-
Computacenter (UK) Ltd
Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.
-
Bytes Software Services
Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc
-
Cloudflare, Inc.
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform.
Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams.
Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
COMMUNICATE TECHNOLOGY LIMITED
Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service
-
TotalMobile
Totalmobile is the market leader in construction logistics harnessing its enterprise digital platform supporting major construction/infrastructure programmes to achieve excellence in operational efficiencies and compliance monitoring. Key aspects of our platform include; logistics tracking, lone working, asset/inventory management, delivery management, appointment booking, integrated routing/visual maps, navigation/location APIs and real-time analytics.
-
Softcat Limited
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
Equine Register Ltd
Enables organisations exchange data and record the arrival and departure of an equine, livestock, companion animals (including dogs and cats) also check the biosecurity status of an animal in advance of its arrival. Supports recording of double ended movements and communications between organisations and users to manage biosecurity and risk.
-
Claritas Solutions Ltd
Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms.
Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.
-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.
-
Charterhouse Voice & Data
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
NEO TECHNOLOGY LIMITED
Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.
-
Phoenix Software Ltd
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.
-
Charterhouse Voice & Data
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
BOXXE LIMITED
Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your
enterprise & achieve single screen visibility & control.
-
Pentagull Ltd
Our elected members ward enquiries system is a cloud software service that readily and effectively meets all the requirements for managing councillor enquiries across the organisation, from initiating the enquiry through our intuitive and simple online form through to case resolution via back-office.
-
ABM Intelligence Limited
ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.
-
Armour Comms
Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.
-
Pentagull Ltd
Our blue badges system is a cloud software service for the effective management of blue badges. Our system facilitates enhanced efficiencies, tangible savings and improved customer satisfaction levels. It integrates to the Department for Transport (DfT) portal and will automatically retrieve new Blue Badge applications.
-
Clarity Tech Ltd
Our expertise includes SharePoint and Office365 SharePoint Online. Our service include: Website, EDRMS and ECMS implementation, Web portal, SharePoint strategy, development, training, mentoring, migration and support. One of our large scale Sharepoint product is developed for NHS Foundation Trust Hospital. This product provides critical information to over 4000 users.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Digital Document Management Solution offers a scalable, browser-based platform for efficiently and securely managing document and data lifecycles. Through robust automation and workflow capabilities, it optimises core service delivery by reducing administrative burdens, automating processes, and facilitating seamless integration, ultimately enhancing agility and delivering cost savings and efficiencies.
-
Levett Consultancy Ltd
Chrome Education Upgrade empowers IT to create educational environments for teachers and learners to thrive in, with enhanced management, security, and support capabilities for ChromeOS Devices. Remotely manage, provision, deploy, and implement ChromeOS policies to streamlining arduous IT tasks, and enable users to be more productive using technology.
-
CDW Limited
Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.
-
S8080 Limited
ISO27001 certified Drupal platform and Drupal upgrades - Drupal cloud hosted CMS for digital services and websites. S8080’s compliant Drupal platform securely handles multilingualism, CRM, integrations, single sign-on, forms and workflow. Drupal content management system is open-source, easy to use, yet powerful. Mobile, accessible and designed around user’s needs.
-
Rowden Technologies Ltd
Rowden's TAK Server Federation service seamlessly connects TAK servers across agencies, organisations, and borders, ensuring secure, scalable, and sovereign data exchange. With VPN integration and FedHub access, it facilitates robust inter-organisational and inter-country operations, enhancing coordination and situational awareness across government entities. Accredited to OFFICIAL-SENSITIVE.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
LastPass is a leading password management solution that securely stores and manages passwords across devices. It simplifies online life by autofilling login credentials and generating strong passwords. With encrypted storage and multi-factor authentication, LastPass ensures maximum security while offering convenience for users to access their accounts effortlessly.
-
INTEGRITY360 LIMITED
Our combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
-
Softcat Limited
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
SKYFLO DIGITAL LTD
Single platform designed to help governments to serve the people faster. Get value quickly with purpose-built data, integration, automation, AI, analytics, UX for public sector.
Out-Of-The-Box capabilities to manage citizen services and benefits, deliver authorisations, manage rules and compliance, ensure safety and justice, recruit, onboard, develop public sector employees. SFDC2024GC14
-
Rocktime Ltd
Rocktime's verso™ UX Bilingual e-forms manages Complaints, Environmental Health & Regulatory Services for Wales & Ireland. Through its online form and workflow automation, it focusses on delivering the highest level of user experience and simplified data collection. verso™ UX standalone platform can integrate seamlessly with backend case management systems.
-
Chess CyberSecurity Ltd
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.