-
BYTES SOFTWARE SERVICES LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance. bssgc
-
VE3 GLOBAL LTD
Utilizing cutting-edge in-memory BI technologies alongside VE3's scalable Azure SQL Data Warehouse, our solution offers comprehensive cross-module analytical reporting with significantly reduced time and cost compared to traditional business warehouse solutions. Hosted in the cloud, there is no need to invest in hardware. Supported Cloud: Microsoft Azure
-
CDW LIMITED
Microsoft 365 F1 is a complete, intelligent solution that combines Office 365, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely.
-
CDW LIMITED
Microsoft 365 F3 is a complete, intelligent solution that combines Office 365, Windows 10 Enterprise, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely.
-
FULLPROXY LIMITED
F5 Distributed Cloud Client-Side Defense is a comprehensive security solution that protects web applications and APIs from malicious client-side attacks. It leverages the power of F5's Distributed Cloud Services, delivering robust security capabilities at the edge, closer to users and potential threats.
-
Cyberlab
InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in real-time view, pinpoint location, prioritize for your business, facilitate collaboration with other teams, and confirm your reduced exposure.
-
SOFTCAT PLC
part of CloudGuard CNAPP, provides automated tools that integrate with developers’ to detect code vulnerabilities, identify secrets and misconfigurations in code before deployment, preventing unauthorized use. Prevent exposing API keys, tokens, credentials, in addition to remediating security misconfigurations. With a super-fast platform, CloudGuard Code Security ensures security without compromising productivity.
-
Innaxys Ltd
A Geographical Information System (GIS) providing a robust and secure platform to map and analyse data to inform investigations and community policing strategies. Designed for UK police force analysts with tools to manage all kinds of data, including routing, address services, geospatial analysis, annotations, and content publishing.
-
MORIYAMA LIMITED
Moriyama offers Umbraco development consultancy to clients, mentoring client in-house developers to enable them to successfully self-manage their Umbraco projects: leveraging our considerable experience and expertise with Umbraco, clients can access consultative support for their in-house development teams.
-
PHOENIX SOFTWARE LIMITED
BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements.
-
ROBOYO (UK TRADING) LIMITED
Procensol helps to modernise and automate business processes. Providing tangible business outcomes underpinned by proven low-code technologies, our Intelligent Automation solutions orchestrate a more efficient use of resources. People, technology, data, and digital workers, working in harmony, achieving more with less. Procensol has the expertise to accelerate your digital transformation.
-
S3 Ltd
Dashlane Password Manager is always private and secure. Our zero-knowledge patented encryption means not even we can see your passwords and passkeys. Protect more than your passwords with intuitive credential management for your whole organisation. Set, forget, and trust Dashlane to secure your people and data against breaches.
-
VE3 GLOBAL LTD
A cloud-based platform empowers SOC analysts to swiftly uncover, investigate, and mitigate attacks with 99.9% accuracy. InfinitySOC utilizes an advanced AI algorithm to identify behavioral patterns, leveraging big data analysis from ThreatCloud to pinpoint active threat indicators.
-
RAZOR THORN SECURITY LTD
Cofense Provide Software & Services for both Phishing Detection and Response and Security Awareness Training (SAT). We focus on catching phishing threats that other technologies miss, turn it into Threat Intelligence and use it to help our customers better defend against the threat of Phishing.
-
SOFTCAT PLC
Train end users to be more resilient against threats they receive. Capabilities include threat simulations that test user response to phishing attacks using thousands of templates, 40+ languages and 13 categories. These can help establish a security baseline, train employees to avoid security risks and report progress.
-
MICRO FOCUS
Micro Focus Fortify Hosted provides a cloud‐based enterprise service for automating application security programs. It enables management, development, and security teams to work together to triage, track, validate and manage software security activities.
-
CDW LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
MRI SOFTWARE LIMITED
MRI Allocations is a cloud-based SaaS solution enabling housing providers to manage their housing register, advertise and allocate properties (Choice Based Lettings (CBL) or Nominations) according to their allocation policies. Intuitive portals for applicants and officers provide a modern, easy-to-use way to manage your entire allocations process efficiently and online.
-
Gradian Systems Ltd
Quickly gain full visibility and context for your data, whether in motion or at rest, across on-premises and cloud environments. Enhanced by the power of our customisable, accurate, and explainable AI Mesh, this is a game-changer for security in Generative AI usage and governance.
-
CDW LIMITED
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
VIABLE DATA LTD
Managing intelligence data with custom case management platforms. We convert outdated systems into easy-to-use online platforms that adhere to the Government Digital Services Standard. We provide a clean, accessible dashboard to view and manage case lists. We enable custom inter-case actions and fuzzy searches across caseloads or within cases.
-
Cyberlab
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
Awaken Learning
BeOnline &Report is an incident and accident management SaaS platform designed to simplify and encourage the reporting of workplace accidents, near misses, ill-health, security/IT. Submit accidents/incidents and near misses with ease, with an intuitive workflow to manage, control, review, and escalate, ensuring legal compliance (i.e RIDDOR, USHA).
-
PROOFID LIMITED
Cloud based Identity Governance solution from leading identity vendor, SailPoint.Identity Security Cloud enables business friendly identity governance via access request, access certification and effective provisioning and deprovisioning of joiners, movers and leavers, along with improved productivity and Password Management capabilities. Patented Zero Knowledge Encryption security model.
-
TECHNOLOGY SERVICES GROUP
Cloud-based endpoint/server security solution
-
QUADRIS LIMITED
CrowdStrike FALCON X provides actionable threat intelligence capability using a holistic approach so entire organizations may understand adversaries, motivation, tradecraft, tooling, with analytical features to be used by security and intelligence teams. Features include indicators of compromise, adversary profiles, intelligence reports, sandboxes, malware searching, and more.
-
Keyfactor
Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your enterprise & achieve single screen visibility & control.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions provides Chrome - EduTyping, a comprehensive keyboarding software designed for the educational sector. This cloud-based tool teaches students essential typing skills through a curriculum that includes interactive exercises and games, preparing them for digital literacy in a fun and engaging way.
-
SCG CORPORATE LIMITED
Your employees are frequently exposed to sophisticated social engineering attacks. It is time for a comprehensive approach to effectively manage this problem, managed by people with a technical background. The world's largest library of security awareness training content; including interactive modules, videos, games, posters and newsletters.
-
TMC3 LIMITED
Veracode is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode provides Static Analysis, Dynamic Analysis, Software Composition Analysis API Scanning solutions. SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry.