Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

970 results found

970 results found in Lot 2: Cloud software in the category Systems monitoring

  • Cyber Security, Policy Management & Compliance Platform

    Policy Monitor Limited

    Policy Monitor provides a cybersecurity management platform, Cyber Security Policy Monitor (CSPM). CSPM gives you a centralised platform to support your organisation through complex industry-certified accreditations, to create and implement internal security policies, train your staff, scan for vulnerabilities and establish best practices to provide the best defence against criminals.

  • Bus Operator Performance Reporting

    R2P Systems UK Ltd

    This service allows bus operators and local authorities to report on arrival/departures and lateness of vehicles. It provides detailed arrivals/departure times at bus stops along journeys. At the high level, it provides a complex timetable schedule heading report to see how vehicles are performing against timetables.

  • Cyber Security Network Sensor

    ACTIONABLE LTD

    REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors. The platform incorporates the REACH data acquisition engine for precision cyber data analytics.

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    Khipu Networks Limited

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.

  • Trustmarque Palo Alto Prisma Access

    TRUSTMARQUE SOLUTIONS LIMITED

    Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.

  • Flowbird Mobility Hub

    FLOWBIRD SMART CITY UK LIMITED

    The Flowbird Mobility Hub is a kerb side management platform. Our customers can aggregate data from various mobility providers in order to have consolidated reports and analytical data.

  • Tenable Vulnerability Management Licences

    MONDAS CONSULTING LTD

    Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.

  • Network Monitoring and Management

    FLUIDONE LIMITED

    Real time device and circuit monitoring with proactive systems support provided via a suite of management tools. Data is provided on a real time and monthly basis detailing WAN circuit bandwidth usage, device processing and memory usage, IOS/service patch information, event log history and any logged incidents.

  • Trustmarque Palo Alto Cortex XSOAR

    TRUSTMARQUE SOLUTIONS LIMITED

    Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey. Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.

  • Security (Information Assurance) Architecture

    MAZIK GLOBAL LIMITED

    The design, documentation and assurance of secure technical architectures used for hosting applications. e.g. the Security Architecture that underpins a Risk Management Accreditation Document Set or equivalent. The mitigation of vulnerabilities. Quality Assurance of existing capability. Use of government standards e.g. Security Policy Framework (SPF).

  • Legacy Application Migration

    CIRRO LIMITED

    Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.

  • Micro Focus, now OpenText - Operations Bridge (OpsBridge) on SaaS

    MICRO FOCUS

    Micro Focus® Operations Bridge (OpsBridge) monitors your IT environment and consolidates data from existing tools. Operations Bridge applies automated discovery, monitoring, analytics, and remediation to data across traditional, private, public, and multi-cloud and container-based infrastructure. It displays business and IT KPIs for executive stakeholders and operations staff, providing real-time insight.

  • Neo Technology Application Revitalisation Solutions

    NEO TECHNOLOGY LIMITED

    Neo Technology's Application Revitalisation Solutions help modernise your existing applications, addressing technical and security challenges to enhance digital service flexibility, usability, resilience, and efficiency. By modernising your applications, you can prolong the lifespan of legacy systems, reduce ongoing costs, and expand functionality through application refactoring for decreased technical debt.

  • SentinelOne Managed Endpoint Detection & Response (MDR)

    EXPONENTIAL-E LIMITED

    SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux. SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.

  • Process Mining

    BusinessOptix Ltd

    Process Mining / data scenario modelling.

  • AI-Enhanced Customer Support Platform

    DATASUMI LTD

    Discover the revolutionary approach to customer service through AI-enhanced customer Support. Our state-of-the-art AI technology handles routine questions and administrative duties, optimising interactions and increasing efficiency. We enhance response times by incorporating AI-driven tools into your service, ensuring quick solutions for common customer inquiries.

  • BMC Helix Discovery

    Fusion Business Solutions (UK) Limited

    BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.

  • Logit.io Application Performance Monitoring and Observability

    Logit.io

    The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.

  • Netskope - Web and Cloud Security

    INTEGRITY360 LIMITED

    Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality

  • Sophos Intercept X Server

    SOFTCAT PLC

    Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.

  • IoT for Legionnaires Monitoring, Alerting & Compliance

    CIRRO LIMITED

    IoT for Legionnaires Monitoring, Alerting & Compliance is an advanced IoT application designed to facilitate the efficient lifecycle management of multiple IoT applications and use cases on a single unified IoT platform. With an SDK and API, the applications can be integrated with existing BMS systems or new applications.

  • AI Augmentation for Building Opex & Decarbonisation

    FUTURE DECISIONS LTD

    We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.

  • Automated Software Testing - Adapptester.com

    adappt

    Comprehensive automated software testing. Adapptesters.com provides teams of highly skilled and proficient software testing experts, equipped with a broad range of technical expertise to cater to the global demands of organisations. Automated testing ensure repeatable tasks efficiently and with accuracy, delivering better lifecycle outcomes.

  • ITHQ Unified Cloud Monitoring

    ITHQ LTD

    ITHQ provides a unified cloud monitoring service. This enterprise-grade, cloud-based monitoring platform provides comprehensive oversight of your on-premise and cloud infrastructure. It features advanced capabilities for monitoring, alerting, ticket enrichment, and automated responses, ensuring optimal performance and swift issue resolution for any infrastructure requirements.

  • Ingentive Cloud SIEM (Microsoft Sentinel)

    INGENTIVE LIMITED

    Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring. Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.

  • Proofpoint Identity Threat Defense & Response (ITDR)

    SOFTCAT PLC

    Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.

  • NTT DATA Business Solutions – SAP Identity Management

    NTT DATA Business Solutions (UK) Limited

    SAP Identity Management aligns user lifecycle management with key business processes running in the cloud and on-premise. Business managers define role-based, compliant user access rights and identity management across SAP and third-party enterprise applications – whilst IT maintains centralised data, alerts, and reporting needed to maintain control and manage risk.

  • Sophos Firewall

    BYTES SOFTWARE SERVICES LIMITED

    "XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity, as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc

  • Micro Focus, now OpenText - ArcSight Security Incident and Event Management (SIEM) on SaaS

    MICRO FOCUS

    Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.

  • Traffic Light Priority System

    R2P Systems UK Ltd

    TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.