Search results

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
131 results found

131 results found in Cloud software in the category Log management

Save details of your search and download your search results.

Okta

Softcat Limited

Okta is a leading identity solution providing single-sign on, multi-factor authentication, mobile device management and provisioning capabilities for cloud based applications

Government and Healthcare Learning Management System

New Era Education Ltd

The Government and Healthcare LMS combines our innovative collaboration, learning and assessment tools with the latest Microsoft, Google and educational cloud apps to deliver, manage and access learning anytime; anywhere. Users, security and identity management are seamlessly integrated ensuring users easily gain access to all their information, resources and applications.

Secure Email Service

E-Share

A secure email service via an Outlook plugin. Encrypts all attachments and the body of the email. No restriction on file sizes. Links are sent to the recipient for them to access files in your cloud storage provider. Full real time auditing with revocation controls even after you hit send.

Alert Logic Cloud Defender

Cloudreach Europe Limited

Alert Logic Cloud Defender SaaS improves security visibility and compliance. 24x7 monitoring by security experts for network threat detection, log management, vulnerability assessment and web application protection. Providing continuous monitoring and actionable security intelligence protecting your data. This helps organisations achieve compliance, allowing critical teams to focus on security outcomes.

Protective Monitoring as a Service

Eduserv

Eduserv Protective Monitoring as a Service provides the setup, configuration and operation of log monitoring, event analysis and automated alerting in line with NCSC (formerly CESG) guidance. This secure cloud service eases the burden of PSN compliance and helps to meet the SIEM requirements for accrediting OFFICIAL systems.

Board Portal

Admincontrol AS

Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.

Splunk Enterprise Security (SIEM)

Splunk Inc.

Splunk Enterprise Security is a SIEM that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information. It enables security teams to quickly detect and respond to attacks to simplify threat management while minimizing risk and safeguarding your business.

Anomali Reports

Anomali Inc

Anomali Reports collects log data from security information and event management (SIEM) products and reads the data looking for five kinds of potential indicators of compromise (IOCs). The data is correlated against Anomali's vast library of known IOCs. Matches (true-positives) are pushed into SIEM analysis workflows as critical prioritized events.

Aurora365 IT Infrastructure Monitoring Managed Service for SolarWinds

Comtact Limited

Cloud-based IT network monitoring application, providing clients with a single, secure dashboard view of their entire IT estate - fully managed by our SolarWinds-certified professionals. Monitored 24x7x365 from our UK Tier 3, ISO27001 data centre to proactively manage performance issues - before they impact business. Service guarantee 99.99% up-time.

USP Secure Entry Server® Cloud Appliance

United Security Providers UK Ltd

USP Secure Entry Server® is a comprehensive Web Access Management solution. An advanced WAF securing web applications and portals from cyber-attacks, uniquely combined with context based Multi-factor user-authentication, Web SSO and Federation. AWS images available for deployment within your Private Cloud, along with fully managed operational support, direct from USP.

FOI Case Management

Blackthorn GRC Limited

This service can be used to handle enquiries from start-to-finish. Capture the method and type of enquiry, allocate tasks within teams, monitor the progress, and ensure the customer is satisfied. Record how the response was formulated, who was involved, and then report against the full lifecycle. UK hosted to IL2/OFFICIAL.

Data Logging, Alerting, Reporting, Management & Analysis Software

REMOTE DATA NETWORK ANALYSIS LTD

R-DNA provides a user friendly and customisable “cloud-based” web interface allowing for the capture and analysis of data from remote monitoring hardware devices. R-DNA offers intelligent and customisable alerting using a variety or combination of methods; SMS, Email and its own messaging tool all offered in a pseudo real-time system.

OKTA

Armadillo Managed Services

Okta is the foundation for secure connections between people and technology. Using identity information to grant access to applications on any device at any time, while still enforcing strong security protection.

StatusToday

StatusToday

StatusToday is an AI-powered Insights Platform that understands human behaviour in the workplace, helping organisations improve security, productivity and communication. Combining state-of-the-art Machine Learning and Human Psychology, StatusToday’s patent-pending AI analyses employees’ activity metadata to deliver unparalleled operational visibility, map human threats and key behavior patterns internal to the organisation.

Texuna Identity Assurance & Access Management

Texuna

Identity Assurance and Access Management is an enterprise solution supporting mission-critical authentication and authorisation services, giving secure access to private and public cloud applications. Deliver Single Sign-On/Off via Shibboleth or OAuth2 for customers, partners, employees. Exchange attributes between integrated systems via SAML2. Active Directory integration and federation via open standards.

IAM Cloud

IAM Technology Group Limited

IAM Cloud is a cloud-based identity and access management platform that helps organisations to manage the access and security of their users and the cloud. IAM Cloud also has a cloud storage integration system 'Cloud Drive Mapper', and a cloud migration software service.

Docker Enterprise Edition Software Licences

Amazic

Docker Enterprise Edition (EE) is an secure, integrated, supported and certified container platform for CentOS, RHEL, Ubuntu, SLES, Oracle Linux & Windows Server 2016. Also for AWS, GCP and Azure. Deploy apps efficiently & effectively across diverse non homogeneous networks including third party cloud providers, hybrid cloud & private networks.

Github for Business

Amazic

GitHub Enterprise is a version control/source control solution which combines the power and flexibility of GitHub with the security, administration, and control businesses need. With GitHub Enterprise, you can foster greater transparency and collaboration amongst developers and allow seamless integration of third party tools — all without compromising security practices.

Identity as a service

Citizen

Citizen grows customer engagement and combat frauds by frictionlessly validating identity. We leverage mobile biometric technology to provide safer, seamless online experiences, ensuring strong cyber security and reducing abandonment. Our consent platform ensures that the GDPR regulation drives business value, whilst helping customers gain control over their personal data universe.

Armor Anywhere

Armor Defense Ltd.

Armor Anywhere is a managed, scalable security solution that protects virtual machine instances hosted on any cloud environment. Armor Anywhere's OS agent is powered by our Intelligent Security Model and managed by our experienced security operations team (SOC) – providing real-time visibility into your security program and actionable threat intelligence.

Audit Case Management

Blackthorn GRC Limited

No matter what is being audited, transparency, collaboration and remediation are key. This tool will highlight audit status and compliance weaknesses, manage task allocation and escalation, and give on-demand reporting via an integrated market-leading partnership platform. Compliance can be made easy when the experience is engaging. UK hosted to IL2/OFFICIAL.

Cyber Forensic Analysis Service

SecureCloud+ Limited

Cyber Forensic Analysis Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET, (including NATO and MISSON) and TOP SECRET delivers active cyber defence management and network forensic analysis. The aim is to contain and mitigate the impact of cyber incidents and prevent future attacks.

End User Experience Monitoring

Geode Networks Ltd

Monitor and detect performance issues by learning and analysing user behaviour in real time, resolve performance problems faster and attain the service levels demanded by the business. Combine application performance, device performance and user productivity to achieve real end user experience

Cloudbees Jenkins Software Licenses

Amazic

CloudBees Jenkins Enterprise enables Jenkins at scale by extending a verified distribution of Jenkins with the enterprise features required by teams delivering mission-critical software in the DevOps era. Jenkins is the leading automation platform for continuous delivery however, enterprises have unique needs.

CGI - Security Operations Centre (SOC)

CGI

A Real Time Protective Monitoring Services which provides a shared managed service to organisations to collect, detect and alert on security incidents within their Cloud and where required, their wider IT and applications infrastructure. This is the baseline service upon which the optional services can be supported

Managed Information Security Services

C Squared Consultancy Limited

C Squared is able to provide flexible and diverse solutions to a range of key information security risks by providing technology, managed services and consultancy. Our suite of strategically combined products can protect your organisation from a range of internal and external cyber and data security threats.

Secure Collaboration

E-Share

Securely collaborate by setting policies and permissions that staff adhere to by default. Gain control of data inside and outside the firewall. Drag and drop simplicity that enables team members to access, send and receive documents on any device. Access rights can be defined by management or by folder owner.

Endpoint Security

E-Share

E-Share provides an additional layer of security that encrypts data before it goes into public cloud storage services with endpoint security for BYOD. This enterprise solution for secure sharing and collaboration using the public cloud gives organisations extra security and visibility to safeguard and track all cloud data activity.

Custodian SaaS - Software as a Service

Celerity Limited

Celerity Custodian is a data protection suite that gives enterprises a single point of control and administration. Custodian provides reliable, cost effective backup and fast recovery for virtual, physical and cloud environments of all sizes and, enables advanced application protection to minimise downtime, maximising availability.

Splunk IT Service Intelligence (ITSI)

Somerford Associates Limited

With Splunk ITSI, you can harness the power of machine learning to drive analytics-driven IT operations. Streamline service operations with advanced event analytics, help prioritize incident investigation, and simplify rules and threshold management with real-time correlations, predefined semantics and baselining behavior patterns.

Symantec Cloud Web Security Service

Symantec (UK) Ltd

The service provides the same proactive web protection capabilities delivered by Symantecs on-premises Secure Web Gateway, the ProxySG, but delivered as a resilient cloud security service. Sitting between your employees and the Internet, it protects your enterprise from cyber threats and controls corporate use of the cloud and the web.

Responsiv Solutions IBM BlueMix & Watson Cognitive Services

Responsiv Solutions Ltd

Leverage IBM BlueMix and Blueworks Live services through Responsiv Solutions to make use of Platform as a Service (PaaS) to host your applications, use IBM Watson, deploy to WebSphere Application Server (WAS) platform, use Node.js. Make use of cognitive and machine learning to enhance your business.

IBM Message Hub on Bluemix (SaaS for OFFICIAL)

IBM United Kingdom Ltd

IBM Message Hub is a fully managed Bluemix service that connects your services on Bluemix with each other and with on-premise IBM MQ. These connections prevent users from having to manually code these applications to work together, enabling them to develop quickly.

Mydex Identity as a Service

Mydex Data Services Community Interest Company

Secure identity service supporting registration, authentication and on-going management of a privacy-protecting, GDPR-compliant identity service which can be integrated into any environment supporting open standards and protocols. The service is extensible to support a range of multi-factor authentication mechanisms, profile management, identity assurance and age verification to meet diverse needs.

Cyren Enterprise Security Platform

AIT Partnership Group Ltd

Cyren provides a secure web gateway with multi-layered defences to protect users from advanced malware, ransomware, botnets and phishing regardless of location or user device. The policy and reporting engine provides visibility and control of web usage to ensure safe search and a good web experience for your users.

Arcus CloudCauseway

Arcus Global Limited

An award-winning managed service to resolve transport and security issues, route and manage HTTP and HTTPS traffic between private and public networks. It enables organisations to share data securely with internal systems and trusted external systems and platforms to help drive efficiencies and innovation through self-service portals, mobile-enablement, etc.

Debit and Credit Card Payments

allpay Limited

allpay’s Debit and Credit Card Payment Solutions are used by over 400 clients and encompass all elements required to process a card payment. As well as providing a full range of front-end payment channels, allpay can provide organisations with a merchant account or work with their existing merchant account provider.

Management Domain as a Service

Viewdeck Consulting Limited

Complete range of infrastructure Management Domain Services, covering Build Server, Log Server, Event Server, Monitoring Solution, Patch Server, as well as a Remote Access Workstation. Includes a mail service, for alerting and reporting management, and a backup service. Complete Virtual solution.

Mobile App design & build

Createful Ltd

We specialise in the design and development of bespoke mobile applications for both iOS and Android. Our user centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop and deliver on time and within budget. All work undertaken from our studio in Bournemouth, Dorset.

Okta Identity Management as a Service

BLUE Profile

BLUE Profile are a strategic Managed Services Partner powered by Okta. The Okta Identity Cloud connects thousands of companies to thousands of pre-integrated apps and millions of devices every day. Solutions covering Single Sign On (SSO), Multi-Factor Authentication and Identity Management all born and built in the cloud.

Tenable IO

Sapphire

A cloud-based vulnerability management solution. Built on the leading Nessus technology from Tenable, Tenable.io brings clarity to your security and compliance posture through a fresh, asset-based approach that accurately tracks your resources and vulnerabilities while accommodating dynamic assets like cloud and containers.

Mydex Cluster Collaboration Platform

Mydex Data Services Community Interest Company

The need for locally integrated services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. Our collaboration platform allows organisations across varying sectors and regulatory environments, working in 'clusters', to deliver joined-up services.

Cloud Access Service Broker

E-Share

We sit between the cloud service consumer and the cloud service povider to provide enterprise security policies including the encryption of data, device profiling, single sign on etc. Senior Management can also gain visibility, management and control of data at all times.

Prolinx Hosted Platform (PHP) - Security Incident and Event Management (SIEM) as a Service

Prolinx Ltd

SIEM as a Service from Prolinx provides 24/7 proactive management for your operational business. Reducing risks associated with today’s complex Cyber threat landscape. This service is tailored to meet your organisational requirements, available across all security classifications, Prolinx use an approved product with highly experienced security cleared staff.

Investigation Case Management (OFFICIAL to IL2)

Blackthorn GRC Limited

The Blackthorn Case Management Solution (CMS) for immigration investigations allows users to capture, organise and manage information pertinent to an investigation and pending prosecution, with full audit and management reporting. The service is UK hosted to IL2/OFFICIAL on fully resilient infrastructure.

Office 365 Provisioning, Migration & Support

Endeavour Information Solutions

The challenge of Office 365 is ensuring you are making the most of the service being provided. We are a 1-Tier Microsoft CSP Provider providing government licensing directly to you and our team can design, migrate and support your organisation's transition to Office 365 under comprehensive all inclusive pricing structure.

MooD Software Components

Mood International Software Limited

MooD Business Architect, MooD Active Enterprise and MooD Edge components which can be used to build bespoke MooD Cloud Solutions.

Okta - Identity Management

Somerford Associates Limited

Okta is the foundation for secure connections between people and technology. Using identity information to grant access to applications on any device at any time, while still enforcing strong security protection.

Office 365 Auditing

Gaia Technologies Plc

This is a service that helps your organisation manage visibility and governance over configuration changes and access to cloud environments to protect your data. We will provide you security analytics to detect anomalies in user behaviour and investigate threat patterns before a data breach occurs.

Federate On Demand (FOD) Solution Suite

Trustis

FoD, based on ForgeRock, Verisec and Okta, delivers Single Sign On to securely access Department, Cloud, Shared Service, Pan-Government applications using 'trusted' credentials. FoD components include Attribute Provider, Directory, IdP, Matching Service and User Management services to manage both Internal and External authentication and authorisation of all user communities.

Virtual Data Room

E-Share

Organisations can use the public cloud with E-Share, to create a cost effective fully encrypted Virtual Data Room. The VDR has no time penalties, larger files can be sent, access controls with granular permissions and revocation can be set, with real time auditing. The recipient does not need software.

Okta

Landscape Networks Ltd

Okta is the foundation for secure connections between people and technology. Using identity information to grant access to applications on any device at any time, while still enforcing strong security protection

Records Management

1Tech Limited

1Tech’s Records Management Platform is an enterprise platform for building Records Management solutions that deliver immediate results and long-term value. Encompassing Alfresco Community Edition, providing: • Web Content Management • Mobile Content Management • Document Management • Records Management • Business Process Management • Integrated Workflow

Mydex Consent Management

Mydex Data Services Community Interest Company

Meeting Data Protection compliance regulation, including GDPR, requires informed consent by individuals for the use and sharing of their data. Consent Management enables organisations to integrate seamless consent journeys into existing services, uniquely equipping the individual with a consent management dashboard for the use of personal data across any sector.

Intelligent Automation and Service Management - Intuition

Celerity Limited

Intuition provides end-to-end visibility of your IT infrastructure and business services via a single pane view. The tools perform initial discovery to build an inventory of all elements with intelligent automation, provisioning, updating, patching, alerting and reacting to events to prevent service disruption.

Splunk Enterprise

Somerford Associates Limited

Splunk Enterprise monitors and analyses machine data from any source to deliver Operational Intelligence to optimise your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, Splunk Enterprise is a flexible platform that scales from focused use cases to an enterprise-wide analytics backbone.

CloudControl

HyTrust

HyTrust CloudControl provides customizable role and object based access controls, audit quality logging and policy enforcement for VMware environments including NSX. These key capabilities allow organisations to automate security and compliance requirements mandated by a broad range of industry and government standards.

The Learning Cloud

New Era Education Ltd

The Learning Cloud combines our innovative collaboration, learning and assessment tools with the latest Microsoft, Google and educational cloud apps to deliver, manage and access learning anytime; anywhere. Users, security and identity management are seamlessly integrated ensuring that users can easily gain access to all their information, resources and applications.

IBM Aspera Files for secure and rapid data transfer (SaaS for OFFICIAL)

IBM United Kingdom Ltd

IBM Aspera Files is a fast, secure, scalable SaaS offering for sharing large files and data sets in an easy drag-and-drop process, directly from cloud and on premise storage – located anywhere, to anywhere, with anyone. Uses may include Police evidence management.

Digital Managed Services

Panlogic Limited - Digital Engineering

Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

GPG13 Protective Monitoring DETER

Assuria

The GPG-13 Protective Monitoring Service helps your organisation meet HMG Security Policy Framework (SPF) requirements and CESG GPG-13 guidelines. We deliver as a managed cloud based Monitoring and Reporting Service, independent of your IT infrastructure provider to give a completely independent view of any security events and a security oversight.

DXC Technology Managed Security Incident and Event Management

EntServ UK Ltd part of the DXC Technologies Group

DXC Technology security experts deliver 24x7 monitoring, triage, and validation for correlated events from our Security Operations Centers (SOCs), which use class-leading technology. DXC's services are operated by security experts who understand the broader security and IT technologies.

Insider Threat Prevention

BAE Systems Applied Intelligence Limited

Insider Threat Prevention (ITP) helps guard against motivated malicious insiders and accidental negligence by employees to greatly reduce corporate data loss. Includes industry-specific policy packs to help with the compliance of GLBA, HIPAA, and PCIDSS for hardened protection against confidential and proprietary information loss.

Online Questionnaires, Forms and Surveys

Blackthorn GRC Limited

Our Online Questionnaires, Forms and Surveys solution enables users to create and publish online surveys in minutes, and to reach out to respondents both inside and outside of organisational boundaries. UK hosted to IL2/OFFICIAL.

AI.PROTECT

Automated Intelligence Limited

AI.PROTECT provides attribute based security for SharePoint. Organisations can have security on any information element based on it's metadata in real-time. Changes in security policy can be implemented instantly through business based decision and actions rather than through IT led activity.

CoreGov - SharePoint Application Development

Core

SharePoint is an open platform that allows for many different technologies to be applied that will enhance business value through custom, tailored applications.

Immigration Enforcement Case Management

Blackthorn GRC Limited

The Blackthorn Case Management Solution (CMS) for immigration investigations allows users to capture, organise and manage information pertinent to an investigation and pending prosecution, with full audit and management reporting. The service is UK hosted to IL3/OFFICIAL SENSITIVE on fully resilient infrastructure. Solution supports electronic data exchange with CPS.

Civica ESSA BOF

Civica UK Limited

The ESSA‐BOF is a powerful and fully scalable web based solution designed to manage complex single site or multi‐site ANPR systems. The solution is capable of managing solutions for high‐end users within the corporate, retail, customs and local government sectors.

Investigation Case Management (OFFICIAL to IL3)

Blackthorn GRC Limited

The Blackthorn Case Management Solution (CMS) for immigration investigations allows users to capture, organise and manage information pertinent to an investigation and pending prosecution, with full audit and management reporting. The service is UK hosted to IL3/OFFICIAL SENSITIVE on fully resilient infrastructure. Solution supports electronic data exchange with CPS.

Virtual Cyber Security Operations Centre (vSOC)

Research Series Limited

vSOC service is designed to support organisations requirement for Cyber Security & Security Monitoring. Allowing for requirements gathering, design, handover and training of staff to operate the Cyber security operations centre. The vSOC service – CSOCs, SSOCs, SIEM allows protective monitoring logs, threat intelligence feeds, CERT and vulnerability information fusion.

Splunk Cloud & Enterprise Logging & Analytics

Converging Data

Splunk is the easy, fast and secure way to search, analyze and visualize the machine data generated by your IT systems and technology infrastructure—physical, virtual and in the cloud. Use Splunk Cloud and Enterprise in any combination and always have a unified view, and the same set of features.

Twilio Account Security

Twilio

Strengthen the traditional username and password login for internal IT, websites and mobile apps

Cloud Defender

Alert Logic UK Ltd

Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.

Incident Response Case Management

Blackthorn GRC Limited

This service allows reactions to (security) incidents to be immediate and thorough. Create an incident record, assign a team, associate evidence and supporting material, progress the investigation with workflow and report back into the organisation all from one interface. UK hosted and suitable for up to IL3/OFFICIAL SENSITIVE data.

Email Protection Services

BAE Systems Applied Intelligence Limited

BAE Systems EPS bundle includes signature based AV/AS, Encryption, Archiving, as well as our Zero Day Prevention and Insider Threat Prevention modules

Proact Security Incident and Event Management (SIEMaaS)

Proact IT UK Limited

Security Information and Event Management (as a Service)

CyberFoundry Managed Protective Monitoring Service

Infinity Gate

The Infinity Gate CyberFoundry service enables you to collect, analyse, report and alert on Cyber Threats and insider abuse occurring on your IT infrastructure (On-Premise or Cloud). Combining the power of our platform with secure collection agents we can reliably and securely collect real-time data from virtually any data source.

IBM Qradar on Cloud

IBM United Kingdom Ltd

QRadar on Cloud integrates SIEM, log management, anomaly detection, vulnerability management, risk management and incident forensics into a unified, highly scalable, real-time solution that provides superior threat detection, greater ease of use, and low total cost of ownership compared with competitive products

Hashicorp Product Suite

Amazic

Hashicorp offer an ecosystem of tools with the goal of revolutionising datacenter management: application development, delivery, and maintenance.With tools like Consul, Nomad, Vault, Terraform, Packer and Vagrant, Hashicorp offers a complete stack of tools to ensure that you can minimizing the challenges of shipping, rapidly iterating, and securing software applications.

Clue3 - Case management and intelligence software

Clue Computing Company

A single application to manage investigations – encompassing referral, incident, risk, intelligence, investigation, case and outcome management. Comprehensive reporting, searching and data analytics across the application, to help uncover actionable intelligence in data, with real time access anywhere on any device. For fraud, organised crime, corruption, economic crime and more

Data encryption as a Service

Trustis

Trustis offers a high-performance data security platform, powered by Vormetric, that encrypts data-at-rest – of any file, database or application in any server environment, whether physical, virtual or in the cloud. Hosted and expertly managed in the UK while, crucially, you retain complete control over your encryption keys.

Mydex GDPR Compliance Package

Mydex Data Services Community Interest Company

The GDPR, compulsory from May 2018, requires new levels of support for transparency, informed consent, and data portability, on-going access to personal data, information about its use and sharing with third parties. We address these requirements in one simple set of API services that can be integrated into existing environments.

Website design & build

Createful Ltd

We specialise in the design and development, support and maintenance of open source CMS driven websites. Our user centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop and deliver on time and within budget. All work undertaken from our studio in Bournemouth, Dorset.

Microsoft Azure AD Auditing

Gaia Technologies Plc

This is a service to help you maximize visibility into user actions in your cloud-based Active Directory by helping you track and report on security and configuration changes, and enables Azure AD access control by reporting on both successful and failed sign-ins to your cloud directory service.

Symantec Managed Security Services (MSS)

Symantec (UK) Ltd

Symantec Cyber Security Services: Managed Security Services minimise the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security

Zero Day Prevention

BAE Systems Applied Intelligence Limited

Our Zero Day Prevention service provides a powerful defence against targeted attacks, spear and "logline" phishing and zero day exploits. Leveraging leading-edge statistical analysis, static and dynamic analysis and machine learning, zero day prevention detects and prevents attacks without the need of a signature.

Ascema Data Loss Prevention and Classification

GeoLang Limited

Ascema offers classification and sentence level data loss prevention (DLP) with seamless integration with third party enterprise applications. Ascema is a next generation DLP solution - classifying and protecting official and official sensitive information at a level of granularity not previously seen whilst easy to deploy and simple to use.

Bramble Hub Membership Engagement Services - MES Experience

Bramble Hub Limited

MES Experience is the leading real-time platform for capturing, analysing and reporting on patient and staff experiences including the NHS Friends and Family Test. It provides multi-channel data collection, bespoke reporting, a unique solution for automated free-text analysis of patient comments, and is built in partnership with our NHS clients.

Splunk Enterprise Security (SIEM)

Somerford Associates Limited

Splunk Enterprise Security is a SIEM that provides insight into machine data generated from security technologies such as network, endpoint, access, malware, vulnerability and identity information. It enables security teams to quickly detect and respond to cyber attacks to simplify threat management while minimizing risk and safeguarding your business.

DTMF Call Masking

allpay Limited

The Call Masking solution allpay provide is a DTMF (dual tone multi frequency) tone masking product which is integrated within our Virtual Terminal, Callpay. This allows call centre environments to become fully PCI DSS (Payment Card Industry Data Security Standard) compliant when taking payments over the phone.

Dimension Data Correlated Log Analysis - NTT Security

Dimension Data Network Services Limited

Identifying security incidents through the analysis of log information provided from various systems across the clients network.

Anomali Threatstream Threat Intelligence Platform

Anomali Inc

Threatstream collects, curates and provides threat intelligence data from 230 open source and numerous paid threat intelligence feeds. Data is normalized and de-duplicated for false-positive reduction so it can be explored and made strategic, tactical, operational and technical. Provides indicators of compromise (IOCs), attacker techniques/methodologies, and high level risk information.

IBM Software as a Service

All Blue Solutions Ltd.

All Blue Solutions is a global premier IBM Business Partner, providing IBM Software as a Service, with simple, fixed monthly pricing, including; software licensing, 24x7 operations, installation and upgrades, monitoring, security and much more. Transform your IBM experience with All Blue Solutions.

e2e Cloud Protective Monitoring and SOC Service

e2e-assure Ltd

Incident Response, Case Management, Asset Management, log event alert security monitoring, DETER, GPG-13, threat intelligence, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, Open Source, Risk analysis, packet capture, OFFICIAL-SENSITIVE, Situational Awareness, Audit Compliance, Cyber Defence, Correlation, Malware analysis, Privileged User Monitoring, Mobile Devices MDM, Proactive, Vulnerability Assessment, Cloud Security Monitoring

DataControl

HyTrust

HyTrust DataControl offers powerful, data-at-rest encryption with integrated key management to secure VMs and their data throughout their lifecycle - from deployment to decommission.

Cloud Security Advice

Roke Manor Research

Independent advice that Cloud Services and hosted Applications are designed and implemented to mitigate the cyber threats which are posed to them, whilst remaining available to users in-line with user expectations or Service Level Agreements. Roke provides secure design, source code and configuration reviews to increase the Cloud service robustness.

BetterCloud for G Suite

Netpremacy Limited

A comprehensive security, 360-degree management and automation platform built for all G Suite customers, BetterCloud is the number one security, management and process automation tool for your G Suite solution. The unified suite of tools offers all of the controls you need for IT Department, Service Desk to SIRO.

Civica ESSA-CPASS

Civica UK Limited

CPASS is an advanced Automatic Number Plate Recognition (ANPR) software based Vehicle Monitoring, Access Control and Site. The software provides a simple and intuitive interface for the monitoring/control of vehicle movements. Available as a ‘Stand Alone’ PC based solution or networked ‘Web Based’ solution remotely accessible via a web browser.

AI.PROTECT

Softcat Limited

AI.PROTECT provides attribute based security for SharePoint. Organisations can have security on any information element based on it's metadata in realtime. Changes in security policy can be implemented instantly through business based decision and actions rather than through IT led activity.

Control Room Solution

Airwave

Integrated Communications Control System(ICCS) hosted within Airwave's secure private cloud or buyer's private cloud. Including automatic call distribution(ACD) and bulk voice recording capabilities. Control Room Solution is integrated with the Airwave radio network,ESN,PSTN,999(EISEC),and customer systems enabling seamless dispatching and call-taking. This describes the Premier offering. See ServiceDefinition for other Tiers.