-
CHESS ICT LIMITED
Logpoint's platform combines Security Incident and Event Management (SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure
-
Ada Mode
Ada Mode support industrial asset operators/owners, OEMs and government bodies with the development, adoption and deployment of data science, AI and machine learning to drive industrial decarbonisation. We build bespoke AI and ML applications, served through our Atlas platform, to improve industrial performance and organisational efficiency.
-
Chess CyberSecurity Ltd
Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents
-
Somerford Associates Limited
Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.
-
Xpertex
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
Specialist Computer Centres plc
Nexthink Infinity is a real-time Digital Employee Experience Monitoring (DEM) solution, aiming to drive meaningful productivity gains, improve employee satisfaction and mitigate any unnecessary costs. Nexthink provides IT with real time analytics to demonstrate how IT services are being consumed by their employees, where improvements can be made.
-
Networkology Ltd
The Cribl suite enable customers to collect, reduce, enrich, normalise, and route data from any source to any destination; search across multiple sources; and store data in a self-provided or vendor supplied data-lake. Take control of your data and empower your organisation with make data-driven decisions with tangible business outcomes.
-
VITALHUB UK LIMITED
SHREWD Services is able to provide both solutions and direct delivery of support. For over 20 years VHUK, collectively, have worked in partnership with sector providers at all levels that includes Acute, Community, Mental Health and Primary Care NHS organisations, NHS England and Private Healthcare organisations.
-
Cirro
IoT for Temperature and Humidity monitoring, alerting, reporting & predictive analytics is an IoT application to facilitate efficient lifecycle management of multiple IoT applications and use cases on a single unified IoT platform. With an SDK and API, the applications can be integrated with existing BMS systems or new applications.
-
Xpertex
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.
-
Redinet Ltd
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
-
Ve3 Global Ltd
VE3 can revolutionize your operations with a custom-designed cloud-based app, expertly developed to meet your specific business needs. Our solutions offer software and service-focused applications that ensure business continuity and provide the flexibility to access your business anytime, anywhere.
-
Barrier Networks
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
-
Trustmarque Solutions Limited
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Vix Technology Ltd
Vix Beacon ITS: a cloud-native, modular bus fleet management and signage control system for local authorities and operators. Predictive machine learning provides real-time insights, enhancing control and efficiency. We accept a range of data sources, integrate to existing hardware, and output data across a range of channels.
-
CHESS ICT LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
Ada Mode
Ada Mode support industrial asset operators/owners, OEMs and government bodies with the development, adoption and deployment of data science, AI and machine learning to drive industrial decarbonisation. We build bespoke LLM applications, served through our Atlas platform, to derive insight from complex, unstructured data, which is often highly sensitive.
-
Softcat Limited
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde
A disaster recovery solution which automatically syncs school data throughout the school day. Should you experience a cyber incident, Wonde has your data protected and readily accessible for continuity.
Data Recovery keeps your selected data protected, accessible, and up to date so you can keep your school open and running.
-
3DoT Solutions
A unique service combining the best of breed open source and commercial COTS technologies to enable cyber threat intelligence and malware analysis capabilities. 3DOT Solutions have proven pedigree in integrating technologies into a workable pipeline to ensure analysts are operational and organisations can operationalise CTI and malware analysis functions.
-
DATASUMI LTD
Elevate policy analysis using state-of-the-art generative AI technology with Datasumi's service. We utilise sophisticated Generative AI features to provide a revolutionary method for examining complex policy issues, creating simulated scenarios, and developing insightful, data-driven policy recommendations.
-
Bytes Software Services
The cloud based VMs provide visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.. bssgc
-
CDW Limited
Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.
-
CONTROL PLANE LIMITED
CPE-Flux is a subscription-based offering designed to meet the stringent requirements of highly regulated organisations running production cloud native environments. CPE-Flux Continuous Delivery provides a secure, stable, and efficient solution for cloud native enterprises to depend on with confidence.
-
CGI
CGI SAP solutions offer Implementation & Advisory services, transformation programmes and project delivery for Business Suite (e.g. ECC), BI-Analytics, SuccessFactors, Ariba, Concur, S/4-HANA. Providing scalable, flexible services from consulting, designing, integrating and deploying to comprehensive end-to-end support. With client proximity in mind, services are UK-based, using nearshore and offshore locations
-
Automation Consultants
Automation Consultants is a monday.com Partner and provides both licencing and a range of consultancy services for monday.com. monday.com is a work operating system that powers teams to run projects and workflows with confidence. monday.com prides itself on being simple and intuitive, helping to streamline work for maximum productivity.
-
Spindogs Ltd
Spindogs offers comprehensive accessibility assessments designed to ensure your website meets accessibility best practices standards. Site compliance assessed against the most recent WCAG AA guidelines by Accessibility experts. Through thorough accessibility audits, testing, and tailored content guidance, our experts deliver guidance to ensure you comply to the latest accessibility standards.
-
Softcat Limited
Solve problems in seconds with the only full-stack analytics-powered and OpenTelemetry-Native Observability Solution. Explore user experience, troubleshoot issues, remediate
Splunk Infrastructure Monitoring (SIM), Application Performance Monitoring (APM)/Real User Monitoring (RUM), Splunk Synthetic Monitoring (SSM)/IT Service Intelligence (ITSI).
Splunk Infrastructure Monitoring (SIM)/Application Performance Monitoring (APM)/Real User Monitoring (RUM),/Splunk Synthetic Monitoring (SSM).
-
Ve3 Global Ltd
VE3's Check Point Smart-1 Cloud offers cloud-delivered security management, providing policy management for on-premises and IaaS security gateways, along with security event analytics and reporting via a user-friendly web-based SmartConsole.
-
Creative Networks
Door Access Control regulates entry to buildings using key cards, biometrics, or PIN codes, bolstering security by limiting unauthorised access. It monitors and records entry and exit activity for auditing purposes.