-
ICYBERDEFENCE LIMITED
Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.
-
Texuna
IoT Data Collection and Visualisation Solution to standardise data management from satellite or cellular connected sensors, devices and hubs for presentation in a user-friendly interface. Suitable for smart sensors in urban cities, rivers, remote waterways, FIELD harnesses low cost long term IoT connectivity for better decision-making and enhanced operational efficiency.
-
Grove Information Systems
Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.
-
Track24 Limited
AtlasNXT uses location intelligence to solve security, duty
of care, communication and operational challenges. It is
designed to optimise user adoption by offering a
unified, intuitive experience built on privacy-first principles.
We transform modern-day operational delivery, through AI-based automation improving
cost efficiencies, whilst boosting productivity, employee
satisfaction and trust.
-
Bounce Agency
The SIM Antisocial Behaviour Manager offers a centralised platform for managing incidents, analysing data, and coordinating responses, enabling you to address community concerns swiftly and efficiently.
Incident reporting, case management, data analysis, and community engagement tools help Local Authority Community Safety Teams strengthen collaboration with residents to foster safer communities.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
BOXXE LIMITED
Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.
-
IRIS Intelligence Ltd.
IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
SYMBIANT LTD
Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.
-
apto solutions limited
Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Somerford Associates Limited
SecurityScorecard’s Attack Surface Intelligence detects more unknown
unknowns, including those of your third-party vendors and how they pose
a risk to your business, arming you with deep contextual insights and
attribution to prioritize your next steps - all in one single platform.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
CyberIAM Holdings Ltd
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
Bytes Software Services
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
Blue Lights Digital
Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.
-
Bytes Software Services
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc
-
HCL Technologies UK LImited
Rapid Application Development IDE
Rapid App Development (RAD) platform with power of custom coding, help enterprises build and launch applications faster.
Application development platform for building unified digital experiences across all channels.
Create mobile and desktop applications in a low code environment.
Mobile Application Development.
Multi-experience Development Platform.
-
Jigsaw24
Jamf lead on Apple device management, building Unified Endpoint Management solutions specifically for the Apple ecosystem. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.
-
BLANKBOX TECHNOLOGIES LTD
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
Network Utilities (Systems) Ltd
Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat.
Including application management for whitelisting and blocking of running applications.
-
INTEGRITY360 LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
INTEGRITY360 LIMITED
Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort.
-
KGN Software Ltd
KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.
-
MOODY'S ANALYTICS UK LIMITED
PassFort is a SaaS RegTech provider whose platform automates financial crime & compliance processes. We are on a mission to digitally transform the way compliance professionals work, breaking the compromise between compliance and customer experience in the fight against financial crime.
-
ParentPay Limited
Schoolcomms is an all-in-one solution for income collection, meal management and parent engagement, via an app. Communications can be sent by email/SMS /in-app messaging. From collecting online payments for trips, events, booking clubs & meals, publishing behaviour & achievement reports and attendance reporting in a configurable, paperless, online system.
-
QUADRIS LIMITED
Comprehensive application security for organisations serious about securing websites, applications and networks to provide best-in-class availability and protection for your users and reputation. Mitigate security threats with this wide ranging suite of functionality providing deeper protection, automation and containment, including same day blocking of zero-days, to attain world class security.