-
Jumping Rivers Ltd
Our Web Application Security Platform allows you to easy monitor external resources that Shiny apps and markdown documents are using. When a user visits any application on your RStudio Connect server, this will silently trigger a comparison of your web-page with an a pre-defined allowed resource list.
-
INTEGRITY360 LIMITED
Orca Security is the leading agentless CNAPP that allows security teams to work smarter, not harder. Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and focus on remediating the actual risks that matter most.
-
Gradian Systems Ltd
Forcepoint Behavioural Analytics (FBA) enables security teams to proactively monitor for high risk behaviour inside the enterprise. Uncover critical problems such as compromised accounts, corporate espionage, intellectual property theft, and fraud
-
S3 Ltd
Drata is a security/compliance automation platform that continuously
monitors and collects evidence of your security controls, while
streamlining workflows to ensure audit-readiness. It’s an all in one GRC
platform, integrating with all your SaaS services to bring compliance
status of all your people, devices, assets, and vendors into one
place.
-
Khipu Networks Limited
Chronicle offers a unified experience across SIEM, SOAR, and threat intelligence to drive better detection, investigation, and response. Collect security telemetry data, apply threat intel to identify high priority threats, drive response with playbook automation, case management, and collaboration.
-
Softcat Limited
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly. And we correlate user activity and data movement to protect you from insider-led data breaches.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
Communication-STEM Ltd
Sentinal One Singularity Complete provides best-in-breed EPP & EDR capabilities in one platform, management console, and agent. Designed for organizations seeking enterprise-grade prevention, detection, and response scalable across the enterprise, coupled with custom automations, Singularity Complete empowers security teams to easily identify and secure every user endpoint on their network
-
Chess CyberSecurity Ltd
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
Trustmarque Solutions Limited
Forcepoint is the leading user and data security cybersecurity company, entrusted to safeguard organisations while driving digital transformation and growth. Their solutions adapt in real-time to how people interact with data, providing secure access while enabling employees to create value
-
INTEGRITY360 LIMITED
Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.
-
WR LOGIC LIMITED
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
-
PMD Data Solutions Limited
Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service).
Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.
-
Barrier Networks
Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.
-
BT PLC
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
Spindogs Ltd
Kentico hosting. For mobile optimised, accessible websites. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.
-
Softcat Limited
Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.
-
Objective Corporation Limited
Objective Nexus brings together key Content Solutions to store, govern and manage your information. Integration into Teams ensures corporate governance is applied. Powerful business processes empower users and automates workflow enabling you to take meaningful actions. Meanwhile, your information is protected with military-approved levels of security.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.
-
Panlogic Limited - Digital Engineering
Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)
-
Cyberfort Ltd
Cyberfort's MXDR defends your organisation from cyber threats 24x7x365. Utilising the right combination of Microsoft Sentinel and Elastic SIEM for each customer, SOAR enables ingest efficiency, increased ROI and reduces cost . Detecting, responding, and remediating with high speed, accuracy and transparency, you'll see everything we do to defend you.
-
Computacenter (UK) Ltd
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
4Secure
TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.
-
Objective Corporation Limited
Secure content and process sharing for Digital Government. Objective Connect enables government organisations to securely create Workspaces with external partner organisations.
With ISO27001 accreditation and hosted across multiple AWS UK zones, many public-sector organisations are using Connect as their only tool for external secure file sharing and collaboration.
-
Softcat Limited
iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS intergration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection and Data Loss Prevention
-
eGov Solutions LTD
We offer a secure cloud-based Attendance & Attainment Collection and Monitoring Service. Fully supported ePEP application for all Vulnerable cohorts: Children Looked After (CLA/LAC),Children in Need (CIN),Child Protection (CP) and children with EHCP/SEN plans. Live ePEP analytic dashboards, automatic reminder notifications and alerts for attendance officers for daily AM-PM collections.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.
-
Bramble Hub Limited
The Confidential Reporting application or Integrity Link as it is also known, is used by law enforcement personnel to submit anonymous feedback to their organisation. The tool ensures that personnel can disclose problems relating to standards of conduct, operational failings, and risks without any fear of recrimination or repercussions.
-
CDW Limited
Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.
-
CM Security Ltd
Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.