-
SOFTCAT PLC
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.
-
SOFTCAT PLC
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
LEIDOS INNOVATIONS UK LTD
Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.
-
PHOENIX SOFTWARE LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
LEFKE IT LIMITED
At LefkeIT, our Hybrid Docker Deployments service is tailored for Government Departments, offering versatility and scalability in application deployment. We specialize in deploying Docker containers across both on-premises data centers and public cloud environments, ensuring flexibility and resource optimization.
-
ITHQ LTD
Backup-as-a-Service (BaaS) simplifies backup further, giving your IT team the time to concentrate on more business critical tasks instead of spending all their time managing backups.
Our BaaS solution is powered by Rubrik technology which eliminates the need for backup and search servers, disk backup and tape archive.
-
VIABLE DATA LTD
Viable Data offer cloud-based identity assurance solutions, leveraging cloud-based solutions and tailoring our in-house intelligent identity verification solution, LearnID®, to meet your organisation’s specific identity assurance needs. Utilising our expertise in biometrics and security controls, we offer biometric and identity solution design, build and implementation.
-
CDW LIMITED
Cloud solution of the office suite of applications, including Teams, Yammer, One drive, Stream, SharePoint and productivity suite (word,ppt,XL)
-
Gradian Systems Ltd
Broadcom offers the first CASB mirror gateway, a unique and more secure, resilient method to enforce in-line visibility, data security, and threat
protection over the use of any sanctioned cloud app from unmanaged
endpoints
-
INTEGRITY360 LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Auditor is a powerful platform designed to enhance security and compliance by providing comprehensive visibility into IT infrastructure changes and data access. It enables real-time monitoring, auditing, and reporting across a variety of systems, applications, and files, helping organizations ensure data integrity and regulatory compliance. bssgc
-
BT PLC
CrowdStrike Falcon for IT, a module of the leading AI-native CrowdStrike Falcon platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.
-
NOC365 LTD
Sophos provides security to protect Windows, Mac and Linux systems against malware and advanced threats. The Sophos Central platform provides one unified console to manage the suite of security solutions which includes: Sophos Intercept X, Sophos Endpoint Protection, Sophos Email Scanning, Sophos XG Firewall, Sophos Cloud Optix, Sophos Mobile Security
-
SAPPHIRE TECHNOLOGIES LIMITED
Dot™ conducts asset discovery and vulnerability management to generate a comprehensive picture of your operational technology networks. Through the use of security-by-design and safety-critical scanning technology, our solution supports both modern and legacy networks, and leverages exclusive active scanning software.
-
SOFTCAT PLC
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,
-
Espire Infolabs Ltd
Espire helps companies to re-engineer their application landscape for seamless interoperability and interaction between disparate systems. Espire provides effective strategies and solutions against security and compliance challenges based on the industry's standards and all cloud platforms (IaaS ,SaaS, and PaaS environment). Espire provides SOC Consulting, Implementation and Managed services.
-
Planet IT
Barracuda Email Protection combines Barracuda's complete email protection portfolio in a single bundle. This includes the following: all-in-one email security, backup and archiving for O365. A.I based protection from spear phishing, account takeover and business email compromise. Anti-phishing training and simulation platform. Barracuda Forensics and Incident Response.
-
Barrier Networks
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
CDW LIMITED
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.
-
Gradian Systems Ltd
Extends data loss prevention across the enterprise, detects insider risks, and protects critical information from exfiltration
-
BOXXE LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
INTEGRITY360 LIMITED
BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides comprehensive Workday Training and Education services tailored for government personnel. Our programs equip teams with the skills to effectively utilize Workday systems, enhancing productivity and optimizing human resources and financial management through expert-led courses and hands-on practice.
-
CYBER SECURITY DEFENCE CONSULTANTS LIMITED
The platform provides individuals or teams of up to 12 persons working together to analyse a simulated attack in a variety of virtual networks using industry standrad tools such as Splunk Enterprise Security Edition, Palo Alto firewalls etc.
-
SOMERFORD ASSOCIATES LIMITED
Okta is a leading identity and access management solution providing single-sign on, multi-factor authentication and provisioning capabilities for all applications.
Okta is the foundation for secure connections between people & technology. Using identity information to grant access to applications on any device at any time, enforcing strong security protection.
-
RPOST UK LIMITED
RMail® harmoniously integrates into any existing security stack, complementing it with enterprise-grade privacy, security, and compliance functionalities. Our flexible deployment options allow organizations to automate feature combinations at the server level, as well as in the inbox, with out-of-the-box integrations for common business tools like Microsoft Outlook, Salesforce, and more.
-
CDW LIMITED
Rubrik provides policy-based protection of Microsoft 365 via its Rubrik SaaS platform. Built on a zero trust architecture, assuming all users, devices and applications are untrustworthy and can be compromised, the solution offers unprecedented security, simplicity and performance for search and restore operations across Exchange Online, OneDrive, SharePoint, Teams.
-
XPERTEX LTD
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
MTI TECHNOLOGY LIMITED
MTI's Anti Malware Solution combines Trend Micro's market leading, next generation server and endpoint protection with MTI's 30 year experience of protecting UK Public Sector. The solution is delivered from our UK based 24*7*365 operations center and based around Trend Cloud One Workload Security and Endpoint Protection suites.