-
Fusion Business Solutions (UK) Limited
BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.
-
ROWDEN TECHNOLOGIES LTD.
Rowden's Assurance Pipeline Service melds automated ML deployment with scalability, boosting efficiency through features such as automated data prep and orchestration. It supports custom architectures, speeds up model launches with CI/CD, and secures operations with detailed logging. Optimising costs and performance, it’s perfect for effortlessly crafting top-tier ML environments.
-
VE3 GLOBAL LTD
VE3's Digital Workforce integrates intelligent automation solutions to elevate your business processes. We employ a domain-centric and tool-based strategy to prioritize end-to-end automation. Our proprietary catalysts accelerate your path to a digital future and elevate the digital intelligence of your operations.
-
VE3 GLOBAL LTD
API Manager is a robust platform designed to streamline the lifecycle management of APIs. It enables secure integration, deployment, and monitoring of APIs across organizational ecosystems. This service enhances connectivity, enforces security protocols, and provides analytics to optimize API performance, ensuring efficient digital operations.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
PLANNED LINK LTD
A cloud-based vulnerability management solution
-
INTEGRITY360 LIMITED
Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality
-
SOFTCAT PLC
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
IBM UNITED KINGDOM LIMITED
IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.
-
FUTURE DECISIONS LTD
We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.
-
KONSOLUTE
Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.
-
INOAPPS LIMITED
Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime.
Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.
-
SOFTCAT PLC
AWS Marketplace is a curated digital catalogue that makes it easy for Buyers to find, buy, deploy, and manage third-party software, AI/ML models and algorithms and the data sets they need to build solutions and run their organisations. The service available on GCloud 12 is ‘Bring Your Own Licence’ (BYOL).
-
Prosperon Networks Ltd
SolarWinds® Network Performance Monitor (NPM) is a simple, powerful and affordable monitoring solution that enables you to quickly diagnose and resolve network performance problems and outages. Now with deep packet inspection and analysis, you can quickly and accurately identify network and application reliability.
-
MORIYAMA LIMITED
Moriyama offer migration services where content and assets are moved from your outgoing Umbraco CMS to the new back-office, as part of a major version upgrade or rebuild, or as part of a process of merging platforms together.
-
Axians Networks Limited
iboss is a Zero Trust Edge, utilising a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. This allows for PDNS integration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection and DLP
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring.
Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.
-
SOFTCAT PLC
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
ENTSERV UK LIMITED
The smart places and things offering provides end to end solutions at scale enabling the adoption and implementation of data driven enterprises that create smart process frameworks and enhanced visibility around organisational processes.
-
ALVAO s.r.o.
IT Asset Management software implementing ITSM Best Practices. An overall picture of every device throughout its lifecycle. Know what assets you have, their owner, and where each item is.
Handover protocols facilitate starters and leavers process. Full overview over hardware, software and other assets. Software asset management. Regular inventory audits.
-
BYTES SOFTWARE SERVICES LIMITED
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
MICRO FOCUS
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
CHESS ICT LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
R2P Systems UK Ltd
TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.
-
BOXXE LIMITED
CloudHealth is the most trusted software platform for accelerating global business transformation in the cloud. Now part of VMware, CloudHealth is the enterprise platform of choice for more than 7,000 organisations worldwide that rely on it to optimise, secure, and govern the largest and most complex multi cloud environments.
-
JBi Digital
We’ve created hundreds of bespoke websites for global brands, major public sector organisations and charities with Drupal’s flexible open-source Content Management Software. With Drupal, we have delivered high-performing experiences with top-level security and stress-free scalability - creating the best results for our clients.
-
4net Technologies Ltd
FourNet's Cloud Delivered Security provides the first line of defence against threats on the internet by blocking malicious destinations before a connection is ever established. It offers DNS-layer security, secure web gateway features and firewall capabilities, all managed from a single dashboard.
-
FORDWAY SOLUTIONS LIMITED
Fordway CMPS provides a complete cloud-based print service. The service allows organisations to remove their reliance on legacy print solutions and the hardware required to run and support the traditional printing infrastructure. It allows for full management, control and auditing of the print environment all from a single location.
-
CHESS ICT LIMITED
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
Stone Technologies Limited trading as Converge Technology Solutions
Cisco Secure Connect is a turnkey, unified Secure Access Service Edge (SASE) solution delivering seamless, secure connectivity with a consistent operating model across premises to cloud, to make managing networking/security easy in a single dashboard. This converged platform solution brings together Cisco Networking/Security Clouds optimising troubleshooting and streamlining configuration.