Search results

517 results found

517 results found in Cloud software in the category Log management

  • Supply Chain Track and Trace

    Tongadive Ltd

    Digital orchestration enabled track and trace SaaS to provide visibility, security and immutability of data as goods move through the supply chain. A fully functional deployed service will provide end to end visibility and traceability of goods preventing counterfeiting and enabling efficient forward and reverse supply chain.

  • ExtraHop Reveal (x) - Cloud Native Network Detection and Response

    CyberWhite Limited

    Reveal(x) providies unparalleled Visibility, Anomaly & Threat Detection and Response. It is compatible with major cloud providers plus on-premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats and anomalous behaviours, provides 360-degree visibility of network traffic, fast investigation workflows and response automation.

  • Phoenix

    Softcat Limited

    Phoenix is a SaaS service which allows organisations to backup and protect their file, database and Vm data, such as Vmware, SQL or NAS utilising the cloud. Customers are able to configure, administer and manage their backup estate utilising a single cloud based console.

  • CyberArk CorePAS

    Blue Cube Security Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Idaptive B2C App Access copy

    Avari Solutions

    Idaptive strengthens enterprise security by managing and securing user identities from cyber threats. With Idaptive platform of integrated software and cloud-based services, Idaptive uniquely secures and unifies identity for both privileged and end users across today’s hybrid IT world of cloud, mobile and data centre.

  • Raidiam Connect

    RAiDiAM Services Limited

    An Identity, API and Authentication accelerator platform designed to help orchestrate any identity end to end solution to provide a range of benefits when implementing trust frameworks and opening opportunities in the Connected API economy.

  • StarTraq Dome for Traffic Enforcement

    StarTraq Limited

    A browser-based solution used to process any traffic or environmental offence, fine, PCN, permit or licence. Consisting of a back-office system and smartphone app, it provides: full case management, automated workflow, document management, batch scanning, batch printing, template management, reporting, payment collection and appeals management.

  • Secure Identity and Access Management Service

    Viewdeck Consulting Limited

    Secure Identity Management Service for Web, Desktop, Mobile applications, providing federated secure OAUTH2, OpenID and SAML based services to applications. Options to support High Availability, Mobile and many patterns. Private service for secure workloads. Provides standard token based, stateless session authentication.

  • EVOLVE Spend Management

    Elcom Systems Ltd

    EVOLVE Spend Management, seamlessly integrated Source to Pay process including MultiQuote, eSourcing, Tracker, Tail Spend, eAuction, Contract Management, Catalogues, Inventory Management (inc. Scan4Safety), Community Stores, PPE Central Store, Purchase to Pay (P2P), Analytics, Electronic Trading (PEPPOL access point), Supplier Financing and eMarketplaces. Integration with legacy, supply chain and external systems.

  • Ascema Sensitive Data Discovery and Extraction, Data Loss Prevention and Automated Classification

    Brookcourt Solutions

    The Ascema platfom supports two solutions: Ascema Sensitive Data Discovery and Extraction; Ascema Data Loss Prevention and Automated Classification. Ascema locates, protects, extracts, classifies and remediates sensitive information across enterprise applications, including O365, GSuite, Atlassian (Confluence) and Alfresco, PCs/laptops (windows/Mac/Linux), cloud applications, servers and S3 buckets in real time.

  • Stratiam Network Services for Cloud

    Intergence Systems Limited

    Intergence offers Stratiam; a multi-source data visualisation tool for end-to-end IT services that include Cloud Hosting, Applications, Wide-Area and Local-Area Network delivery and end user experience. Stratiam delivers unique insight into cloud and IT service end-to-end visualisation to IT help desk support teams, IT consultants and CIOs.

  • PROFix - Secure - PACE compliant - Digital Interview Recording Solution

    VoiceScript Technologies Ltd.

    PROFix solution is an automated, PACE compliant, Digital Interview Recording solution. PROFix securely records a multi-person, multi-language meeting (Witness / Suspect) and provides a tamperproof, verbatim, and court-ready transcript. Each utterance is time-indexed and speaker tag-identified. Compliant to MG15 and ROTI standards.

  • Microsoft Dynamics 365 Business Central (on-premise) Licenses

    Total Enterprise Solutions

    Microsoft Dynamics 365 Business Central is a market leading ERP solution that allows you to improve efficiency and streamline your business processes. Providing a centralised integrated platform from which to run your entire organisation on. We provide the associated licenses and license management service to ensure complete compliance.

  • SaaS Cloud Monitoring with Elasticsearch, Logstash & Kibana (ELK)

    Logit.io

    Logit provides a fully managed realtime cloud log monitoring SaaS platform built on Elasticsearch, Logstash and Kibana (ELK) which is auto scalable, secure and compliant. Use the Logit platform for container monitoring, cloud observability, logging, metrics, APM, SIEM and much more. All services are ISO27001 certified.

  • BeyondTrust Priviledged Remote Access

    Bytes Software Services

    BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bsscloud

  • The Splunk Platform

    NETbuilder Ltd

    Splunk monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, artificial intelligence, packaged applications and open APIs, alongside Phantom for security operations, VictorOps (DevOps) for incident management and SignalFX for application performance monitoring.

  • Jet Reports for Microsoft Dynamics 365 Business Central Licences

    Total Enterprise Solutions

    JetReports offers flexibility in the way reports and data are configured and consumed. Create bespoke reports, exactly how you require, without compromising data with copy and paste.

  • ExtraHop Reveal(x) – Cloud Native Network Detection and Response

    Cisilion Limited

    Reveal(x) is a market leading Cloud Cyber Security Platform, providing unparalleled Visibility, Anomaly & Threat Detection and Response. Compatible with all major cloud providers, including AWS, MS Azure and Google Cloud Platform as well, on premise and private clouds. Reveal(x) comes with cloud scale machine learning (ML) to detect threats.

  • Resilient Database Server as a Service

    Viewdeck Consulting Limited

    Secure Application Database Services for your Cloud solutions. Choice of MariaDB®, PostgreSQL®, NoSQL( CouchDB® and Apache Cassandra® ) in traditional and High Availability configurations, provided either as a fully managed service or self administered via web interfaces. Ideal cloud migration path for Development, Test, Live and Secure environments.

  • ZScaler ZIA, ZPA, Z-App Software License and Deployment Services

    Visionist

    Following a Zero Trust Network Model, as recommended by NCSC, The service provides ZPA/ZIA licenses and additional deployment services for ZScaler Internet Access/Zscaler Private Access. Provides access to legacy applications, either hosted on site, or via the PSN Gateway. Supports XP, Win8, Win10, Mac, Mobiles, Browser based access.

  • Microsoft Defender Advanced Threat Protection (ATP)

    Bechtle direct Ltd.

    Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Microsoft Defender ATP protects endpoints from cyber threats; detects advanced attacks and data breaches, automates security incidents and improves security posture.

  • InfoBoss DM

    Total Intelligence Ltd (G8)

    The infoboss data management software platform provides a means to collect, organise and categorise data from multiple sources into a central repository. Used for Data governance including GDPR, Data quality, Data audit, alerting and advanced search capabilities. The platform is massively scalable, quick to setup and very easy to use.

  • Check Point SandBlast Mobile

    SEP2 LIMITED

    SandBlast Mobile provides a powerful and continuous level of security across an organisations mobile device real-estate. The solution provides an always-on, always up-to-date protection for your smartphone and tablet users against known and unknown threats against both mobile devices and data upon these devices before any damage can be caused.

  • GeDaP KeyTalk Certificate and Key Management System

    TeamLogic Systems Ltd

    KeyTalk’s crypto Certificate and Key Management System (CKMS) automates the management, distribution and installation of certificates (PKI) from multiple public and internal CA’s to any endpoint device running on any OS. The patented software automates short-lived (1-sec) certificate distribution Build-in hardware recognition of endpoint devices provides optional extra authentication factor.

  • Cloud Security Posture Management

    EACS Limited

    eacs' cloud security services focus on the "Predict, Prevent, Detect, Respond" framework. Adopting a layered approach, eacs works with its customers to provide solutions including anti virus, anti malware, cloud based firewalls and application security, as well as identity focussed solutions based on the Microsoft EM+S products.

  • Guardtime MIDA - Control, Secure and Trust Your Cloud

    Rainmaker Solutions

    Monitor, visualise and verify the state of processes and enforced policies in your Cloud system in real-time and independently from the service provider (CSP). Utilising digital twin and blockchain technologies, MIDA presents a new approach to cybersecurity with unmatched capabilities in detecting critical breaches and misconfigurations in your Cloud infrastructure.

  • Orbitil Projects

    Orbitil Limited

    Orbitil Projects is a modern project management cloud solution, extracting data directly from source into clear visuals and practical analytics. The intuitive dashboards collect project data signals from across your portfolio for early warning of delivery challenges. Powerful scenario planning lets you try what-if's in seconds.

  • NCC Scout

    NCC GROUP SECURITY SERVICES LIMITED

    NCC Scout is a self-service web application for performing ad-hoc and/or scheduled configuration monitoring of Azure, AWS and Google public cloud accounts. NCC Scout checks for configuration compliance with best practices through a capable, agnostic and easy to use hosted system which is maintained and supported by NCC Group engineers.

  • Netskope Security for Gsuite & Google Cloud Platform (GCP)

    Generation Digital

    Gain visibility into security and compliance risks across your Gsuite and Google Cloud Platform estate – quickly identify and address any misconfigurations or threats that could put your data or business at risk.

  • Cortana Analytics Services on Azure - Big Data and Analytics

    Incremental Group

    Incremental Group offers fully managed big data and advanced analytics services that enable the transformation of data into intelligent action. Our Cortana Analytics services enables core analytics scenarios such as real-time recommendations, customer churn forecasting, fraud detection, predictive maintenance and many more. unlock the potential hidden in your big data.