-
COMMUNICATE TECHNOLOGY LIMITED
We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.
-
SOFTCAT PLC
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
SOFTCAT PLC
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CHESS ICT LIMITED
Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
COMPUTACENTER (UK) LIMITED
Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.
-
BYTES SOFTWARE SERVICES LIMITED
Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc
-
Cloudflare, Inc.
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform.
Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams.
Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
SOFTCAT PLC
InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.
-
COMMUNICATE TECHNOLOGY LIMITED
Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service
-
SOFTCAT PLC
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
CDW LIMITED
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
SAPPHIRE TECHNOLOGIES LIMITED
An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).
-
CLARITAS SOLUTIONS LIMITED
Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms.
Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.
-
SOFTCAT PLC
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory"
-
GMO GLOBALSIGN LIMITED
GlobalSign's EU eIDAS compliant eSignature services, DSS, QTS and QSS, provides identity-based digital eSignatures and eSeals for your employees and Organisation documents. Simply connect our API to you DMS, or use our ready-integrations with Document Signing platforms, and we'll sign document hashes and embed timestamping for legally recognised eSignatures.
-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.
-
CHARTERHOUSE VOICE & DATA LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
CYBEXER (UK) LTD
The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.
-
CHARTERHOUSE VOICE & DATA LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
DBAAS LTD
We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.
-
CDW LIMITED
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
BYTES SOFTWARE SERVICES LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc
-
PHOENIX SOFTWARE LIMITED
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
-
SAPPHIRE TECHNOLOGIES LIMITED
Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical.
Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations
-
YUDU Sentinel
Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight.
Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.
-
Bob's Business Ltd
A fully managed service including cybersecurity awareness training, policy management, and delivery of simulated phishing campaigns.
Human Vulnerability Assessments and cognitive-behavioral learning.
Delivery of bespoke training packages and cyber masterclasses.
Providers of a learning management system.
-
BYTES SOFTWARE SERVICES LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc
-
AVOCO SECURE LIMITED
ProveToVote (P2V) is a revolutionary solution designed to streamline and simplify the often challenging task of identity verification during the voting process. Avoco’s mission is to make this essential voting element accessible and less burdensome for everyone involved.
-
CHESS ICT LIMITED
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.
-
Billigence
Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, data dictionary and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.