-
NEO TECHNOLOGY LIMITED
Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.
-
Softcat Limited
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CHESS ICT LIMITED
Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
Computacenter (UK) Ltd
Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.
-
Bytes Software Services
Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc
-
Cloudflare, Inc.
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform.
Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams.
Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
Softcat Limited
InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.
-
COMMUNICATE TECHNOLOGY LIMITED
Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service
-
Softcat Limited
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
Spindogs Ltd
Kentico web content management system. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.
-
BlackBerry UK Limited
CylanceMDR™ provides 24x7x365 detection and protection. Our team is comprised of world-champion experts, and our platform is powered by pioneering Cylance® AI technology for threat protection augmented with proprietary and threat intelligence. CylanceMDR includes hands-on
onboarding, alert-triage, investigation, managed threat hunting, digital forensics, incident response (IR), and critical event management.
-
CDW Limited
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
Sapphire
An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).
-
Spindogs Ltd
Consultancy for mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.
-
Claritas Solutions Ltd
Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms.
Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.
-
Softcat Limited
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory"
-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.
-
Charterhouse Voice & Data
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
CYBEXER TECHNOLOGIES
The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.
-
BOXXE LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications
-
Charterhouse Voice & Data
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
Proact IT UK Limited
Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.
-
DBaaS Ltd
We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.
-
CDW Limited
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
Armour Comms
Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.
-
Bytes Software Services
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc
-
Ve3 Global Ltd
VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.
-
Phoenix Software Ltd
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
-
Proact IT UK Limited
Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).
-
YUDU Sentinel
Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight.
Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.