-
INTEGRITY360 LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
Network Utilities (Systems) Ltd
Multi-layered, cloud-based email security. GravityZone Email Security protects all email service providers and supports hybrid environments using Exchange on-premise, Microsoft365, Exchange Online, or Gmail.
-
ICYBERDEFENCE LIMITED
Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
TMC3 LIMITED
OneTrust AI Governance ensures responsible AI deployment in public sector organisations by enhancing transparency and compliance across AI systems. Our platform supports inventory management, risk assessment, and ensures alignment with global AI governance standards, fostering trust and ethical AI use.
-
BOXXE LIMITED
Take unlimited comprehensive scans of your networks so you can identify/address vulnerabilities and ensure your organisation complies with PCI DSS. PCI Compliance Guidelines are followed, ensuring that vulnerabilities don't exist for more than 90 days on any networks that involve payment card transactions. Add-on to Tenable Vulnerability Management.
-
VE3 GLOBAL LTD
Automation 360 product is used for Robotic Process Automation (RPA). Automation 360 is a single, integrated platform that transcends front office and back office technology siloes to automate business processes across all systems and applications, including both SaaS and legacy apps.
-
IRIS INTELLIGENCE LIMITED
IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.
-
BlackBerry UK Limited
Now networks are expanding, and workers are remote, you require the right combination of capabilities to ensure you have insight into the devices used for work. Combining security innovation, management tools, platform stability, deep experience, and enhanced productivity applications, BlackBerry UEM delivers capabilities to support endpoint management and workforce productivity.
-
ARMADILLO SEC LTD
Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.
-
VE3 GLOBAL LTD
VE3's Advanced Security Management offers robust anomaly detection policies, empowering you to swiftly detect potential cybersecurity breaches within your network. Leveraging over 70 distinct indicators such as sign-in failures, administrator activity, and inactive accounts, anomaly detection scans user activities to evaluate associated risks, ensuring proactive threat mitigation.
-
NTT DATA Business Solutions (UK) Limited
Natuvion SOPHIA is a system-oriented analysis platform that is easy to use and can be customized. With a catalogue of over 500 analyses in five different areas, a holistic system scan can be carried out and then evaluated.
-
COALESCENT LIMITED
Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can screen, complete, signoff, store, share and collaborate on Data Protection Impact Assessments, Data Ethics Assessments & Equality Impact Assessments.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
SYMBIANT LTD
Symbiant is an agile AI enabled, modular, GRC platform for Risk Management Software, GRC, Audit Management Software, Compliance Software, Risk Management Systems, and audit management systems. It's modular so you can activate and customise the solutions you need. Includes action tracking, KRI, and full reporting.
-
APTO SOLUTIONS LIMITED
Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
SOMERFORD ASSOCIATES LIMITED
SecurityScorecard’s Attack Surface Intelligence detects more unknown
unknowns, including those of your third-party vendors and how they pose
a risk to your business, arming you with deep contextual insights and
attribution to prioritize your next steps - all in one single platform.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
CYBERIAM HOLDINGS LIMITED
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
ILLUMINET SOLUTIONS LIMITED
Risk Radar is a highly effective Risk Identification and management solution, which supports Illuminet's rapid Risk Management methodology. The solution provides a rich analytical view of your risk posture and the methodology allows you to reduce your exposure rapidly.
-
BYTES SOFTWARE SERVICES LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc
-
NIGHTBALL TECHNOLOGIES LIMITED
Pre-integrated secure environment, encompassing Cyber Resilient Desktop as a Service.
-
Jigsaw24
Jamf Apple device management and associated professional services. Building Unified Endpoint Management solutions for Apple ecosystems. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.
-
BLANKBOX TECHNOLOGIES LTD
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
SAPPHIRE TECHNOLOGIES LIMITED
SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence.
With SentinelOne, organisations can detect malicious behaviour across multiple vectors, rapidly eliminate threats with a fully automated integrated response and adapt their defences against the most advanced cyber attacks.
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
BECRYPT LIMITED
Becrypt's Everything 365 service is designed businesses who are looking to get all of their IT under control. Aimed at Public Sector departments and organisations, and commercial companies that support public sector, who need a fast, easy deployable and assured solution that meets the required HMG security standards.