-
NG Bailey IT Services Limited
RingCX is an AI-powered customer service platform that integrates all communication channels (voice, chat, video) into a single system for agents and customers. It aims for easy use, fast deployment, and improved customer experience through features like chatbots and analytics
-
Bytes Software Services
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc
-
INTEGRITY360 LIMITED
Central Intercept X Advanced for Server with Extended Detection and Response (XDR) includes all features in Central Intercept X Advanced for Server, plus powerful features for detection and remediation. Ask and answer business critical IT operations and threat hunting questions with Live Discover and respond remotely with Live Response.
-
Energy and Compliance Technology Ltd
C365Cloud is designed to support organisations audit, manage, and improve their level of statutory compliance and FM inspections.
The document repository can be accessed for all compliance certificates, reports, policies, procedure, CAD plans, O&M Manuals and lease documents, allowing organisations to proactively manage compliance and subsequent actions.
-
Roke Manor Research
Roke is pioneering Machine Learning & AI powered Image and Video Analytics, our platforms rapidly process media content at scale and performs Deep Learning based content detection, moderation, summarisation and linking functions. A core service provided to UK law enforcement automatically detects and categorise Child Sexual Exploitation images and videos.
-
Sagacity Solutions Ltd
Our platform connects people, processes, and systems maximising data value. Integration of various data sources, data ingestion pipelines, and advanced analytics for predictive modelling, customer segmentation, anomaly detection, and real-time insights. With our architecture, automated provisioning, and parallel processing capabilities, providing visibility, insights, and analytics for decision-making and revenue growth.
-
Chess CyberSecurity Ltd
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
Cirro
IoT for Asset Tracking is an advanced IoT application designed to facilitate the efficient lifecycle management of multiple IoT applications and use cases on a single unified IoT platform. With an SDK and API, the applications can be integrated with existing BMS systems or new applications.
-
Somerford Associates Limited
Splunk's Observability Suite addresses your need to analyse customer experiences and detect, troubleshoot and find root causes to incidents across a cloud-native or hybrid environment.
Consisting of Splunk IT Service Intelligence (ITSI), Infrastructure Monitoring (SIM), Application Performance Monitoring (APM), Real User Monitoring (RUM), Splunk Synthetic Monitoring and Splunk On-Call.
-
Made Purple Ltd
ArkDNS provides AI powered DNS Filtering and Security for your network. Get protection from malware, ransomware and phishing at the DNS level protecting all of your devices. Filter domains based on categories or whitelists making sure all sites are safe for work and forcing SafeSearch on all search engines.
-
MegaNexus Ltd
The Secure Digital Learning Environment is a web-based application supporting the education and rehabilitation of vulnerable individuals. The SDLE allows curated content to be delivered securely, and at scale while maintaining quality for the end user. The system while secure, integrates externally to provide additional features to users and administrators.
-
CDW Limited
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
ICS.AI LTD
The SMART AI Customer Services Copilot is a generative AI solution that enhances citizen engagement and service deflection 24/7, reducing costs. Pre-trained on 1000 topics covering all council services, delivers a grounded, personalised solution, which continuously improves through supervised learning, backed by a proven business case and <six months ROI.
-
Infotel UK
Infotel UK is an IT Consultancy based in Newcastle Upon Tyne with expertise in Java, DevOps, Testing, Data Science, AI & Machine Learning, Kafka, Event Driven Architecture, Cloud Based Solutions, Event Based Solutions, Web Development, Agile Methodologies and Project Management.
-
4net Technologies Ltd
FourNet offers Unified Communications and SIP services from world leading application providers, including: Microsoft (Teams Direct Routing), Avaya, RingCentral, Gamma, BT Wholesale, Tiger, Ribbon, AudioCodes and others.
Our services can be delivered via a number of hosting options, private, public and hybrid cloud and integrated with Microsoft, Amazon and Google.
-
CDW Limited
Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.
Proofpoint CORE Plus - Requires CORE P0 or CORE P1
-
Actionable Ltd
REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors.
The platform incorporates the REACH data acquisition engine for precision cyber data analytics.
-
Computacenter (UK) Ltd
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
Khipu Networks Limited
This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.
-
Trustmarque Solutions Limited
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Softcat Limited
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
CDW Limited
Proofpoint Security Awareness Training helps you deliver the right
training to the right people at the right time. It turns your end users into
a strong last line of defense in identifying cyber attacks and protecting
your organization.
-
BOXXE LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
Liaison Financial Services Ltd
The NHS at Work Platform enables full control and visibility across your workforce from rostering through to vacancy release, shift management, reviewing and booking applicants (be it internal Bank, Collaborative Bank or Agency), vendor management, onboarding through to electronic timesheets and payment of workers and agency suppliers alike.
-
Anexsys Ltd
Take control of your eDisclosure (eDiscovery) with our fully customisable hosting of the industry-leading platform Relativity. Empower teams to complete investigations, public inquiries, inquests, dispute resolution, tribunals, DSARs, and FOIA requests. Maintain complete control of sensitive data through customised workspaces, features, and bespoke, proprietary add-ons within our managed hosting solutions.
-
MONDAS CONSULTING LTD
Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.
-
CDW Limited
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.
-
4net Technologies Ltd
4net offers a SaaS Robotic Process Automation (RPA) environment. We bring together RPA principles, Artificial Intelligence(AI), Machine Learning and Cloud Computing.
We can automates processes rapidly by defining, deploying, integrating, operating, testing, and refining RPA requirements for transaction processing, data manipulation, response triggering, and communicating between digital systems.
-
Trustmarque Solutions Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
COFORGE U.K. LIMITED
IQ Bot makes RPA even more effective for customer. IQ Bots keep learning, with or without supervision, handle unstructured information that feeds to automated processes.
• Integrates seamlessly with Automation-Anywhere-Enterprise
• Handles any form of data stream to capture, enrich and validate unstructured data
• Learns with or without supervision