-
Cornerstone OnDemand
Unified Human Capital Management combines our core solutions, Recruiting and Onboarding, Learning and Performance-Management with Cornerstone’s core HR-Management solution. One platform for Recruitment, Onboarding, Learning, Skills Development, Goals, Performance, Careers, Succession, HR,Planning. HCM Solutions are available as standalone modules.Our solutions are tightly integrated with the addition of Talespin, virtual-reality learning.
-
BYTES SOFTWARE SERVICES LIMITED
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
MICRO FOCUS
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
BOXXE LIMITED
CloudHealth is the most trusted software platform for accelerating global business transformation in the cloud. Now part of VMware, CloudHealth is the enterprise platform of choice for more than 7,000 organisations worldwide that rely on it to optimise, secure, and govern the largest and most complex multi cloud environments.
-
GOVFORMS LIMITED
Proven Gov forms digital service builder cloud software delivers out-of-the-box, cost effective, creation of digital journeys, forms or surveys for HM Government and Local Authorities. Easy to use browser-based SaaS. GOV.UK design patterns. GDS accessibility compliant. No coding needed. Submit data with APIs. Integrate with: Microsoft, Salesforce, ServiceNow and more.
-
AIIMI LIMITED
The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.
-
ICYBERDEFENCE LIMITED
Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.
-
TEXUNA TECHNOLOGIES LTD
IoT Data Collection and Visualisation Solution to standardise data management from satellite or cellular connected sensors, devices and hubs for presentation in a user-friendly interface. Suitable for smart sensors in urban cities, rivers, remote waterways, FIELD harnesses low cost long term IoT connectivity for better decision-making and enhanced operational efficiency.
-
Grove Information Systems
Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.
-
Track24 Limited
AtlasNXT uses location intelligence to solve security, duty
of care, communication and operational challenges. It is
designed to optimise user adoption by offering a
unified, intuitive experience built on privacy-first principles.
We transform modern-day operational delivery, through AI-based automation improving
cost efficiencies, whilst boosting productivity, employee
satisfaction and trust.
-
BOUNCE AGENCY LIMITED
The SIM Antisocial Behaviour Manager offers a centralised platform for managing incidents, analysing data, and coordinating responses, enabling you to address community concerns swiftly and efficiently.
Incident reporting, case management, data analysis, and community engagement tools help Local Authority Community Safety Teams strengthen collaboration with residents to foster safer communities.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
BOXXE LIMITED
Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.
-
IRIS INTELLIGENCE LIMITED
IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
SYMBIANT LTD
Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.
-
APTO SOLUTIONS LIMITED
Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.
-
SECURECLOUD+ LIMITED
Securely ingest data from multiple networks/classifications in real-time for analysis, alerting and visualisation using COTS tools or open-source cloud native software. The service can be used for sensor data analysis, predictive data-driven maintenance, geospatial visualisation, sharing situational awareness, alongside integrated AI/ML pipelines for advanced data analysis and enhanced decision making.
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
SOMERFORD ASSOCIATES LIMITED
SecurityScorecard’s Attack Surface Intelligence detects more unknown
unknowns, including those of your third-party vendors and how they pose
a risk to your business, arming you with deep contextual insights and
attribution to prioritize your next steps - all in one single platform.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
CYBERIAM HOLDINGS LIMITED
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
Blue Lights Digital
Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.
-
BYTES SOFTWARE SERVICES LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc
-
HCL TECHNOLOGIES UK LIMITED
Rapid Application Development IDE
Rapid App Development (RAD) platform with power of custom coding, help enterprises build and launch applications faster.
Application development platform for building unified digital experiences across all channels.
Create mobile and desktop applications in a low code environment.
Mobile Application Development.
Multi-experience Development Platform.
-
BLANKBOX TECHNOLOGIES LTD
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
Network Utilities (Systems) Ltd
Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat.
Including application management for whitelisting and blocking of running applications.