-
R2P Systems UK Ltd
TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.
-
JBi Digital
We’ve created hundreds of bespoke websites for global brands, major public sector organisations and charities with Drupal’s flexible open-source Content Management Software. With Drupal, we have delivered high-performing experiences with top-level security and stress-free scalability - creating the best results for our clients.
-
CEOX SERVICES LTD
Ceox’s Microsoft Power Platform enables Public Sector Organisations to analyse data, build engaging business applications and automate processes quickly and efficiently. Ceox’s services empowers organisations to use Power Apps, Power Automate, Power BI and Power Virtual Agents. Empower your workforce, automate tasks, streamline process and deliver better customer satisfaction.
-
Pegasystems Limited
Pega is a low-code platform for AI-powered decisioning and workflow automation. We enable organisations to get work done using apps that are secure, scalable, governed, and maintainable. We offer solutions for business process management, digital process automation, and customer/citizen engagement. Workforce Intelligence is a key part of the platform.
-
GOVFORMS LIMITED
Proven Gov forms digital service builder cloud software delivers out-of-the-box, cost effective, creation of digital journeys, forms or surveys for HM Government and Local Authorities. Easy to use browser-based SaaS. GOV.UK design patterns. GDS accessibility compliant. No coding needed. Submit data with APIs. Integrate with: Microsoft, Salesforce, ServiceNow and more.
-
Stone Technologies Limited trading as Converge Technology Solutions
Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.
-
Netpremacy Limited
Relate SMS: the easiest way to see live video, just send a text, touch a link and stream live via the remote camera on almost any smartphone. No downloads or app installs required. Video can be either one or two way with an option for an audio channel as well.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Prolexic Routed protects all applications as well as network and data centre infrastructure from DDoS attacks. Prolexic Routed Is built on the Prolexic network, using BGP-based redirection to route network traffic through Akamai scrubbing centres and GRE tunnels to deliver clean traffic back to the customer.
-
INTEGRITY360 LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
TELEFÓNICA TECH UK BUSINESS APPLICATIONS LIMITED
Microsoft Customer Service Package offers comprehensive functionality to optimize customer service. Covering call center management, query handling, operational actions, complaints, and case management, Dynamics 365 Customer Service streamlines data for seamless, personalised experiences.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Rent Stop solution automates the process of suspending rent payments for specific tenancies. Integrated seamlessly with our platform, it identifies criteria for rent stoppage, streamlining compliance and reducing administrative burden. This ensures accurate, efficient, and transparent management of rent-related processes, enhancing landlord-tenant relationships and operational efficiency.
-
ICYBERDEFENCE LIMITED
Information Security and Cybersecurity Governance, Risk & Compliance (GRC) is about identifying and controlling security risks, complying with new rules and regulations whilst maintaining the right to do business, guarding brand reputation, and security of confidentiality, integrity and availaability of data.
-
Grove Information Systems
Google Workspace is a professional office suite of collaborative productivity apps. Easily work on email, calendars, documents, spreadsheets, and slides across your devices, with or without the internet. Keep all your work in one place with secure access from your computer, phone, or tablet.
-
BOOMERANG I-COMMS LTD
Boomcast delivers Broadcast conversational messaging, 2-way SMS, voice, and email bulk communications. Our multi-channel messaging can automatically match responses and deliver them to your email. Schedule automated messaging campaigns across individuals or dynamic groups and create inbound SMS, email, and voice campaigns. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
NEO TECHNOLOGY LIMITED
Neo Technology's Squatter and Unauthorised Occupant Management Solution offers housing providers a robust platform to identify, track, and address instances of squatting or unauthorised occupancy. Leveraging advanced monitoring and reporting tools, it enables prompt intervention to safeguard property integrity and compliance with regulations.
-
GRANICUS-FIRMSTEP LIMITED
govService is a digital services solution that provides intelligent online forms, process and customer portals with integrations for Local and Central Government, Health, Housing, Blue Lights and other Public Sector organisations to easily create online services. The low-code solution combines forms, process, customer portals that integrates citizen request management (CRM).
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Salesforce Health-Cloud services for government healthcare departments. We collaborate with government entities to streamline patient management, enhance care coordination, and improve healthcare delivery. Our configurations align with governmental healthcare objectives, ensuring secure and efficient services for citizens.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
BOXXE LIMITED
Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.
-
BlackBerry UK Limited
Now networks are expanding, and workers are remote, you require the right combination of capabilities to ensure you have insight into the devices used for work. Combining security innovation, management tools, platform stability, deep experience, and enhanced productivity applications, BlackBerry UEM delivers capabilities to support endpoint management and workforce productivity.
-
ARMADILLO SEC LTD
Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.
-
LIVING WITH LTD
Living With’s virtual rehabilitation platform helps over 40 NHS Trusts and ICB’s to assess, manage and rehabilitate more patients faster, with less resource, across symptoms and conditions. We do this with a single patient app, single clinician platform and catalogue of digital products, without needing 100s of different apps.
-
Khipu Networks Limited
Prisma Access is a cloud-based security service that provides organisations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
PHOENIX SOFTWARE LIMITED
Cloud Enterprise Mobility + Security. Licensing suite includes Microsoft Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection Premium P1 and Microsoft Advanced Threat Analytics
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
SOFTCAT PLC
Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.
-
LEGADO TECHNOLOGIES LIMITED
Legado makes digital interactions with customers secure, simple and personal using a cloud-native platform that can be flexibly deployed using a set of scalable and modular APIs. The platform has dozens of pre-built features for customer communications, workflows, intelligence and data insights.
-
CYBERIAM HOLDINGS LIMITED
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.