-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for M365 (powered by Veeam) protects organisations from undetected deletions, corruption and both internal and external threats. Our unique model allows you to protect Exchange, Teams, Sharepoint and OneDrive for Business against any event, whilst ensuring you only purchase exactly what you need with no wasted expense.
-
CHARTERHOUSE VOICE & DATA LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
CYBEXER (UK) LTD
The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.
-
CHARTERHOUSE VOICE & DATA LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
DBAAS LTD
We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.
-
CDW LIMITED
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
BYTES SOFTWARE SERVICES LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc
-
PHOENIX SOFTWARE LIMITED
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
-
SAPPHIRE TECHNOLOGIES LIMITED
Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical.
Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations
-
YUDU Sentinel
Sentinel Spaces is a new major Incident management platform that allows Spaces to be prepared for specific threats, ready for activation. Crisis teams at multi-site locations can run local incidents with central oversight.
Tools include, mass notification, secure chat, conferencing, document distribution, task management, decision and audit logs.
-
Bob's Business Ltd
A fully managed service including cybersecurity awareness training, policy management, and delivery of simulated phishing campaigns.
Human Vulnerability Assessments and cognitive-behavioral learning.
Delivery of bespoke training packages and cyber masterclasses.
Providers of a learning management system.
-
BYTES SOFTWARE SERVICES LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc
-
AVOCO SECURE LIMITED
ProveToVote (P2V) is a revolutionary solution designed to streamline and simplify the often challenging task of identity verification during the voting process. Avoco’s mission is to make this essential voting element accessible and less burdensome for everyone involved.
-
CHESS ICT LIMITED
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.
-
BILLIGENCE EUROPE LTD
Collibra provides a solution covering data governance, stewardship, metadata processing, business glossary, data dictionary and catalogue. This enables business users to find their data easily, understand where it has come from and be able to trust the quality of the data. Collibra only processes metadata: data about the data.
-
CHESS ICT LIMITED
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
CIRRO LIMITED
Organisations are increasingly dependent on third-parties to deliver. Our approach to this Governance Risks and Compliance (GRC) is based on Caveris ICAS.
This allows you to Automate your Third-Party Risk Assessment Lifecycle on a single user friendly platform so you can identify, track and remediate issues faster.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Code Security provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use. With Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations. bssgc
-
CDW LIMITED
Control, manage and audit non-human privileged access for applications, including commercial off-the-shelf, in-house developed applications and applications developed using DevOps tools and methodologies -- across on premises, hybrid, cloud and containerized environments.
-
SOFTCAT PLC
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
-
TMC3 LIMITED
Data Mapping and Information Asset Register by OneTrust. The platform enables organisations to identify data flows and information assets to establish and maintain an accurate Information Asset Register. Seamlessly connect and discover all data systems utilising flexible intake methods including pre-built connectors, expert-crafted questionnaires, and bulk import tools.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.
-
SOMERFORD ASSOCIATES LIMITED
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.
-
BARRIER NETWORKS LIMITED
Incenter SaaS platform : continuous penetration-testing, automation and human testers, continually test for vulnerabilities in applications, infrastructure and software.
Penetration-Testing: Ethical hacker team providing penetration testing to find vulnerabilities and risk.
Threat Hunting: Consulting looking for IOC within organisation.
"Teaming": Assessing attack vectors (Red), Defensive team (Blue) and mix (Purple)
-
INTEGRITY360 LIMITED
Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.
-
KONSOLUTE LTD
Enhance your data analysis and discovery with Konsolute Kolumbus, a powerful tool designed for discovering, visualising, and analysing organisational data. Kolumbus simplifies understanding large datasets, supports compliance, and aids in effective data migration by identifying key data elements and structuring them through intelligent taxonomy creation.
-
INTEGRITY360 LIMITED
Our combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
-
SKYFLO DIGITAL LTD
Single platform designed to help governments to serve the people faster. Get value quickly with purpose-built data, integration, automation, AI, analytics, UX for public sector.
Out-Of-The-Box capabilities to manage citizen services and benefits, deliver authorisations, manage rules and compliance, ensure safety and justice, recruit, onboard, develop public sector employees. SFDC2024GC14
-
Chess CyberSecurity Ltd t/a CyberLab
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.
-
SOFTCAT PLC
Cloud Data Sense is a data mapping and classification tool, across your hybrid cloud and on-premise environment. Driven by our powerful AI algorithms, we provide automated controls and reporting so that you can always stay on top of your data