Search results

691 results found

691 results found in Lot 2: Cloud software in the category Systems monitoring

  • Self-learning, AI-driven Email Security Solution

    MEDICARE NETWORK LIMITED

    The world’s leading anti-phishing email technology combines human intelligence with artificial intelligence and machine learning that stops sophisticated advanced threats using powerful technologies to stop threats inside the email network. Designed to quickly detect and prevent spoofing, impersonation and non-signature, based attacks in real-time, responding automatically in seconds, and blocking.

  • Govroam

    Jisc Services Ltd

    A federated roaming service for the wider public sector, providing seamless connectivity to the end user. Govroam makes offering offsite connectivity easy, delivering savings and efficiencies while enhancing the control employers have over staff roaming behaviours. Operated by Jisc, Govroam brings regional roaming initiatives together under a standardised national-scale service.

  • Broadcom/Symantec Endpoint Security Complete

    Gradian Systems Ltd

    Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses artificial-intelligence (AI) to optimize security decisions.

  • End User Experience Monitoring

    Geode Networks Ltd

    End User Experience (EUX) Monitoring from Geode Services is a managed service that provides visibility into user experience (EUX) by monitoring and reporting on their specific performance of application activities across any application type, local, cloud, multi-cloud, web, VDI or enterprise.

  • UST Cloud Manager

    UST Global Pvt Ltd

    UST Cloud Manager is a multicloud service management platform that enables customers to visualize, provision, manage, optimize, and automate their cloud environments. The Service Offering collects and consolidates all a customer's cloud environment data in a single platform to enable the customer to efficiently optimize and govern its cloud environment.

  • Securus Full Monitoring Service

    Securus Software

    A digital safeguarding self service software & full monitoring service solution, our team manage the data on behalf of the school alerting them to incidents of concern. Used by multiple education sector organisations, we ensure ALL devices are constantly monitored without taking up valuable teaching and staff management time.

  • Forcepoint Next Generation Firewall

    Gradian Systems Ltd

    Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Can be use to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.

  • BeyondTrust Endpoint Privilege Management

    CyberIAM Holdings Ltd

    BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.

  • vRealize Operations Cloud

    Softcat Limited

    Enable self-driving IT Operations Management across private, hybrid and multi-cloud environments with a unified operations platform that delivers continuous performance, capacity and cost optimization, intelligent remediation and integrated compliance through AI/ML and predictive analytics.

  • GeDaP KISS (KeyTalk IoT Secured Sensors)

    TeamLogic Systems Ltd

    KISS strengthens the security of Edge Devices on a network, automating the creation and exchange of short-lived digital certificates at frequent intervals. With its automatic authentication (device identity) and robust encryption KeyTalk provides the security of PKI without the bureaucracy. Highly scalable objects can be readily connected and secured .

  • Ethical Phishing Campaign

    SMARTER TECHNOLOGIES TRADING LIMITED

    Targeted ethical phishing campaign tailored to your requirements, to improve organisational resilience against phishing attacks. Cloud based service proven to be highly effective at combatting email borne cyber threats. Comprehensive reporting will demonstrate your organisation's improved cyber security awareness. Delivering a high return on investment (ROI) from the targeted campaign

  • Darktrace - Malicious Network Activity Detection Tool

    Grove Information Systems

    Powered by industry-leading AI, the Enterprise Immune System is a self-learning cyber defense platform capable of detecting and responding to cyber-attacks in real-time. Requiring no set-up, the technology is relied on by organisations to protect their entire digital enterprise, including the cloud, virtualised environments, SaaS applications, and industrial control systems.

  • Netwrix StealthDefend

    INTEGRITY360 LIMITED

    Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed

  • Crown Workforce Management Suite

    Crown Computing Limited

    This suite enables organisations to maximise their investment in their people, providing comprehensive Workforce Management functions comprising HR management, time & attendance and absence management, employee staff rostering and activity management. The solution includes interfaces to all popular payrolls and enterprise ERP solutions, along with standardised migration and installation facilities

  • Cloud-based Water Monitoring Software

    Visionist

    Our wireless Orion sensors send real-time updates to our Cloud Hosted (ISO27001-Platform). Accessible from any device. Overviews/bespoke notifications for water usage. Alerts/notifications covering critical events/triggers, water leaks, consumption changes or temperature fluctuations (full API integrations available). Remote, automated stopcocks, remote flushing with temperature checking and compliant reporting for Legionella control.

  • Checkpoint CloudGuard Cloud Security Posture Management

    Bytes Software Services

    Security, governance and compliance automation for public clouds and Kubernetes environments. With continuous visibility and control that helps organizations minimize their attack surface and protect against vulnerabilities, identity theft, and data loss in the cloud. bss13

  • Local-Resilience

    Initsys Ltd

    Local-Resilience allows the management of Incidents/Manage Second Line Responders/Volunteers and documents by converting paper plans into actionable scripts triggered by a mobile application or control room interface. This service enables the government to check that crisis planning is up to date and effective.

  • Cloud Application Development

    Cloud Cover IT Limited

    Transform your business with an expertly developed Cloud-Based app. Tailored to suit your business requirements we deliver software and service-focused applications that give your business continuity and the flexibility of connecting to your business anywhere, any time. CCIT support on all aspects: design, development, integration and maintenance.

  • VMware vRealize Network Insight Cloud

    Bytes Software Services

    vRNI Cloud is a solution to support Application Migration and Day 2 monitoring of virtual, physical (including Linux and multi-manufacturer networks). Provides deep analytics of network traffic and application dependency mapping. vRNI can accelerate application discovery, migration, network segmentation planning and deployment, enabling visibility across virtual and physical networks. bss13

  • Continuous Network Assessment - IoT Performance Monitor

    Visionist

    Online user experience monitoring. It uses IoT sensors to emulate user activity and report on performance and availability of online services, including WiFi, Cloud Apps, DNS, etc. Additionally, it discovers the network elements in the path, giving you end-to-end visibility of your IT service chain.

  • Chrome Enterprise Upgrade License

    Levett Consultancy Ltd

    The Chrome Enterprise Upgrade license for business builds upon the speed, simplicity, and security that come standard with ChromeOS. Remotely manage, provision, deploy, and implement policies to ChromeOS devices across your enterprise, streamlining arduous IT tasks, and enable users to be more productive using technology.

  • Artificial Intelligence (AI) and Data Science

    Faculty Science Limited

    Faculty is Europe’s most experienced team of AI specialists. We help policy makers and operational teams deploy powerful & reliable AI to their most important problems. We build cutting-edge AI models and then deploy live AI applications that inform real decisions.

  • Secure Digital Workspace

    SecureCloud+ Limited

    A single integrated platform to upload, store, disseminate classified data securely using any available internet connection. The service enables flexible metadata publishing, tagging, search-filtering and complex enquiries which enhance collaboration and distribution of shared intelligence. Supports environments at OFFICIAL/SECRET/ABOVE-SECRET using high-grade encryption to meet export control (e.g. ITAR) requirements.

  • VMware vRealize Network Insight Cloud

    Softcat Limited

    vRNI Cloud is a solution to support Application Migration and Day 2 monitoring of virtual, physical (including Linux and multi-manufacturer networks). It provides deep analytics of network traffic and application dependency mapping. vRNI can accelerate application discovery, migration, network segmentation planning and deployment, enabling visibility across virtual and physical networks.

  • Platform FLEX Onboarder - MDM UEM EMM Migration Tool

    Nine23

    The Platform FLEX / EBF Onboarder service enables efficient migration from one EMM or MDM Platform to another. Flex Onboarder replaces the manual process of migrating a Device with an automated User notification and a guidance process supported by a central Administration Console.

  • Workload Optimization Manager (CWOM)

    EVIDEN TECHNOLOGY SERVICES LIMITED

    Addressing the challenge of minimising the cost of virtual/cloud workloads whilst assuring performance and availability of applications, EngageESM delivers a solution that optimises every element of the virtual infrastructure stack. The solution dynamically baselines utilisation at any time, understanding application needs, and enabling proactive services maintenance without unmanaged cost.

  • Nimbus Cloud Software Services - Microsoft

    Nimbus Digital Technology Innovations Ltd

    Nimbus is a specialist digital & technology company focused on providing services to help our customers benefit from using cloud technologies. As a Microsoft Cloud Solution Provider (CSP), we can offer Microsoft software licenses at lower than market price.

  • KnowBe4 Security Awareness Training platform

    Fordway

    KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage. Enterprise-strength reporting for both training and phishing.

  • CDW Check Point CloudGuard Cloud Security Posture Management (CSPM)

    CDW Limited

    Security, governance and compliance automation for public clouds and Kubernetes environments. With continuous visibility and control that helps organizations minimize their attack surface and protect against vulnerabilities, identity theft, and data loss in the cloud.

  • Data Preparation

    AmdoSoft Systems LTD

    AmdoSoft offers Altair Monarch self service data preparation for extracting, combining, cleaning, transforming and sharing curated datasets for various data and analytics and data extraction processes. Monarch allows data extraction from various data sources and pdf documents by individual business users or completely automated as part of an end-to-end solution.