-
TRUSTMARQUE SOLUTIONS LIMITED
Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT/Partners/MSPs move faster, tighten security and control hybrid Office365 environments. Migrate, manage, report, secure and recover hybrid AD/Office 365 workloads across all tenants from a single dashboard. One-stop platform for secure SaaS solutions for Office365 migration, management, security.
-
NEXUS OPEN SYSTEMS LIMITED
Nexus Managed M365 Defender Endpoint Security gives your organisation the latest best in class Anti-Virus Endpoint Security and Email Security without the headache. The service is built around a simple per device per month cost. Updates and upgrades included.
-
NETCOMPANY UK LIMITED
Amplio provides a framework to facilitate regulated case management and processes, creating event-based, data-driven journeys with tools for digitising, automating, and controlling such solutions. Amplio performs task management alongside robust support to produce and control case documents and guide users through processes, optimising complex flows via configurable business-driven models.
-
Computacenter (UK) Ltd
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.
-
Fusion Business Solutions (UK) Limited
BMC Client Management optimises your service management cloud solution to provide comprehensive, automated endpoint management, delivery of great service to end users whilst minimising cost, maintaining compliance and reducing security risk. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Client Management.
-
Cornerstone OnDemand
Organisations expect digital transformation projects to improve productivity, reduce search and support costs, and boost innovation across the board. Cornerstone Guide is a robust simple-to- use Digital Adoption and automation platform to onboard users, roll-out changes, enhance productivity, and improve performance with real-time and interactive guides and VR learning
-
PEGASUS LABS PTY LTD
Automate the response to phishing, spam and malware emails based on user reports and global threat intelligence. Reduce the time required for security staff to process email by identifying phishing campaigns and automatically grouping and responding to all emails at once.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Cloud Optimisation Solutions empower organisations to maximise the efficiency and value of their public cloud environments, including Microsoft Azure, AWS, and Google Cloud Platform. Gain control over cloud spending, enhance governance, mitigate risks, and amplify the value derived from cloud deployments.
-
PHOENIX SOFTWARE LIMITED
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
-
Barrier Networks
DNS Detection and Response solution, detects threat activity and stops attacks occurring, using DNS threat intelligence, disrupting attacker supply chains. AI-driven analytics focuses analysts and provides insights reducing MTTR, raise ROI of existing security tools, and elevate SecOps efficiency. Domain Monitoring/Domain Takedown services enable brand protection and combat emerging threats.
-
IOCO SOLUTIONS LIMITED
WithSecure™ Elements Vulnerability Management is an easy-to-deploy, cloud-based vulnerability scanner that covers your network, assets, the deep web and compliance.
-
TETRA TECHNOLOGY LTD
Tetra Connect offers a streamlined solution for the intricate process of identity resolution and person matching, delivering precise outcomes customised to meet your specific requirements.
Our platform simplifies identity resolution, ensuring seamless and dependable operations for your business. By harnessing enriched data insights, we empower you to make informed decisions.
-
METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED
As a fully accredited ServiceNow Reseller, and Consulting and Implementation partner, the Methods ServiceNow Licencing Service provides you the ability to purchase licencing across the full ServiceNow products suite. Our team of certified ServiceNow professionals have the skills to advise on your ServiceNow licencing requirements quickly, effectively, and pragmatically.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) allows you to deploy a business continuity solution for almost any application. Our RPA technology can automate 'snapshots' of 3rd party systems and provide offline, offsite, or redundant access to your data in the event of a 3rd party system outage.
-
SOFTCAT PLC
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
S8080 LIMITED
ISO27001 certified open source, cloud-hosted CMS for digital services and websites. S8080’s GDPR compliant open source CMS platforms securely handle multilingualism, CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around your user’s needs.
-
BRITANNIC TECHNOLOGIES LIMITED
Our Private WAN Service provides organisations with a private MPLS service with centralised Internet breakout and offers very high levels of resilience. Connections range from broadband to mobile to Ethernet. It is fully monitored and enables you to monitor via our reporting suite.
-
Barrier Networks
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
BYTES SOFTWARE SERVICES LIMITED
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation. bssgc
-
SCG CORPORATE LIMITED
Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. KnowBe4 as a service is the world’s most popular integrated platform for awareness training combined with simulated phishing attacks and complete outsourced management makes SCCS a leading provider in cybersecurity awareness training.
-
BROOKCOURT SOLUTIONS LIMITED
DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.
-
Barrier Networks
Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.
-
ParentPay Limited
ParentPay online payments, club & meal management and communications for caterers, MATs and schools, including payments for trips, clubs, school meals, donations, exams and uniform. ParentPay is the UK’s leading provider of online payment, parent communications, income management reporting, meal & kitchen management for schools, MAT’s, local authorities, and caterers.
-
CYBANETIX LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
INTEGRITY360 LIMITED
The XM Cyber platform continuosly and safely runs attack simulations across Hybrid-Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users-user-behavior that can allow an attacker to laterally move /compromise critical assets.
XM Cyber then prioritises the issues/devices/accounts that put the most amount of critical assets at risk.
-
MICROLINK PC (UK) LIMITED
Microlink provides three main areas of Digital Accessibility that includes Web accessibility, mobile accessibility, and PDF remediation. PDF remediation refers to ensuring the usability of PDF documents by disabled people. Alongside this we also offer Assistive Technology (AT) compatibility testing and scripting for the JAWS screen reader.
-
ENTRUST (EUROPE) LIMITED
nSaaS is a subscription-based solution for generating, accessing and protecting cryptographic key material, separately from sensitive data, using dedicated FIPS 140-2 nShield Connect HSMs. This cloud-hosted model gives organisations the option to either supplement or replace HSMs in their data centers while retaining the same benefits as owning the appliances.
-
WARP TECHNOLOGIES LIMITED
As a Microsoft Partner, Warp provide license management services for Microsoft Office 365, Microsoft Office 365 Consultancy and Microsoft Office 365 licensing. Office 365 is a cloud-based subscription service that combines powerful cloud services like OneDrive and Teams, with best-in-class productivity software including Excel, Outlook, Publisher, PowerPoint and Word.
-
IBM UNITED KINGDOM LIMITED
Capture, automate and manage rules-based business decisions such as determining eligibility for a benefit, approving a claim or right to a service, and detecting fraud. An easy to use business rules decision automation platform that anyone can work with to quickly initiate business rules management projects at lower cost. (SaaS).
-
EQUINE REGISTER LIMITED
.Interoperable with the Central Equine Database allows members of the public to view limited non-personal equine identification data held on the CED. Service can be configured to support secure approved user access in addition to public access.