-
COLLABORAITE LTD
Collaboraite® work with you to design secure data & AI solutions to solve your operational challenges, through design thinking and agile delivery. We create:
(a) Bespoke, secure, human-centred solutions leveraging data, analytics and AI capabilities enabling digital transformation.
(b) Data & AI products securely hosted and integrated in Long Arm®.
-
Proact IT UK Limited
Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution
-
WT DATATECH LTD
Our cloud-based Solution offers a straightforward, efficient, and powerful tool for managing all governance, risk, and compliance needs, including ISO standards. Our Compliance Solution combines management system integration and risk assurance software to provide the easiest path for your business to attain and uphold ISO certification.
-
PHOENIX SOFTWARE LIMITED
XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
DIEGESIS LIMITED
Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.
-
SOFTCAT PLC
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
PHOENIX SOFTWARE LIMITED
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
CM Security Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our
cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and
detects advanced threats with AI-powered automation.
-
Blue Lights Digital
COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.
-
OpenSky Data Systems
OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.
-
MTI TECHNOLOGY LIMITED
MTI Managed SIEM (Security Information and Event Management) provides a centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, with SC Cleared analysts, is fully integrated with Alien Vault's market leading technology and offers 24*7*365 assurance to your business.
-
RAPID INFORMATION SYSTEMS LIMITED
The solution is an innovative, data-driven product that streamlines energy billing and compliance. It enhances efficiency, reduces errors, and provides in-depth data analysis. It supports environmental sustainability, and improves social well-being. Key features include energy statement calculations, usage estimates, data reconciliation, cost comparison, and integration with housing and user portals.
-
TRUSTMARQUE SOLUTIONS LIMITED
A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.
-
IBM UNITED KINGDOM LIMITED
IBM® Observability by Instana provides enterprise observability to improve application performance management and accelerate CI/CD pipelines no matter where applications reside – public cloud, private cloud, hybrid cloud, on premises, IBM Z® and more. With IBM® Observability by Instana, users can combine APM with automation capabilities.
-
NEO TECHNOLOGY LIMITED
Neo Technology's AI solution elevates tenant satisfaction and operational efficiency by incorporating features such as virtual assistants, predictive maintenance, automated repairs reporting, and flagging urgent cases that need attention, resulting in proactive issue resolution and enhanced communication channels.
-
Gradian Systems Ltd
Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud
-
MICRO FOCUS
Vertica Accelerator is a cloud‐based Software‐as‐a‐Service(SaaS) that can create, manage,and monitor Vertica databases (only Vertica Eon mode is supported).Vertica Accelerator provides the Vertica database as a service and a control plane that creates Customer database(s)within a customer provided cloud account, manages the infrastructure and operations, and monitors those created database(s).
-
S3 Ltd
Drata is a security/compliance automation platform that continuously
monitors and collects evidence of your security controls, while
streamlining workflows to ensure audit-readiness. It’s an all in one GRC
platform, integrating with all your SaaS services to bring compliance
status of all your people, devices, assets, and vendors into one
place.
-
Formus Professional Software
FormusPro is a certified Microsoft Partner who specialises in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.
-
TRUSTMARQUE SOLUTIONS LIMITED
Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value
-
WR LOGIC LIMITED
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
-
CYBERIAM HOLDINGS LIMITED
CyberIAM's MISP is a Managed Identity Service Platform, offering a set of services tailored to the size and needs of your environment; providing implementation of privileged and identity and access management (IAM and PAM) solutions to protect your identities as well as the management of the software after implementation.
-
APPVIA LTD
A developer self-service platform: Provide self-service capabilities to Developers, ensuring secure and consistent infrastructure and application deployments on Azure, AWS and GCP.
Manage a fleet of Kubernetes Clusters, (GKE, AKS, EKS) and Helm packages with automated workload identities and package up Terraform modules for self-service with application deployment templates.
-
ACCESS UK LTD
Our cloud-based risk and compliance platform helps firms record, track and manage their regulatory and quality standard obligations. The system is used to help them comply with the SRA Standards and Regulations, Lexcel and CQS.
We have designed modules to make it easier to complete common risk and compliance activities
-
SCG CORPORATE LIMITED
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.
-
PANLOGIC LIMITED
Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)
-
CYBERFORT LIMITED
Cyberfort's MXDR defends your organisation from cyber threats 24x7x365. Utilising the right combination of Microsoft Sentinel and Elastic SIEM for each customer, SOAR enables ingest efficiency, increased ROI and reduces cost . Detecting, responding, and remediating with high speed, accuracy and transparency, you'll see everything we do to defend you.
-
Computacenter (UK) Ltd
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
4SECURE LIMITED
TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.