-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
TMC3 LIMITED
OneTrust AI Governance ensures responsible AI deployment in public sector organisations by enhancing transparency and compliance across AI systems. Our platform supports inventory management, risk assessment, and ensures alignment with global AI governance standards, fostering trust and ethical AI use.
-
CFH Docmail Ltd
Docmail is a cloud-based hybrid-mail-management system which allows users to arrange mailings of any size from any device with an internet connection. Docmail offers desktop print driver and web portal access. Data is transmitted via secure HTTPS connection for remote print and post fulfilment at our highly secure production facilities.
-
BOXXE LIMITED
Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.
-
ACCESS UK LTD
Access Personal Safety & Lone Worker solutions ensure that employers can protect their most valuable assets: their people. Our personal safety solutions can be relied upon to keep dispersed teams safe. Our BS8484 compliant solutions safeguard against potential danger, providing peace of mind and improving productivity, whilst supporting employer responsibilities.
-
COALESCENT LIMITED
Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can screen, complete, signoff, store, share and collaborate on Data Protection Impact Assessments, Data Ethics Assessments & Equality Impact Assessments.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
MORIYAMA LIMITED
Moriyama offers tailored Umbraco training, including in-house developer training to upskill teams, CMS editor training for content management, and staff/colleague training for user interface familiarity. All projects include CMS editor training as standard, with refresher courses available as needed to support client personnel or process changes.
-
APTO SOLUTIONS LIMITED
Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.
-
SECURECLOUD+ LIMITED
Securely ingest data from multiple networks/classifications in real-time for analysis, alerting and visualisation using COTS tools or open-source cloud native software. The service can be used for sensor data analysis, predictive data-driven maintenance, geospatial visualisation, sharing situational awareness, alongside integrated AI/ML pipelines for advanced data analysis and enhanced decision making.
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
SOMERFORD ASSOCIATES LIMITED
SecurityScorecard’s Attack Surface Intelligence detects more unknown
unknowns, including those of your third-party vendors and how they pose
a risk to your business, arming you with deep contextual insights and
attribution to prioritize your next steps - all in one single platform.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
LEGADO TECHNOLOGIES LIMITED
Legado makes digital interactions with customers secure, simple and personal using a cloud-native platform that can be flexibly deployed using a set of scalable and modular APIs. The platform has dozens of pre-built features for customer communications, workflows, intelligence and data insights.
-
NIMBOX LTD.
Vault lets your teams easily collaborate on OFFICIAL information, whilst retaining audit controls. Vault provides secure file sharing, real-time collaborative document editing, backup, remote file server access, and cloud storage. It is UK sovereign, hosted in accredited UK data centres, with end-to-end encryption protecting data at rest and in transit.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc
-
S8080 LIMITED
ISO27001 open-source CMS - a digital platform for Local Authority / Councils. S8080’s icon-driven council self-service portals securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, yet powerful content management systems. Mobile and accessible, designed around Local Authority / Council user’s needs.
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
PHOENIX SOFTWARE LIMITED
Cloud solution of the office suite of applications, including Teams, Yammer, One drive, Stream, SharePoint and productivity suite (word,ppt,XL)
-
BOXXE LIMITED
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
SIMODA LIMITED
PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported phishing email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities
by flipping them into simulated phishing campaigns for employees.
-
BYTES SOFTWARE SERVICES LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc
-
SAPPHIRE TECHNOLOGIES LIMITED
SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence.
With SentinelOne, organisations can detect malicious behaviour across multiple vectors, rapidly eliminate threats with a fully automated integrated response and adapt their defences against the most advanced cyber attacks.
-
S8080 LIMITED
ISO27001 open-source CMS - a digital platform for Local Authority / Councils. S8080’s icon-driven council self-service portals securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, yet powerful content management systems. Mobile and accessible, designed around Local Authority / Council user’s needs.
-
TheTechForce Limited
KCM GRC is a SaaS-based GRC platform that helps you effectively and efficiently manage risk and compliance within your organisation and across your third-party security vendors, while gaining insight into gaps within your security program. Choose from Compliance Management, Policy Management, Risk Management and Vendor Risk Management.
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
QUADRIS LIMITED
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft-365. The solution delivers best in class email security and filtering against spam, zero-day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance via email-archiving
-
BECRYPT LIMITED
Becrypt's Everything 365 service is designed businesses who are looking to get all of their IT under control. Aimed at Public Sector departments and organisations, and commercial companies that support public sector, who need a fast, easy deployable and assured solution that meets the required HMG security standards.
-
Network Utilities (Systems) Ltd
Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat.
Including application management for whitelisting and blocking of running applications.
-
Glemnet Ltd
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.