-
MONDAS CONSULTING LTD
Purchase Crowdstrike EDR licences to utilise the power of the Crowdstrike Falcon Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Crowdstrike EDR for signs of malicious activity on your network.
-
Phoenix Software Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
Rocktime Ltd
Rocktime's verso licensing software provides unparalleled provision of Taxi & Private Hire Licensing Automation, data validation and process transformation. Used as a stand alone system or fully integrated, verso™ can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.
-
FCS SOFTWARE SOLUTIONS LIMITED
CommitteesPro is a cloud-based committee management system which has been designed from the ground up to manage the day to day activities involved in a busy democratic services team. From report writing, to Councillor profile management and the publication of agendas and plans all designed in our secure web-based environment.
-
Computacenter (UK) Ltd
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
SoftwareONE
Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
-
ABM Intelligence Limited
ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.
-
QUADRIS LIMITED
Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.
-
BOXXE LIMITED
ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.
-
CEGEKA UK LIMITED
Cegeka UK's Disclosure Management System (DMS); an advanced software solution designed to streamline and automate disclosure processes. Organisations can efficiently handle a range of disclosures, retrieving and aggregating data from multiple sources. DMS provides a secure centralised platform for raising, fulfilling, reviewing, and approving disclosure requests, ensuring accuracy and consistency.
-
Accenture (UK) Limited
A managed email security service to protect your email services from spam, malware and phishing attacks. The ability to perform advanced email routing, encryption and data loss prevention for your outbound email.
-
Recordsure
A Digital Interview Recording solution compliant with the PACE Act as a Secure Digital Network solution. High quality, secure recording with capabilities for automated transcription and sophisticated speech analytics. Integrated with Recordsure’s document analytics and AI provides a multi-media capability, incorporating documents alongside audio recordings.
-
Empowering Communities
The Client/Victim Engagement Module is a unique communications platform that allows clients/victims to share information with you and you share in return. Designed around evidence based best practice. Use with clients, victims, vulnerable persons and students. Enhances wellbeing, electronic safety plans, social prescribing projects. Includes attendance tracker and mood diary
-
BASEEL PARTNERS LLP
Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.
-
CDW Limited
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.
-
Nine23
UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.
-
Softcat Limited
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
CYBERLAB CONSULTING LTD
Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.
-
Atlantic Data
Atlantic Data's Disclosures service provides organizations with an online platform for processing, administering, and managing criminal record checks. This service connects directly to the DBS through its eBulk service. Disclosures Manager is highly configurable with a comprehensive suite of management tools to assist organisations to manage and oversee these checks.
-
Computacenter (UK) Ltd
IBM Netezza Performance Server is a fully managed, cloud native data warehouse. With advanced in-database analytics capabilities, it enables you to do data science and machine learning with data volumes scaling into the petabytes.
-
Leidos Innovations UK Limited
The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.
-
Nine23
UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.
-
Bytes Software Services
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure. bssgc
-
Rowden Technologies Ltd
Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.
-
Computacenter (UK) Ltd
Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.
-
Rocktime Ltd
Rocktime provides private login access to secure content and files as a cloud platform. A secure and scalable service which can be deployed to the Cloud using intuitive and powerful out of the box functions to support administration. For use by both public and private restricted websites.
-
Computacenter (UK) Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
HCL Technologies UK LImited
A rapid application development platform that enables easy assembly of low code applications. Its proven and competent security model keeps data secure, both on local clients, in transit and on servers. Domino Volt - An agile, easy-to-use, low-code development platform that creates web applications for data collection and process automation.
-
Ve3 Global Ltd
Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.