-
Computacenter (UK) Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
Jacobs U.K. Limited
Jacobs’ stakeholder and land management tool provides a digitised, single source of truth to manage engagement and relationships and demonstrate compliance with statutory planning requirements. Gain greater analysis and insight into stakeholder, sentiment and trends. The result, an agile stakeholder management process delivered at lower cost with a better experience.
-
Arcus Global Limited
‘Report It’ provides online forms which enable citizens and businesses to report issues and apply for services through the Digital Services Hub (DSH). ‘Report It’ also includes a form builder and template forms that make it simple for organisations to build their own online forms.
-
Visionist
Targeted ethical phishing campaign tailored to your requirements to improve organisational resilience against phishing attacks. Cloud-based service proven to be highly effective at combatting email-borne cyber threats. Comprehensive reporting will demonstrate your improved cyber security awareness. Delivers a high return on investment (ROI) from the targeted campaign.
-
Innovate IT Ltd
Innovate is a certified Okta delivery partner, delivering Okta WIC and CIC (Auth0). We can help you purchase your licences, whilst offering expert advice on what you need to achieve your business goals. Okta connects any person with any application on any device. It's the market leading (GARTNER) identity platform.
-
Softcat Limited
Amazon WorkMail is a secure, managed business email and calendar service with support for existing desktop and mobile email client applications. Amazon WorkMail gives users the ability to seamlessly access their email, contacts, and calendars using the client application of their choice.
-
KONSOLUTE
Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.
-
macseu
Computer Aided Facilities Management (CAFM) with IBM-Maximo, Enterprise Asset Management Software including; Predictive Lifecycle Management, Energy and Utilities, Inspection and Audit, Inventory Management, Remote Monitoring (IOT), Mobile EAM, Building Information Modelling (BIM). These we provide as both and on premise or as a securely hosted Software as a Service (SaaS).
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Data Strategy and Maturity Assessment (DMA) Service outlines a strategic approach to leverage information assets in line with organisational goals. Conducted through DAMA or Central Digital & Data Office (CDDO), the DMA evaluates current capabilities and provides actionable insights. A roadmap guides improvements in governance, architecture, BI, MDM.
-
MTI Technology Ltd
Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.
-
2T Security Ltd
Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business.
This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.
-
INTEGRITY360 LIMITED
Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling
administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime.
This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects
(GPOs), and more
-
Barrier Networks
MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.
-
IPLICIT LIMITED
iplicit empowers nonprofits and charities to simplify compliance, enhance transparency, and optimise financial operations.
Its robust handling of complex funding structures and seamless integration capabilities make it an excellent choice for organisations focused on maximising efficiency and seeking to dedicate more resources to mission-critical activities.
-
Arcus Global Limited
Arcus Trading Standards is a flexible and intuitive cloud-based solution helping Trading Standard's practitioners manage all aspects of their work including inspections, investigations, monitoring, enforcement, providing advice, and managing evidence. The included mobile app supports full access and offline remote working. Enabling officers and teams to work efficiently and effectively.
-
Softcat Limited
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Softcat Limited
oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture.
-
Computacenter (UK) Ltd
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
Panacea Applications Limited
End-to-end source-to-pay (S2P). Order to delivery, goods receipt and supplier invoicing. Audit trail, reports. GDPR and PCR Compliant. Accounts payable, finance system. Supplier portals. Configurable e-Catalogue, instant pricing options. Procurement, tendering, contract lifecycle management, due diligence. DPS, Dynamic Markets, frameworks. RFQ, further-competition. Evaluation, moderation, award. Category Management. Find-a-Tender, Contracts Finder.
-
Phoenix Software Ltd
CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action
-
OfficeLabs Ltd
Streamline your organisation assessments with a comprehensive digital tool designed for deep insights into operational effectiveness and compliance, including GDPR compliance. It offers dynamic, customisable surveys, advanced analytics, and tailored reporting for strategic decision-making and continuous improvement.
-
Digital Interactive Ltd
Infreemation is an advanced online cloud based application for processing the patients journey when trying to stop smoking. The application supports appointments, automated messages of encouragement, referrals, evouchers, Fagerstrom Tolerance Scale and custom forms
-
Khipu Networks Limited
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP). It provides the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.
-
Cornerstone OnDemand
Cornerstone LXP delivers a revolutionary employee experience, unifying learning, skill-building and career development in the flow of work. Build teams skilled for the future with hyper-personalised content; empower employees to create, curate and share their expertise; enable your people to build their careers, leveraging skills and opportunities within your organisation.
-
Somerford Associates Limited
Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.
-
Xpertex
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
Networkology Ltd
The Cribl suite enable customers to collect, reduce, enrich, normalise, and route data from any source to any destination; search across multiple sources; and store data in a self-provided or vendor supplied data-lake. Take control of your data and empower your organisation with make data-driven decisions with tangible business outcomes.
-
Bytes Software Services
Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort. bssgc
-
INTEGRITY360 LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization