-
CDW LIMITED
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.
-
CACI LIMITED
MooD 16 & MooD 17 software components provides a collection of software tools for deployment on-premises or via private / hybrid cloud environments. MooD Business Architect and MooD Active Enterprise components can be used to build bespoke MooD Cloud Solutions.
-
Sota Solutions Ltd
SotaPROTECT Suite provide managed anti-virus, email security gateway, web security gateway, Multi-Factor Authentication and cyber security awareness training for staff.
This provides an essential level of protection against cyber bad actors.
-
HSO ENTERPRISE SOLUTIONS LIMITED
HSO - leverage the power of Microsoft to transform the way you work.
Want transformation, cloud adoption and long-term business impact? Our vast skill across the entire Microsoft stack delivers beautiful solutions with a platform-first approach, built on robust data architecture, and realising value aligned with your strategic roadmap.
-
I-NET SOFTWARE SOLUTIONS LTD
A Digital Service Management (DSM) enabler,this service provides an assessment of your Cyber Security practices.Focused on capabilities associated with technology services and environment to: strengthen cybersecurity capabilities, enable effective and consistent evaluation and benchmark of cybersecurity capabilities. We enable prioritisation of actions and investments to improve security. unstructured big data.
-
HANDD Business Solutions
Globalscape EFT Arcus is a cloud-native, managed file transfer solution designed for scalability and security. It offers flexible deployment options, automated workflows, and advanced encryption for secure data transfer. Arcus simplifies file sharing across organisations while ensuring compliance with regulations and industry standards.
-
RESULTING LIMITED
Pathlock Cloud CCM offers a comprehensive
toolkit to enhance risk identification and
assessment, reduce manual compliance controls
efforts, and improve operational excellence. With
this solution, organisations can streamline their
process controls and mitigate risks more
efficiently, enhancing their overall performance
and success.
-
Stone Technologies Limited trading as Converge Technology Solutions
Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.
-
CDW LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.
-
BOOMERANG I-COMMS LTD
Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.
-
CDW LIMITED
"Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
Gradian Systems Ltd
Forcepoint CASB is a security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions using the Cloud
-
ITGL Limited
Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.
-
CYBANETIX LIMITED
Cybanetix Advanced Log Manager (CALM) is a Security Information and Event Management (SIEM) solution that allows organisations to log all their IT infrastructure events to one platform and overlay threat intelligence and advanced security analytics to the events collected.
-
Network 2 Supplies Ltd
N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.
-
iProov Limited
iProov Authentication delivers secure and convenient citizen and workforce authentication leveraging face, fingerprint, and/or palm biometrics. Cloud-based biometrics linked to a trusted identity allows individuals to smoothly authenticate across the entire identity lifecycle, from Account Login and Recovery to Device Binding and Step-up Authentication.
-
CYBANETIX LIMITED
SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.
-
Internet Investigation Solutions Ltd
Long Arm®, is a platform for secure online investigation, open source research, and evidential capture. Our fully audited platform empowers investigators to operate on the internet with a managed digital footprint, and to capture and produce content to an evidential standard. Our Collaboraite® capability enables data & AI exploitation.
-
SOFTCAT PLC
See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.
-
Cyberlab
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
VE3 GLOBAL LTD
Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.
-
VE3 GLOBAL LTD
DocuBot is an AI-powered extension that integrates with CRM systems and enterprise platforms, providing intelligent conversational access to internal documents. It enhances user engagement, streamlines document retrieval, and boosts operational efficiency through advanced AI-driven natural language processing capabilities.
-
Infosec Ventures
EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program.
We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.
-
ICYBERDEFENCE LIMITED
The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.
-
LRQA
CloudGuard Code Security, provides automated tools that integrate with developers’ tools to detect code-vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations.
-
Cyberlab
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
Computacenter (UK) Ltd
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
LIGHTBULB ANALYTICS LIMITED
Lightbulb Analytics [LBA] IR3 system is a fleet and resource management system which enables users to optimise their fleet and resources.
IR3 achieves this by providing features such as live tracking, vehicle status, trip replay, driver behaviour, vehicle and personnel utilisation and potential collision analysis.
-
LEIDOS INNOVATIONS UK LTD
Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.
-
PHOENIX SOFTWARE LIMITED
Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.