-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Salesforce Community Cloud Services tailored for government departments. We collaborate with government entities to create secure,engaging online communities for citizens, employees, and stakeholders.Our expertise includes customized community design,seamless integration with existing systems,and comprehensive support to foster effective collaboration and communication within the government ecosystem.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc
-
INTEGRITY360 LIMITED
Galaxkey Secure Workspace for secure file transfer, sharing and collaboration. Features
include: secure collaboration, file sharing, encryption, unlimited file size. All with
central management and complete white labelling capabilities. Encryption is CPA
Certified by the NCSC.
-
INTEGRITY360 LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
SOMERFORD ASSOCIATES LIMITED
Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organization’s most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data
-
INTEGRITY360 LIMITED
BeyondTrust Privilege Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.
-
Fusion Business Solutions (UK) Limited
BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.
-
ROWDEN TECHNOLOGIES LTD.
Rowden's Assurance Pipeline Service melds automated ML deployment with scalability, boosting efficiency through features such as automated data prep and orchestration. It supports custom architectures, speeds up model launches with CI/CD, and secures operations with detailed logging. Optimising costs and performance, it’s perfect for effortlessly crafting top-tier ML environments.
-
VE3 GLOBAL LTD
VE3's Digital Workforce integrates intelligent automation solutions to elevate your business processes. We employ a domain-centric and tool-based strategy to prioritize end-to-end automation. Our proprietary catalysts accelerate your path to a digital future and elevate the digital intelligence of your operations.
-
VE3 GLOBAL LTD
API Manager is a robust platform designed to streamline the lifecycle management of APIs. It enables secure integration, deployment, and monitoring of APIs across organizational ecosystems. This service enhances connectivity, enforces security protocols, and provides analytics to optimize API performance, ensuring efficient digital operations.
-
LOGIT.IO LTD
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
PLANNED LINK LTD
A cloud-based vulnerability management solution
-
INTEGRITY360 LIMITED
Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality
-
SOFTCAT PLC
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
IBM UNITED KINGDOM LIMITED
IBM Trusteer helps organizations establish identity trust across the omnichannel customer journey. Through cloud-based intelligence, backed by AI and patented machine learning, Trusteer provides a holistic approach to identifying customers, without negatively impacting user experience. Trusteer runs over 40 billion application accesses monthly and over 1 billion monthly user sessions.
-
DEFENCE DATASEC LTD
"At Defence DataSec, our AWS Networking Services offer Government Departments robust and scalable networking solutions. We specialize in designing and implementing AWS networking services such as VPC, Direct Connect, and Route 53, ensuring secure communication between resources.
"
-
FUTURE DECISIONS LTD
We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.
-
KONSOLUTE
Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.
-
INOAPPS LIMITED
Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime.
Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.
-
SOFTCAT PLC
AWS Marketplace is a curated digital catalogue that makes it easy for Buyers to find, buy, deploy, and manage third-party software, AI/ML models and algorithms and the data sets they need to build solutions and run their organisations. The service available on GCloud 12 is ‘Bring Your Own Licence’ (BYOL).
-
PROSPERON NETWORKS LTD
SolarWinds® Network Performance Monitor (NPM) is a simple, powerful and affordable monitoring solution that enables you to quickly diagnose and resolve network performance problems and outages. Now with deep packet inspection and analysis, you can quickly and accurately identify network and application reliability.
-
MORIYAMA LIMITED
Moriyama offer migration services where content and assets are moved from your outgoing Umbraco CMS to the new back-office, as part of a major version upgrade or rebuild, or as part of a process of merging platforms together.
-
Axians Networks Limited
iboss is a Zero Trust Edge, utilising a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. This allows for PDNS integration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection and DLP
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring.
Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.
-
SOFTCAT PLC
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
ENTSERV UK LIMITED
The smart places and things offering provides end to end solutions at scale enabling the adoption and implementation of data driven enterprises that create smart process frameworks and enhanced visibility around organisational processes.
-
ALVAO s.r.o.
IT Asset Management software implementing ITSM Best Practices. An overall picture of every device throughout its lifecycle. Know what assets you have, their owner, and where each item is.
Handover protocols facilitate starters and leavers process. Full overview over hardware, software and other assets. Software asset management. Regular inventory audits.
-
BYTES SOFTWARE SERVICES LIMITED
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
MICRO FOCUS SOFTWARE UK LTD
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
CHESS ICT LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.