-
Arissian Ltd
The Luciditi digital identity services allows secure MUTUAL digital verification & authentication of individuals and third parties. Available through a mobile app or an embedded service utilising technology with automated liveness detection and document authenticity checks, to streamline on boarding processes or authenticate communications between parties.
-
Softcat Limited
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
Softcat Limited
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
CACI UK Ltd
DarkBlue® is a safe space for investigators to explore the Open, Deep and Dark web. With over 6 billion AI-enhanced records, collected over two decades, it unlocks the Deep & Dark Web without direct exposure. Daily scraping of 600,000-800,000 new records ensures DarkBlue® remains a vital tool for intelligence gathering.
-
Phoenix Software Ltd
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
Wavenet
Email security services that provide advanced protection against threats. Mimecast's email security system uses sophisticated, multi-layered detection engines and the latest threat intelligence to stop malware, spear-phishing and zero-day attacks.
-
Softcat Limited
"M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform.
Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization."
-
KONSOLUTE
Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.
-
Softcat Limited
AWS Marketplace is a curated digital catalogue that makes it easy for Buyers to find, buy, deploy, and manage third-party software, AI/ML models and algorithms and the data sets they need to build solutions and run their organisations. The service available on GCloud 12 is ‘Bring Your Own Licence’ (BYOL).
-
Axians Networks Limited
iboss is a Zero Trust Edge, utilising a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. This allows for PDNS integration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection and DLP
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring.
Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.
-
Softcat Limited
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
Bytes Software Services
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
CHESS ICT LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
BOXXE LIMITED
CloudHealth is the most trusted software platform for accelerating global business transformation in the cloud. Now part of VMware, CloudHealth is the enterprise platform of choice for more than 7,000 organisations worldwide that rely on it to optimise, secure, and govern the largest and most complex multi cloud environments.
-
Stone Technologies Limited trading as Converge Technology Solutions
Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.
-
CDW Limited
Proofpoint Cloud Application Security Broker protects against account compromise, malicious files, data loss and compliance risks in the cloud.
-
Agilisys Ltd
ScoreAI is a tool that allows public sector organisations to automatically score complex application forms against statutory criteria to streamline the workflow of processing these, reducing the time it takes to manually score them.
-
INTEGRITY360 LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
Network Utilities (Systems) Ltd
Multi-layered, cloud-based email security. GravityZone Email Security protects all email service providers and supports hybrid environments using Exchange on-premise, Microsoft365, Exchange Online, or Gmail.
-
Grove Information Systems
Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
BOXXE LIMITED
Take unlimited comprehensive scans of your networks so you can identify/address vulnerabilities and ensure your organisation complies with PCI DSS. PCI Compliance Guidelines are followed, ensuring that vulnerabilities don't exist for more than 90 days on any networks that involve payment card transactions. Add-on to Tenable Vulnerability Management.
-
Ve3 Global Ltd
Automation 360 product is used for Robotic Process Automation (RPA). Automation 360 is a single, integrated platform that transcends front office and back office technology siloes to automate business processes across all systems and applications, including both SaaS and legacy apps.
-
BlackBerry UK Limited
Now networks are expanding, and workers are remote, you require the right combination of capabilities to ensure you have insight into the devices used for work. Combining security innovation, management tools, platform stability, deep experience, and enhanced productivity applications, BlackBerry UEM delivers capabilities to support endpoint management and workforce productivity.
-
Armadillo Sec Ltd
Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.
-
Ve3 Global Ltd
VE3's Advanced Security Management offers robust anomaly detection policies, empowering you to swiftly detect potential cybersecurity breaches within your network. Leveraging over 70 distinct indicators such as sign-in failures, administrator activity, and inactive accounts, anomaly detection scans user activities to evaluate associated risks, ensuring proactive threat mitigation.
-
Khipu Networks Limited
Prisma Access is a cloud-based security service that provides organisations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
Spindogs Ltd
Kentico consultancy. For mobile optimised, accessible website development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.