Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

661 results found

661 results found in Lot 2: Cloud software in the category Log management

  • Konsolute - Microsoft Cloud Security Services

    KONSOLUTE

    Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.

  • Inoapps Rental Management

    INOAPPS LIMITED

    Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime. Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.

  • Reception Sign in App

    Cloud Cover IT Limited

    Power App designed and tailored SharePoint to monitor and track staff and guests access to buildings providing guest lists, fire registers, email updates for visitors, and wayfinding information to meeting rooms

  • Ingentive Cloud SIEM (Microsoft Sentinel)

    INGENTIVE LIMITED

    Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring. Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.

  • Sophos Firewall

    Bytes Software Services

    "XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc

  • Micro Focus, now OpenText - ArcSight Security Incident and Event Management (SIEM) on SaaS

    MICRO FOCUS

    Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.

  • Traffic Light Priority System

    R2P Systems UK Ltd

    TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.

  • Turbo360 Business Applications

    INTEGRATION360 LIMITED

    Turbo360 Business Applications is aimed at trying to make it simpler to manage and monitor solutions developed with Microsoft Azure. At runtime you need highly experienced Azure experts to manage your solution and there are significant benefits if we can democratize the support experience for your cloud solution.

  • Anti-Phishing Simulation, Security Awareness Training, Reporting, Remediation & DMARC

    Lloyds Ventures

    Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks. EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.

  • Computacenter - CrowdStrike Application Security Posture Management

    Computacenter (UK) Ltd

    CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.

  • Splunk Software

    apto solutions limited

    Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.

  • Computacenter - Varonis SaaS Data Security Platform

    Computacenter (UK) Ltd

    Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.

  • Compuatacenter - Proofpoint Threat Protection Suite

    Computacenter (UK) Ltd

    Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.

  • Legado

    LEGADO TECHNOLOGIES LIMITED

    Legado makes digital interactions with customers secure, simple and personal using a cloud-native platform that can be flexibly deployed using a set of scalable and modular APIs. The platform has dozens of pre-built features for customer communications, workflows, intelligence and data insights.

  • Netwrix Password Policy Enforcer

    INTEGRITY360 LIMITED

    Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.

  • Case Management for Digital Forensics

    Blue Lights Digital

    Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.

  • Jigsaw24 - Jamf Software Solutions for Apple

    Jigsaw24

    Jamf lead on Apple device management, building Unified Endpoint Management solutions specifically for the Apple ecosystem. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.

  • Observatory

    BLANKBOX TECHNOLOGIES LTD

    Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.

  • PersonIQ - Cloud solution driving smart services

    BEMROSE BOOTH PARAGON LIMITED

    Paragon ID is a leader in identification solutions, in the e-ID, transport, smart cities, traceability & brand protection sectors. Using the latest technologies such as RFID and NFC, it provides smart cards, tickets, labels and tags to worldwide clients in diverse markets including public transport, manufacturing, logistics, gaming and retail.

  • Precisely Ironstream

    PRECISELY SOFTWARE LIMITED

    Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.

  • Netwrix Data Classification

    INTEGRITY360 LIMITED

    Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort.

  • KGN-Software

    KGN Software Ltd

    KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.

  • Imperva Application Security

    QUADRIS LIMITED

    Comprehensive application security for organisations serious about securing websites, applications and networks to provide best-in-class availability and protection for your users and reputation. Mitigate security threats with this wide ranging suite of functionality providing deeper protection, automation and containment, including same day blocking of zero-days, to attain world class security.

  • Generative AI Planning and Integration Service

    DATASUMI LTD

    Datasumi provides a state-of-the-art Generative AI Planning and Integration Service designed to integrate AI solutions into government operations smoothly. We focus on project development, proofs of concept, and data science prototypes. We perform feasibility studies, identify specific technical requirements, and ensure secure and compliant implementation.

  • Risk and Compliance Solution

    GET SWARMS LIMITED

    GetSwarms' service protects organizations from risks while ensuring compliance with standards like ISO 9001, ISO 27001, PCI DSS, and GDPR. Featuring advanced analytics, automated monitoring, and customizable frameworks, it detects and mitigates potential threats. GetSwarms also provides proactive risk management and comprehensive compliance support.

  • CrowdStrike Falcon for IT

    Softcat Limited

    CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action

  • Keyfactor EJBCA SaaS

    UNSUNG LIMITED

    Keyfactor EJBCA SaaS provides the full power of EJBCA Enterprise without the need for managing the underlying infrastructure. Keyfactor will manage your PKI infrastructure according to best practices and highest assurance.

  • Forcepoint Insider Threat (FIT)

    Softcat Limited

    Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 20 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.

  • Netwrix Password Reset

    INTEGRITY360 LIMITED

    Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity

  • Biobank management system

    OMDA HEALTH ANALYTICS LIMITED

    Cloud-based database web application for bio-specimen management.