-
CM SECURITY LTD
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our
cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and
detects advanced threats with AI-powered automation.
-
Infosec Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
BLUELIGHTSDIGITAL LTD
COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.
-
OpenSky Data Systems
OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.
-
MTI TECHNOLOGY LIMITED
MTI’s Managed SIEM / SOC platform applies industry-leading technologies. Asset Discovery/Management, Vulnerability and Patch Scanning, SIEM Logging/Correlation/Alerting, Intrusion Detection, Automated Incident Response/Defence, User Behaviour Analytics, Threat Intelligence, Full Cloud Integration, Custom Dashboards/Playbooks, Service Desk alerting/ticketing, XDR, MDR, MXDR, 24x7, Defender, Sentinel, SC-Cleared UK-based NCSC cyber experts. Threat Simulation Exercises.
-
GAMMA NETWORK SOLUTIONS LIMITED
Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.
-
BYTES SOFTWARE SERVICES LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc
-
TRUSTMARQUE SOLUTIONS LIMITED
A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.
-
CM SECURITY LTD
CASB provides administrators with comprehensive visibility and control over the usage of SaaS platforms within their organisation. It helps manage shadow IT usage, allowing organisations to identify and address security risks associated with unauthorised cloud applications and prevent unauthorised sharing of sensitive data.
-
Scarce IT
Through our fast-track adoption approach, we embed ServiceNow quickly and optimally, speed your ROI, and facilitate digital and cultural transformation for your business. Whether you are considering ServiceNow, or have purchased and need help implementing, Scarce will deliver you successfully, affordably & speedily onto the world’s leading Enterprise IT Platform.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.
-
SOFTCAT PLC
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
INTEGRITY360 LIMITED
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
CHARTERHOUSE VOICE & DATA LIMITED
CloudGuard Intelligence (previously called CloudGuard Log.ic) delivers advanced cloud intelligence and simplified visualisation for faster and more efficient incident response. It provides more effective incident detection and auto-remediation, augmented through AI and ML, across multi-cloud environments.
-
XTRAVIRT LIMITED
Workspace ONE Access can provide multi-factor authentication, conditional access and single sign-on across SaaS, web, and native mobile apps. Brokering different identity stores and providers, Workspace ONE Access can deliver apps from on-premises and multi-cloud infrastructures. Workspace ONE Hub Services provides a centralized app catalog plus notifications, people-search, and more.
-
NETWORK UTILITIES (SYSTEMS) LIMITED
Automate your vulnerability management and save valuable time and resources with a patch management solution that lets you deploy and patch any Microsoft and Linux OS, 3rd party and proprietary software, on-the-fly according to any schedule. With complete visibility and granular control over your entire software inventory.
-
JUMPING RIVERS LTD
Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.
-
INTEGRITY360 LIMITED
Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.
-
GRADIAN SYSTEMS LTD
Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud
-
Security Software Solutions Ltd (S3 Ltd)
Drata is a security/compliance automation platform that continuously
monitors and collects evidence of your security controls, while
streamlining workflows to ensure audit-readiness. It’s an all in one GRC
platform, integrating with all your SaaS services to bring compliance
status of all your people, devices, assets, and vendors into one
place.
-
KHIPU NETWORKS LIMITED
Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.
-
SOFTCAT PLC
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.
-
ITogether
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
COMMUNICATION STEM LIMITED
Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network
-
Chess CyberSecurity Ltd t/a CyberLab
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
TRUSTMARQUE SOLUTIONS LIMITED
Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value
-
INTEGRITY360 LIMITED
Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.
-
WR LOGIC LIMITED
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
-
PMD DATA SOLUTIONS LIMITED
Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service).
Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.
-
BARRIER NETWORKS LIMITED
Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.