-
BOXXE LIMITED
OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.
-
CDW LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
e2e-assure Ltd
Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle
-
Hicom Technology Ltd
Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes, ensuring compliance with established regulations. Currently used by over 200,000 users in 5,000+ sites worldwide, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.
-
Policy Monitor Limited
Policy Monitor provides a cybersecurity management platform, Cyber Security Policy Monitor (CSPM). CSPM gives you a centralised platform to support your organisation through complex industry-certified accreditations, to create and implement internal security policies, train your staff, scan for vulnerabilities and establish best practices to provide the best defence against criminals.
-
TMC3 LIMITED
OneTrust Third-Party Management streamlines third party assurance for public sector entities, offering comprehensive risk monitoring, due diligence automation, and robust compliance tools. Our solution effectively manages third-party risks across security, privacy, and ESG domains, enhancing trust and compliance.
-
CDW LIMITED
Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.
Proofpoint CORE Plus - Requires CORE P0 or CORE P1
-
MICRO FOCUS
NetIQ Identity Intelligence service provides a cloud-based enterprise service that is intended:
To assess risk based on insights from identity information
Apply methods to remove excessive, anomalous, or erroneous entitlements
Improve the ongoing identity governance process, including risk reporting
-
ACTIONABLE LTD
REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors.
The platform incorporates the REACH data acquisition engine for precision cyber data analytics.
-
Computacenter (UK) Ltd
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
Khipu Networks Limited
This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.
-
TRUSTMARQUE SOLUTIONS LIMITED
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
SOFTCAT PLC
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
CDW LIMITED
Proofpoint Security Awareness Training helps you deliver the right
training to the right people at the right time. It turns your end users into
a strong last line of defense in identifying cyber attacks and protecting
your organization.
-
THE SERVER LABS LTD
Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.
-
KLAXON TECHNOLOGIES LIMITED
Klaxon is a major incident, mass notification and planned maintenance communications solution, helping organisations keep people safe, informed and productive during an incident, emergency or crisis.
It is ideally suited for SME and Enterprise organisations and supports multiple use-cases such as IT downtime, Business Continuity, Disaster Recovery and Cyber-security communications.
-
SAVANT LIMITED
Mataco is a secure, cloud-based service offering standards based compliant business continuity plan for implementation, management, exercise, review and audit. Mataco also supports incident management activation and activity tracking. Mobile Mataco ensures that Plans can be accessed from anywhere at any time from a mobile device.
-
MONDAS CONSULTING LTD
Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.
-
CDW LIMITED
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.
-
TRANSCRIBE UK LTD.
iVano 365 is a cloud based Workflow Management Software solution for digital dictation. Dictate on the go with iVano Dictate, this smartphone app enables busy professionals to dictate and upload directly to iVano 365. (Available for Apple and Android devices.) The solution is hosted on Microsoft Azure Cloud Platform.
-
PHOENIX SOFTWARE LIMITED
Tenable One provides visibility across your attack surface, focus efforts to prevent attacks and accurately communicate cyber risk to support optimal business performance.
Tenable One Standard is comprised of:
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory
-
Melissa Data Ltd
Melissa’s email verification service can flag up to 95% of bad email addresses to increase deliverability, avoid high bounce rates and blacklisting, and protect your valuable sender reputation. Ping each email box in real time to validate, improve deliverability and reduce fraud. Mailbox validation and domain correction.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
MICRO FOCUS
Micro Focus® Operations Bridge (OpsBridge) monitors your IT environment and consolidates data from existing tools. Operations Bridge applies automated discovery, monitoring, analytics, and remediation to data across traditional, private, public, and multi-cloud and container-based infrastructure.
It displays business and IT KPIs for executive stakeholders and
operations staff, providing real-time insight.
-
Juniper Education Services Limited
Boasting four decades of expertise, specialising in tailored websites to suit any budget, offering comprehensive design, development, and construction services. Our goal is to elevate your online visibility, facilitating recruitment and engaging diverse audiences. Let us transform your digital footprint, empowering you to thrive in the dynamic landscape of education.
-
EXPONENTIAL-E LIMITED
SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux.
SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc
-
BYTES SOFTWARE SERVICES LIMITED
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats. bssgc
-
INTEGRITY360 LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
SOMERFORD ASSOCIATES LIMITED
Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data