to-end security for both public and private cloud domains. Exploit the power of identity services and user identity to secure your network. Using products from the largest IT security vendor in the world to secure your workplace is critical and a very positive step towards increasing business performance.

  • Pathlock Cloud Cybersecurity Application Controls (CAC) for SAP

    Grey Monarch Limited

    Pathlock Cloud CAC automatically scans SAP systems for over 4000 security vulnerabilities and cybersecurity weaknesses at any desired frequency (e.g. daily, weekly, monthly). In this way, the SAP systems remain up-to-date with SAP security notes and patches. Other SAP security risks are also quickly identified with clear remediation instructions provided.

  • iplicit Finance for Students' Unions

    IPLICIT LIMITED

    iplicit understands how complex Student Union finances can get, with multiple legal entities, fund management and differing VAT requirements for starters. iplicit for Students' Unions simplifies matters; making light work of administrative tasks and providing accurate, real-time information to enable more effective decision-making across your finance team.

  • Arrow Trustworthy Research Environment ( Data Safe Haven)

    ARROW BUSINESS COMMUNICATIONS LIMITED (Trading under the brand name ARO)

    Arrow's TRUSTWorthy Research Environment is a “cloud” based Data Safe Haven. The research platform overcomes the challenges faced by attempting to undertake meaningful electronic research. Joining data-sets in a methodical and secure manner allows the health economy and research community to progress to evidence based medical research like never before.