-
SOFTCAT PLC
Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business.
-
Concur
SAP Concur takes companies beyond automation to a completely connected spend management solution encompassing travel, expense, compliance and risk. Our expertise, industry-leading innovation and dynamic ecosystem of diverse partners and applications unlock powerful insights that help businesses reduce complexity and see spending clearly, so they can manage it proactively.
-
PROSPERON NETWORKS LTD
SolarWinds® AppOptics is a SaaS-based simple, powerful, and affordable infrastructure and application monitoring (APM) solution. AppOptics speeds root cause analysis of application performance issues across AWS, Azure, and hybrid IT environments.
-
QUADRIS LIMITED
Barracuda Cloud-to-Cloud Backup gives you the flexibility to backup and restore Microsoft 365 Teams, Exchange, SharePoint, OneDrive, and OneNote data with highly granular detail, and offers complete, granular protection of your data with point-in-time retrieval, and both scheduled and on-demand backup, in addition, data is deduplicated and compressed.
-
Barrier Networks
Protecting users against modern web based cyber attacks such as phishing and credential theft.
-
VERSEONE GROUP LTD
VerseOne is a Microsoft preferred Independent Software Vendor (ISV) and AI Cloud Partner. We integrate with Active Directory for user permissions, Single Sign ON (SSO) logins via Open ID Connect (OIDC), staff directories and more. Our SharePoint, OneDrive, Outlook, M365, PowerBI and Teams integrations power collaboration.
-
BYTES SOFTWARE SERVICES LIMITED
Check Point CloudGuard WAF provides Web Application and API protection. With deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. bssgc
-
COOLSPIRIT LIMITED
Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane
-
RSM UK RISK ASSURANCE SERVICES LLP
Risk management, assurance and compliance software that provides a complete and real time view of an organisation’s risk, control assurance and compliance profile.
The system can be configured for multiple purposes including recording, monitoring and reporting of business and project risks, incidents and breaches and compliance against regulation or standards.
-
FLYTE CLOUD SERVICES LTD
See your company's data in new ways with interactive data visualisation BI tools from Microsoft Power BI. Visualise data through interactive, real-time dashboards, and analytics that generate actionable insights to scale your business. Real-time analytics: Know what’s happening now, not just in the past
-
NINE23 LTD
UK Sovereign managed Cloud service for effective Multi-Factor Authentication (MFA). Protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. Cisco-Duo provides simple, streamlined login experience for every user and application, it integrates easily with your existing technology.
-
CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED
Azure AD and Entra licensing covering Identity services in the Microsoft Cloud.
-
SOFTCAT PLC
Forcepoint Data Guard (FDG) delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
SOFTCAT PLC
Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.
-
SPECIALIST COMPUTER CENTRES PLC
Xurrent is the Complete Service Management platform enabling departments, like IT&HR, to work together seamlessly, including external service providers where services are outsourced. Automate requests from customer or citizens to interact with the right service providers within your organisation. Xurrent supports ITIL and fully integrates knowledge-management, time-tracking and project-management capabilities.
-
PHOENIX SOFTWARE LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.
https://www.beyondtrust.com/products/identity-security-insights
-
DEFENCE DATASEC LTD
"Oracle Data Warehousing service provides a powerful platform for storing, processing, and analyzing large volumes of data. It enables businesses to consolidate data from various sources, perform complex analytics, and derive valuable insights for informed decision-making. This service enhances data-driven strategies, boosts performance, and supports critical business operations
-
PRIMESYS LTD
Combine full Web Application and API Protection (WAAP) functionality with a complete set of advanced security services and solutions that protect your applications against today’s multiplying threats.
Whether your applications are deployed on-premises, in the cloud, or hybrid, Barracuda Application Protection makes it easy to keep them secure and available.
-
Cyberlab
Mimecast Awareness Training is a security awareness
training and cyber risk management platform that
helps you combat information security breaches
caused by employee mistakes.
-
VERSEONE GROUP LTD
Our Research and Innovation Portal helps NHS Trusts and other healthcare providers to raise public sector funding (e.g. through the Clinical Research Network) or private sector investment (e.g. through pharmaceutical companies). The portal automatically matches institutions, would-be researchers, potential participants, etc, to automate the programme management process.
-
Pentagull Ltd
Designed to revolutionise how local authorities manage their harbours, this comprehensive solution offers a seamless transition to online operations. It empowers authorities to efficiently oversee berth bookings, annual management, and commercial accounts with unparalleled ease and precision. Our booking service allows for an unlimited number of harbours to be managed.
-
ORCUMA LTD
Our Case Management Software is a specialised solution designed to support organizations dedicated to addressing domestic abuse, stalking, and honour-based violence. With a focus on victim safety, perpetrator accountability, and risk assessment/safety planning, our software provides comprehensive tools to streamline case management and deliver effective support services.
-
CDW LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
BECRYPT LIMITED
High-value MDM Servers tend not to reside in the well-protected segments of organisations’ networks, due to the nature of required connectivity to the global smartphone infrastructure.
Delivered as a fully managed solution for businesses, it provides peace of mind over the security, integrity and delivery of the mobile estate
-
Software AG (UK) Limited
Software AG - Alfabet Strategic Portfolio Management (SPM/StPM) and Planning supports your digital transformation with capabilities like Demand Management, Strategy Validation, Resource Management, Project Portfolio Management and Governance (PPM), Investment Optimization, Enterprise Release Management, Lean Portfolio Management (agile/SAFe), IT Sustainability Management, and all elements of Enterprise Architecture Management (EAM).
-
Barrier Networks
Leveraging the latest ZTA technologies, OPSWAT’s MetaDefender IT- OT Access Platform is a unified platform cloud solution for providing deep endpoint compliance, advanced endpoint protection, identity authorization, and secure access without hindering workflows. MetaDefender IT- OT Access is available on cloud or on-premises.
-
SPINDOGS LTD
Private cloud for hosting Umbraco mobile optimised, accessible website development. Spindogs' Umbraco CMS platform provides bespoke templates for content editors. GDPR compliant Umbraco CMS forms and tagging are out-of-the-box. Umbraco CMS offers version control, integrations, SSO, and multilingualism. Umbraco content management system is open-source, user friendly, and fully customisable.
-
TOTAL ENTERPRISE SOLUTIONS LIMITED
Microsoft Gold Partner providing implementation and licence management of Power BI. Power BI is a business analytics service by Microsoft. It aims to provide interactive visualizations and business intelligence capabilities with an interface simple enough for end users to create their own reports and dashboard
-
S8080 LIMITED
Open source, cloud-hosted CMS for Welsh/English bilingual digital services, websites and LocalGov platforms. S8080’s compliant open source CMS platforms securely handle CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around bilingual user’s needs.
-
BROOKCOURT SOLUTIONS LIMITED
Access Management tackles the task of overseeing user access across systems and applications. It empowers administrators to create conditional access policies, granting entry exclusively to users through suitable authentication methods. Elevate security with Multi-Factor Authentication (MFA) while simultaneously enhancing user ease Single Sign-On (SSO) and Passwordless authentication