Skip to main content

Help us improve the Digital Marketplace - send your feedback

  1. Digital Marketplace
  2. Lot 2: Cloud software

Search results

535 results found

535 results found in Lot 2: Cloud software in the category Log management

  • Enterprise Candidate Management System & Digital Credential Solution

    TAHDAH VERIFIED LIMITED

    Software as a Service (SaaS) enterprise platform with secure verified immutable data at its core. Specialists in compliance, membership services, candidate management, safeguarding, CPD, course bookings, digital badging, qualifications, skills, e-learning, certification, auditing and streamlining systems.

  • Broadcom/Symantec CloudSOC Cloud Access Security Broker (CASB)

    Gradian Systems Ltd

    Our CASB solution extends your corporate information governance perimeter into public cloud applications mainly SaaS and increasingly. CASBs provide consistent policy and governance concurrently across multiple cloud services, for users or devices, and provide granular visibility into and control over user activities.

  • Archive360 Archive2Azure (per user)

    Through Technology Limited

    We are an Archive360 Global Channel Partner offering Archive360 products through G-Cloud 12. Archive2Azure provides an elastic and efficient cloud-based archive ensuring fast, secure, and compliant access, validation and classification, retention, and disposition. Suitable for many use cases and free from any supplier or vendor lock-in.

  • SonicWall NSv SERIES VIRTUAL FIREWALL

    Softcat Limited

    The SonicWall NSv Series virtual firewall offers you all the security advantages of a physical firewall with the operational and economic benefits of virtualization, including system scalability and agility, speed of system provisioning, simple management.

  • EVOLVE eMarketplace

    Elcom Systems Ltd

    Secure shopping/trading via an easy to use eMarketplace. Management of catalogues, goods and services with integration to existing systems. A Public eMarketplace system that enables a Governement-to-Business (G2B) shopping, purchasing, spot buying and tail-end spend in an easy to use and controlled environment. Report and analyse spend and aggregation opportunities.

  • Forcepoint Cloud Access Security Broker (CASB)

    CHESS ICT LIMITED

    Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and information assurance restrictions on using the Cloud

  • OpenPath Contactless Access Control

    Motorola Solutions UK Limited

    Openpath creates smart, customizable access control solutions. By combining sleek hardware with cloud-based enterprise software, Openpath enables mobile, hands-free entry and makes system management easier than ever. Our scalable, open platform seamlessly integrates with best-of-breed partners across a wide range of categories used to most efficiently run your business.

  • Lyniate Envoy

    Rhapsody

    Lyniate Envoy is fully-managed, turnkey, healthcare integration platform, hosted in the cloud. Our team handles everything required to connect you with your customers to securely exchange patient data. With support for multiple healthcare messaging standards (HL7, DICOM, FHIR, etc.) We built, maintain, and monitor customer all connections...

  • Stratiam

    Intergence Systems Limited

    Stratiam connects to all of your organisation's data via our proprietary API connectors. It then securely stores this data in a data warehouse from which this data can be queried. Best-in-class customisable data visualisations and dashboards are built against these datasets. Ai machine learning can be layered for predictive analytics.

  • Forcepoint Cloud Access Security Broker (CASB)

    Gradian Systems Ltd

    Forcepoint CASB is a security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions using the Cloud

  • vRealize Log Insight Cloud

    Softcat Limited

    vRealize Log Insight Cloud is a part of the VMware Cloud suite of services. Use this service to develop sophisticated analytics that aid in rapid troubleshooting of your SDDC or VMware Cloud on AWS environment.

  • Altia Covert Operations Solution (ACOS) Protected Persons (Witness Protection)

    ABM UNITED KINGDOM LTD

    ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.

  • mii Flexible Workforce

    Liaison Financial Services Ltd

    Cloud software solution for temporary workforce management; all staff types and resourcing routes: Agency Direct Employment (Direct Engagement) facilitated via TempRE/STAFFflow, Standard Agency Placement, Internal Bank/External Collaborative Bank. Facilitates reduced temporary staff expenditure and administration, optimises financial control; governance; approvals; process efficiency. Roster interface/vacancy to payment including reporting/workforce intelligence.

  • F5 NGINX App Protect - Direct / AWS CPPO

    FullProxy Ltd

    NGINX App Protect is a modern app‑security solution that works seamlessly in DevOps environments as you deliver apps from code to customer. Built on F5’s market‑leading WAF, our software runs natively on NGINX Plus and integrates security controls into your apps.

  • Managed SIEM as a Service

    Proact IT UK Limited

    We offer a fully managed and cloud-based SIEM solution. Let our specialists monitor your security logs and alert you to incidents associated with security threats. We provide guidance and advice to help you respond appropriately and take the mitigating actions required, complimenting your existing IT teams with security expertise.

  • GeDaP KeyTalk Authentication to WiFi / Wired networks (802.1 x EAP/TLS) and VPN

    TeamLogic Systems Ltd

    WiFi/Wired networks and VPN: Authentication is often cumbersome and not secure enough. However Client certificate-based authentication ensures maximum security of access to your digital infrastructure. This applies to both wireless and wired networks (802.1 x EAP/TLS) and can also be applied to VPN networks

  • BetterCloud for Google Workspace

    Netpremacy Limited

    A comprehensive security, 360-degree management and automation platform built for all Google Workspace customers, BetterCloud is the number one security, management and process automation tool for your Google Workspace solution. The Bettercloud unified suite of tools offers all of the controls you need for IT Department, Service Desk to SIRO.

  • Email Authentication, SPF, DKIM, DMARC & BIMI Platform

    Infosec Ventures

    EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program. We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.

  • Lifebit CloudOS: Cloud-Based Trusted Research Environment

    Lifebit Biotech Limited

    The Lifebit CloudOS Trusted Research Environment (TRE) is a secure computing environment for researchers to remotely access large-scale biomedical data. Lifebit CloudOS allows researchers, teams and large organisations to collaboratively and securely access, manage and analyse large-scale biomedical data over cloud environments or hybrid infrastructures (HPC-Cloud).

  • BLD COUNTER - OSINT, WEBINT, SIGINT & Cyber Operations PaaS

    Blue Lights Digital

    COUNTER is an ecosystem of OSINT, WEBINT, SIGINT and Cyber Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bss13

  • Self-learning, AI-driven Email Security Solution

    MEDICARE NETWORK LIMITED

    The world’s leading anti-phishing email technology combines human intelligence with artificial intelligence and machine learning that stops sophisticated advanced threats using powerful technologies to stop threats inside the email network. Designed to quickly detect and prevent spoofing, impersonation and non-signature, based attacks in real-time, responding automatically in seconds, and blocking.

  • Darktrace Enterprise Immune System with Cloud Cyber Security

    INTEGRITY360 LIMITED

    World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud Platform and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact.

  • UST Cloud Manager

    UST Global Pvt Ltd

    UST Cloud Manager is a multicloud service management platform that enables customers to visualize, provision, manage, optimize, and automate their cloud environments. The Service Offering collects and consolidates all a customer's cloud environment data in a single platform to enable the customer to efficiently optimize and govern its cloud environment.

  • Archive360 Archive2Azure (per terabyte)

    Through Technology Limited

    We are an Archive360 Global Channel Partner offering Archive360 products through G-Cloud 12. Archive2Azure provides an elastic and efficient cloud-based archive ensuring fast, secure, and compliant access, validation and classification, retention, and disposition. Suitable for many use cases and free from any supplier or vendor lock-in.

  • BeyondTrust Endpoint Privilege Management

    CyberIAM Holdings Ltd

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • Computacenter - Cloud Access Security Broker (CASB)

    Computacenter (UK) Ltd

    Proofpoint Cloud Application Security Broker protects against account compromise, malicious files, data loss and compliance risks in the cloud.

  • Operational Management Tool

    Towers Associates

    Our operational management and automation tool ensures your business users, application owners and administrators remain connected with your IT environment, whilst ensuring costing and target decisions are made from an informed position.

  • GeDaP KISS (KeyTalk IoT Secured Sensors)

    TeamLogic Systems Ltd

    KISS strengthens the security of Edge Devices on a network, automating the creation and exchange of short-lived digital certificates at frequent intervals. With its automatic authentication (device identity) and robust encryption KeyTalk provides the security of PKI without the bureaucracy. Highly scalable objects can be readily connected and secured .

  • NTT Data - IP Solutions

    NTT DATA Business Solutions (UK) Limited

    NTT Data IP is a set of applications and utilities that can be implemented alongside SAP solutions. Each application and utility may be purchased and implemented in isolation or in combinations with others.