-
Intercity Technology Limited
Managed Check Point Harmony delivers unified cybersecurity solutions. It protects endpoints, networks, and cloud environments with advanced threat prevention. Centralised management ensures visibility and control, seamlessly integrating with existing infrastructure, enhancing security posture and compliance. Ideal for businesses seeking comprehensive, cloud-managed cybersecurity solutions.
-
CDW Limited
Leveraging Fortinet’s FortiSIEM and FortiSOAR, the Protective Monitoring and Automated Remediation solution offers users deep multivendor integration for configuration, change management, log collection & correlation, and Indicators of Compromise to detect and contextualise threats in real-time. Automated remediation through playbooks provides a seamless mitigation capability to security teams.
-
Digital Craftsmen Limited
Fully-managed, highly-secure Drupal cloud hosting for public and third-sector organisations who want complete peace of mind with their cloud infrastructure. Supported by a 24/7/365 UK-based service desk, full ITIL documentation, a 99.95% availability guarantee, fully qualified architects and a dedicated account manager.
-
NHS Shared Business Services
NHS Shared Business Services (NHS SBS), supplies cloud hosting services for Robotics Process Automation (RPA).
This means we support users in running automation at scale in a safe and efficient manner by providing hosting services no matter which Business Automation Platform.
-
DATAQUEST (HEATHROW) LIMITED
We offer a fully proactive managed IPS/IDS solution to block unwanted traffic from entering your network. MFA and SSO capabilities can also be optionally added. Addtional benefits, include Qualys vulnerability reporting and proactive remediation.
-
Core
Core End User Compute Service delivers Virtual Personal Desktop or Physical laptop/tablet device running suitable enterprise versions of Windows 10/11 with a secure (Official) configuration/MacOS devices using native OS with Application Management. The service includes management and support of the users smartphone (Corporate issued MDM / BYOD MAM).
-
Softcat Limited
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.
-
INTEGRITY360 LIMITED
Network Access Control (NAC) is a critical component in the modern-day network. NAC offers organisations the ability to deploy Zero Trust Network Solutions, Secure SD Branch Deployments and ensure IoT, BYOD and user devices are profiled, only allowed to access approved resources and periodically reviewed for compliance.
-
CDW Limited
Palo Alto Networks Next-Generation Firewalls and Security Operating Platform is the industry’s most advanced prevention solution for highly evasive zero-day malware/exploits. Our service uses unique approaches that combine dynamic/static analysis, innovative machine learning (AI) techniques, and an advanced analysis environment to detect and prevent evasive cyber threats.
-
Softcat Limited
Amazon Inspector is an automated vulnerability management service that continually scans Amazon Elastic Compute Cloud (EC2), AWS Lambda functions, and container images in Amazon ECR and within continuous integration and continuous delivery (CI/CD) tools, in near-real time for software vulnerabilities and unintended network exposure.
-
CSI Limited
Partnered with Dell EMC, CSI utilises NetWorker to provide a managed service to centralise, automate and accelerate your data backup and recoveries across your IT environment which improves flexibility and performance to your systems and can be provisioned in a Private, Public or Hybrid Cloud platform.
-
Creative Networks
Cisco Meraki provides cloud-managed networking and security solutions for businesses. Offering wireless access points, switches, security appliances, and mobile device management tools, all centrally managed through a user-friendly dashboard, Meraki delivers simplicity, scalability, and enhanced security for organisations of all sizes.
-
Accenture (UK) Limited
Accenture Private Cloud is an infrastructure asset that is fully managed, secure, reliable. It is designed to support Accenture's Business Services in operating their IT infrastructure according to their specific requirements while strictly adhering to Accenture's standards and client data protection. Provides virtual private, dedicated private, and hybrid cloud solutions.
-
Big Blue Door Ltd
Our team of certified cloud engineers offer managed shared hosting cloud solutions on shared servers at low cost with levels of security traditionally available via dedicated servers. These shared hosting servers are performance-optimised for use with Drupal, Wordpress, Symfony, and other popular PHP frameworks.
-
INTEGRITY360 LIMITED
Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.
-
tmc3 Limited
tmc3's OT SOC provides a fully outsourced 24/7x365 MDR capability optimised for OT environments. We utilise our technology platforms, security analysts knowledge and experience to enable holistic ICS protection. This includes SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management ensuring robust defence across critical IT and OT systems.
-
Phoenix Software Ltd
Leveraging Fortinet’s FortiSIEM and FortiSOAR, the Protective Monitoring and Automated Remediation solution offers users deep multivendor integration for configuration, change management, log collection & correlation, and Indicators of Compromise to detect and contextualise threats in real-time. Automated remediation through playbooks provides a seamless mitigation capability to security teams.
-
Nettitude Limited
Prisma-Access is a cloud-delivered zero-trust platform providing secure-access cloud and on-premises applications. Using advanced threat prevention capabilities, it protects users, devices, and data from cyber threats. The service provides simplified-management, visibility, scalability, and flexibility to accommodate the needs-of-organizations. Prisma-Access ensures secure-access to applications while providing comprehensive protection and centralized control.
-
Softcat Limited
Cloud Gateway offers flexible networking and security solutions, rapidly connecting you to multiple cloud providers, the HSCN, PSN and internet. We build and manage your bespoke SASE solution. As a trusted public sector provider we hold Cyber Essentials Plus, ISO27001 and ISO9001 accreditations.
-
Howell Technology Group Limited
We deliver Azure Virtual Desktop (AVD) and offer an end to end, bespoke managed service. Built upon cutting-edge, enterprise-grade technology to guarantee outstanding performance, our in-house solutions experts can design and build a solution to meet your needs.
-
UST Global Pvt Ltd
A systematic review of systems, networks, and applications to identify potential weaknesses that could be exploited by malicious actors, by simulating real-world attacks to exploit vulnerabilities identified.
-
PMD Data Solutions Limited
Provision of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service).
Partner technologies include Barracuda, AvePoint, Redstor, Trustwave, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce, SIMS data and Azure workloads.
-
UST Global Pvt Ltd
Manage, maintain and operate security platforms to support security operations activities, covering SIEM and datalake platforms providing health, availability & performance monitoring, policy configurations & change management.
-
BCN Group Ltd
BCN's Private Cloud provides secure, scalable, and bespoke IT solutions for NHS Primary Care, Acute, Mental Health, Community Care, Integrated Care system, ICS, Integrated Health Board and ICB.
-
INGENTIVE LIMITED
Ingentive's CSPM Regulatory Compliance platform streamlines cloud security compliance, offering a comprehensive overview of an organisation's cloud environment.
It enables critical configuration and regulatory adherence, seamlessly integrated with cloud services for unified security. Ingentive's CSPM confidently manages cloud security, reducing non-compliance risk and defending cyber threats and cloud regulatory challenges.
-
Bytes Software Services
Access to all of AWS Cloud Hosting and SaaS services, with over 200 services available, this provides the greatest flexibility to pick and choose you AWS current and future needs. bssgc
-
Vizst Technology
We provide DNS, DHCP and IP Address Management (DDI) to simplify and unite networking and security. Enable greater network performance and protection with a single, secure and resilient solution from leading vendors such as Infoblox, with their cloud-native BloxOne platform.
-
AI TECHNOLOGIES LIMITED
management of cloud infrastructures based on vendors or proprietary hardware and software including specialised cybersecurity vendors (Darktrace, SPlunk, logrythm etc.) and generalists (AWS, Azure, IBM, Gcloud etc.)
-
Vizst Technology
Vizst Technology’s network security solutions include firewalls, SD WAN and SASE solutions enabling flexible and secure connectivity between distributed users, branches, cloud platforms and SaaS applications to securely connect your workforce. Enhance your network with solutions from leading vendors including Palo Alto, Fortinet and Cato.
-
INTEGRITY360 LIMITED
Varonis specialize in software for data security, governance, compliance, classification, and analytics. Varonis detects insider threats and external cyberattacks like ransomware by analyzing cloud data stores and monitoring user behavior, mitigating risk in M365, Teams, Salesforce, Slack, Box and on-premise file servers by locking down sensitive data and remediating access.