-
BOOMERANG I-COMMS LTD
Boomerang delivers a robust two-factor authentication (2FA) messaging service, bolstering account security with one-time passcode (OTP) verification. Our solution equips developers with seamless integration tools for heightened protection against unauthorized access. Leveraging Boomerang's platform fortifies accounts, reducing risks and ensuring compliance with ISO 27001, Cyber Essentials, and Cyber Essentials Plus.
-
VOIXTEL
We are an experienced cloud telecoms provide offering bespoke solutions tailored to meet your needs. We offer virtual telephone numbers that are not tied to physical hardware with intelligent functionality which enables callers to contact organisations in the most efficient way, providing targeted solutions for niche applications.
-
BOXXE LIMITED
Simple, scalable and automated vulnerability scanning for web applications.
-
Network 2 Supplies Ltd
Data destruction and disposal/recycling of legacy equipment is central to managing a system migration to Cloud. N2S offer onsite data destruction for hardware. Certificates listing hard drive serial numbers as proof of destruction are provided. All resultant waste will be disposed of in-line with the WEEE regulations.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
TECHNOLOGY SERVICES GROUP
TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup.
This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.
-
GET SWARMS LIMITED
Penetration Testing Solution offered by Get Swarms provides comprehensive assessments to bolster organisation security. By simulating real-world cyber-attacks, we uncover vulnerabilities in networks and applications, enabling proactive defense measures. Detailed reports are produced together with proposed remediations to support ongoing cyber defence strategy.
-
Gradian Systems Ltd
Quickly gain full visibility and context for your data, whether in motion or at rest, across on-premises and cloud environments. Enhanced by the power of our customisable, accurate, and explainable AI Mesh, this is a game-changer for security in Generative AI usage and governance.
-
ZENZERO SOLUTIONS LIMITED
Comprehensive vulnerability scanning including internal, external, network, application, compliance and agent-based scanning. Powered by Qualys, our scanning provides continuous assurance, identifies potential security weaknesses and threats across assets and provide actionable remediation advice.
-
CDW LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance. bssgc
-
DIEGESIS LIMITED
Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.
-
SOFTCAT PLC
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
BYTES SOFTWARE SERVICES LIMITED
World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc
-
PHOENIX SOFTWARE LIMITED
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
CM Security Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our
cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and
detects advanced threats with AI-powered automation.
-
Infosec Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
Blue Lights Digital
COUNTER is an ecosystem of OSINT, WEBINT, SOCMINT and SIGINT Ops capabilities. Our solutions are designed to capture, acquire, identify, analyse and assess intelligence & investigations data for operators, analysts and investigators. Offering many levels of capability with service and support available from UK security cleared employees and expert partnerships.
-
OpenSky Data Systems
OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.
-
MTI TECHNOLOGY LIMITED
MTI Managed SIEM (Security Information and Event Management) provides a centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, with SC Cleared analysts, is fully integrated with Alien Vault's market leading technology and offers 24*7*365 assurance to your business.
-
GAMMA NETWORK SOLUTIONS LIMITED
Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.
-
BYTES SOFTWARE SERVICES LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc
-
Zoho Corporation Limited
A unified patch management solution that streamlines and automates the patch management lifecycle of an enterprise, from testing to deployment of the patches and generating reports. It supports patching across servers, workstations, and laptops and deploys patches to Windows, macOS, Linux, drivers, BIOS, antivirus, and 850+ applications on various networks.
-
Grove Information Systems
Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.
-
PCI Pal
PCI Pal® Agent-assisted phone-based payments, utilises DTMF (Dual Tone Multi Frequency) masking technology to provide companies with a secure way of handling payments by phone without bringing their environments in scope of PCI DSS. Allowing merchants complete flexibility to enable their customers to click to pay or speak to pay.
-
TRUSTMARQUE SOLUTIONS LIMITED
A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.
-
CM Security Ltd
CASB provides administrators with comprehensive visibility and control over the usage of SaaS platforms within their organisation. It helps manage shadow IT usage, allowing organisations to identify and address security risks associated with unauthorised cloud applications and prevent unauthorised sharing of sensitive data.
-
Scarce IT
Through our fast-track adoption approach, we embed ServiceNow quickly and optimally, speed your ROI, and facilitate digital and cultural transformation for your business. Whether you are considering ServiceNow, or have purchased and need help implementing, Scarce will deliver you successfully, affordably & speedily onto the world’s leading Enterprise IT Platform.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Accessibility Assessment Service ensures digital products and services comply with WCAG standards and accessibility regulations. Our certified UX practitioners conduct thorough audits, providing actionable insights and recommendations for improving accessibility and achieving compliance.