-
NEXER DIGITAL LTD
Umbraco is one of the world's most popular, and easiest to use, open source web Content Management Systems (CMS). Nexer is a Contributing Platinum Umbraco Partner, the highest level of accreditation possible. We’ve built 250+ websites and digital solutions based on Umbraco. We lead the Umbraco accessibility and sustainability communities.
-
ITogether
Check Point VSX (Virtual System Extension) is a comprehensive network security solution that offers robust virtual firewall and VPN capabilities. It enables businesses to create multiple virtualised security gateways within a single hardware appliance, enhancing security flexibility and efficiency while reducing operational costs.
-
ENTSERV UK LIMITED
We provide regular and proactive identification of network vulnerabilities to defend against external hackers and disgruntled insiders as a fully managed service. We provide targeted, actionable information to clients on vulnerabilities and recommendations for remediation and can track the success of that remediation.
-
BOXXE LIMITED
ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.
-
CEGEKA UK LIMITED
Cegeka UK's Disclosure Management System (DMS); an advanced software solution designed to streamline and automate disclosure processes. Organisations can efficiently handle a range of disclosures, retrieving and aggregating data from multiple sources. DMS provides a secure centralised platform for raising, fulfilling, reviewing, and approving disclosure requests, ensuring accuracy and consistency.
-
LEFKE IT LIMITED
At LefkeIT, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.
-
BOXXE LIMITED
"Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface.
-
SecurityHQ
Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.
-
INTEC SYSTEMS LIMITED
HCL AppScan is a dynamic application security testing solution designed for security experts and pen testers to use when performing security tests on web applications and web API. It runs automated scans that explore and test web applications based on one of the most powerful scanning engines available.
-
Reach-Data Ltd
We offer a dedicated inbound / outbound SMS service specifically aimed at Councils and Local Authorities. All services are housed in UK data centres using dedicated infrastructure and direct connectivity with the mobile networks. We are ISO 27001 accredited with a suitably scoped ISMS covering all services.
-
ACCENTURE (UK) LIMITED
A managed email security service to protect your email services from spam, malware and phishing attacks. The ability to perform advanced email routing, encryption and data loss prevention for your outbound email.
-
ITogether
Bot Manager Premier provides advanced bot detections designed to detect and mitigate the most sophisticated bots, like those typically seen in use cases such as credential abuse, inventory hoarding, gift card balance checking, and other forms of web fraud.
-
Barrier Networks
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
PROPEL TECH LTD
Change is the only constant. It drives the need for digital transformation, rethinking how your business uses technology and processes to continuously evolve. We help businesses manage change and become more efficient by finding the right possibilities, using new and evolving technology to achieve digital transformation.
-
Recordsure
A Digital Interview Recording solution compliant with the PACE Act as a Secure Digital Network solution. High quality, secure recording with capabilities for automated transcription and sophisticated speech analytics. Integrated with Recordsure’s document analytics and AI provides a multi-media capability, incorporating documents alongside audio recordings.
-
HOWELL TECHNOLOGY GROUP LIMITED
Through a tiled view, ControlUp Software summarises key metrics of the state of your monitored resources every 24 hours, highlighting key activity indicators, risk factors and performance stats.
-
Empowering Communities
The Client/Victim Engagement Module is a unique communications platform that allows clients/victims to share information with you and you share in return. Designed around evidence based best practice. Use with clients, victims, vulnerable persons and students. Enhances wellbeing, electronic safety plans, social prescribing projects. Includes attendance tracker and mood diary
-
BASEEL PARTNERS LLP
Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.
-
MICRO FOCUS SOFTWARE UK LTD
Fortify on Demand (FoD) is a remotely-delivered, cloud-based application security as a service solution. Application security testing is performed and reviewed by application security experts using application testing technologies and manual techniques. All customers are provided access to our technical account support team.
-
CDW LIMITED
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.
-
TECHNOLOGY TRANSFORMATION GROUP LTD
Technology Transformation Group assesses your organisation's software needs to develop a tailored Microsoft 365 Service strategy, leveraging the full potential of your licenses. We analyse existing licensing agreements, identifying cost-saving opportunities and offer guidance on product features such as Word, Excel, and Teams for enhanced productivity, security and team empowerment.
-
NINE23 LTD
UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.
-
SOFTCAT PLC
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
SECURITY ALLIANCE LIMITED
The ThreatMatch Intelligence Portal / Platform is collaborative, purpose-built for intelligence sharing. ThreatMatch Community Subscription enables the development and operation of secure, trusted communities, based on sector, geography or collaborative efforts. Quickly share intelligence across the whole community and allow members of the community to share their own intelligence.
-
CYBERLAB CONSULTING LTD
Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.
-
COMPUTER SYSTEMS INTEGRATION LIMITED
IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.
-
ATLANTIC DATA LTD
Atlantic Data's Disclosures service provides organizations with an online platform for processing, administering, and managing criminal record checks. This service connects directly to the DBS through its eBulk service. Disclosures Manager is highly configurable with a comprehensive suite of management tools to assist organisations to manage and oversee these checks.
-
KPMG LLP
KPMG Cyber Risk Insights is an intuitive Cyber Risk Quantification (CRQ) SaaS product. Using a threat-led and financial modelling approach, it accurately assess the likelihood and impact of cyber-attacks. Cyber Risk Insights helps articulate your risk exposure in business terms, and prioritise defence capabilities and controls that maximise risk reduction.
-
PHOENIX SOFTWARE LIMITED
Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.
-
COMPUTACENTER (UK) LIMITED
IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.