Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

1070 results found

1070 results found in Lot 2: Cloud software in the category Audit tools

  • Barrier Networks Software-Defined Edge and Infrastructure Security SASE (Fortinet FortiSASE)

    Barrier Networks

    Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).

  • Fleet Maintenance Software: Vehicle and Plant Inspections and Repairs Tracking

    Ultan Technologies

    Ultan Technologies' Fleet Maintenance Software streamlines vehicle and plant inspections. Our module empowers organisations to conduct ad-hoc or scheduled checks, tracking repairs seamlessly. Configurable forms and workflows ensure efficient management. From inspections to corrective actions, our system guarantees thorough tracking for optimal fleet maintenance.

  • KnowBe4: Leading Security Awareness Training & Simulated Phishing for Human Risk in UK Public Sector

    S3 Ltd

    KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks. Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.

  • ETL Framework for Analytics

    Simpson Associates Information Services Limited

    Why waste precious time, money, and resource on setting up your Azure environment, when all the hard work has already been done for you? Our ETL Framework Accelerator has been designed to speed up the development through automation, speeding up the process, so your business can get to insights quicker.

  • altIAM - Identity and Access Management

    Altiatech Ltd

    alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • Incident Alerting Platform

    Bounce Agency

    The SIM Alert Manager is a comprehensive digital incident alerting and notification system designed to automatically inform response teams and stakeholders of incidents, providing customisable alerts, real-time updates, and integration with external systems for timely and coordinated response.

  • MyAudit: Healthcare Auditing Software

    GLOBAL VIEW SYSTEMS LIMITED

    MyAudit, intelligent and simple to use audit-management software. A flexible, time saving solution that satisfies the rigorous healthcare compliance requirements. National Standards of Healthcare Cleanliness (NSoHC) compliant. Used for Hand Hygiene, IPC, Waste, Fire, Catering, Health and Safety Audits and more. Built and designed in collaboration with the NHS.

  • SAP GRC as a Service

    Turnkey Consulting (UK) Limited

    A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.

  • Aiimi Insight Engine – Data Privacy & Compliance

    Aiimi Ltd

    The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using artificial intelligence to identify personal data across all of your data sources. Providing SAR collection, redaction and disclosure capability, along with compliance auditing and actions for remediating non-compliant data, with a simple and slick user interface.

  • Compliance and Archiving Solutions

    Vizst Technology

    Meet your legal, policy and compliance obligations including GDPR, Subject Access Requests and Freedom of Information. With solutions from leading vendors including Mimecast and Cryoserver, we offer comprehensive email and Microsoft Teams searching, security and archiving.

  • Quest On Demand

    ADVANIA UK LIMITED

    Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.

  • Bruhati offering of Software AG webMethods

    BRUHATI SOLUTIONS LTD

    Bruhati offering of Software AG webMethods.io Integration Cloud is an integration Platform-as-a-Service (iPaaS) that connects cloud-based and on-premises applications and enables rapid deployment to the cloud.

  • SPOT

    NETAPP

    Spot by NetApp is a cloud optimization SaaS platform for FinOps and DevOps. It ensures the best balance of cost, performance, reliability and security for cloud applications (virtual machines, container/Kubernetes clusters) and automates cost optimization at multiple level, across the public hyperscalers: Amazon AWS, Microsoft Azure and Google Cloud Platform.

  • Pathlock Cloud Continuous Controls Monitoring (CCM) for SAP

    Grey Monarch Limited

    Pathlock Cloud CCM offers a comprehensive toolkit to enhance risk identification and assessment, reduce manual compliance controls efforts, and improve operational excellence. With this solution, organisations can streamline their process controls and mitigate risks more efficiently, enhancing their overall performance and success.

  • Software as a Service and Security as a Service (SaaS)

    BOM Group Ltd

    Whether it be network/Application monitoring or securing physical or data assets in hybrid environments, BOM has the knowledge and partners to ensure the buyer leverages the most suitable tool(s) to suit their needs. Technical architects can advise on which software/hardware is fit for purpose based on the buyers requirements.

  • CDW Cloudflare Zero Trust Network Access (ZTNA)

    CDW Limited

    " Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.

  • Computacenter - Palo Alto Cortex XDR

    Computacenter (UK) Ltd

    Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.

  • IBM WatsonX.AI

    IBM United Kingdom Ltd

    Watsonx.ai provides a studio of integrated tools for working with generative AI capabilities that are powered by foundation models and for building machine learning models. Build with our new studio for foundation models, generative AI and machine learning. Train, validate, tune, and deploy foundation and machine learning models with ease.

  • BeyondTrust Privileged Password Management Password Safe Cloud

    Softcat Limited

    BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.