-
Avepoint UK Ltd
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide.
-
Softcat Limited
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
CDW Limited
Proofpoint Security Awareness Training helps you deliver the right
training to the right people at the right time. It turns your end users into
a strong last line of defense in identifying cyber attacks and protecting
your organization.
-
CDW Limited
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide
-
The Server Labs Ltd.
Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.
-
MAXINITY SOFTWARE LIMITED
Maxexam is a secure end-to-end exam management system designed to help healthcare educators develop high quality, effective exams, and drive improvement over time (eAssessment).
Maxexam can be used to run both written and clinical exams (OSCE). Successful exams can be run face-to-face, remotely or using a hybrid model.
-
BOXXE LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
KLAXON TECHNOLOGIES LIMITED
Klaxon is a major incident, mass notification and planned maintenance communications solution, helping organisations keep people safe, informed and productive during an incident, emergency or crisis.
It is ideally suited for SME and Enterprise organisations and supports multiple use-cases such as IT downtime, Business Continuity, Disaster Recovery and Cyber-security communications.
-
MONDAS CONSULTING LTD
Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.
-
CDW Limited
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.
-
TRANSCRIBE UK LTD.
iVano 365 is a cloud based Workflow Management Software solution for digital dictation. Dictate on the go with iVano Dictate, this smartphone app enables busy professionals to dictate and upload directly to iVano 365. (Available for Apple and Android devices.) The solution is hosted on Microsoft Azure Cloud Platform.
-
IBM United Kingdom Ltd
IBM Storage Protect for Cloud Microsoft 365 is a data protection backup-as-a-service solution. It empowers clients with the capability to back up and restore cloud-resident data for Microsoft 365. IBM clients can take advantage of IBM backup and restore capabilities in the cloud.
-
Phoenix Software Ltd
Tenable One provides visibility across your attack surface, focus efforts to prevent attacks and accurately communicate cyber risk to support optimal business performance.
Tenable One Standard is comprised of:
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory
-
Trustmarque Solutions Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
Cirro
Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.
-
Juniper Education Services Limited
Boasting four decades of expertise, specialising in tailored websites to suit any budget, offering comprehensive design, development, and construction services. Our goal is to elevate your online visibility, facilitating recruitment and engaging diverse audiences. Let us transform your digital footprint, empowering you to thrive in the dynamic landscape of education.
-
Exponential-e Ltd
SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux.
SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.
-
CDS
CDS provides Cloudflare consulting, implementation, and managed services to protect websites and applications, improve website and application performance, identity and access management (zero trust), protect and accelerate networks and manage cloud deployments. CDS provides training , or can fully manage the environment on your behalf.
-
Bytes Software Services
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc
-
INTEGRITY360 LIMITED
Galaxkey Secure Workspace for secure file transfer, sharing and collaboration. Features
include: secure collaboration, file sharing, encryption, unlimited file size. All with
central management and complete white labelling capabilities. Encryption is CPA
Certified by the NCSC.
-
Bytes Software Services
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats. bssgc
-
INTEGRITY360 LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
INTEGRITY360 LIMITED
BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.
-
Fusion Business Solutions
BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.
-
Phoenix Software Ltd
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.
-
Rowden Technologies Ltd
Rowden's Assurance Pipeline Service melds automated ML deployment with scalability, boosting efficiency through features such as automated data prep and orchestration. It supports custom architectures, speeds up model launches with CI/CD, and secures operations with detailed logging. Optimising costs and performance, it’s perfect for effortlessly crafting top-tier ML environments.
-
PRESCRIBING SERVICES LTD
Eclipse SCHOLAR (Secure Clinical Hub for Online Learning Audit & Research) empowers NHS ICBs to effortlessly implement a secure pseudonymised data environment for regional activities with full data specialist support. The system allows ICBs to work collaboratively on research programmes with 28 million live patient portals already integrated.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
PLANNED LINK LTD
A cloud-based vulnerability management solution
-
INTEGRITY360 LIMITED
Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality