-
Softcat Limited
PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings
-
INTEGRITY360 LIMITED
Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.
-
R2P Systems UK Ltd
RTPI is for users, purchasers and providers of public transport. r2p provide RTPI management tools via our back office, such as single journey cancellations and long-term major diversions (for LED's, TFT displays etc).
RTPI includes disruption information, open data management and dissemination systems for Public Transport Real Time Journey Information.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.
-
MTI Technology Ltd
Trend Micro Cloud App Security protects incoming and internal emails from Microsoft 365 and Gmail™ against advanced malware and other threats. It also enforces compliance on other cloud filesharing and collaboration services, including Box, Dropbox, Google Drive™, Microsoft SharePoint online, Microsoft OneDrive for business, and Microsoft Teams.
-
Softcat Limited
Netwrix Auditor is a powerful platform designed to enhance security and compliance by providing comprehensive visibility into IT infrastructure changes and data access. It enables real-time monitoring, auditing, and reporting across a variety of systems, applications, and files, helping organizations ensure data integrity and regulatory compliance.
-
Zoho Corporation Limited
ManageEngine Site24x7 is an AI-powered observability platform for
DevOps and IT operations. The cloud-based platform’s broad capabilities help predict, analyse, and troubleshoot problems with end-user experience, applications, microservices, servers, containers, multi-cloud, and network infrastructure, all from a single console. With intelligent alerting and zero false positives, users achieve 100% uptime.
-
Espire Infolabs Ltd
Espire helps companies to re-engineer their application landscape for seamless interoperability and interaction between disparate systems. Espire provides effective strategies and solutions against security and compliance challenges based on the industry's standards and all cloud platforms (IaaS ,SaaS, and PaaS environment). Espire provides SOC Consulting, Implementation and Managed services.
-
Design IT Solutions (Trading as Panoptech)
PiX is a combination of a secure mobile application and server solution, facilitating the secure transfer of imagery from a team on the ground, back into an organisation, with the ability to distribute notifications back out to the team, to enable them view new images.
-
Trustmarque Solutions Limited
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.
-
Softcat Limited
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.
-
Somerford Associates Limited
Okta is a leading identity and access management solution providing single-sign on, multi-factor authentication and provisioning capabilities for all applications.
Okta is the foundation for secure connections between people & technology. Using identity information to grant access to applications on any device at any time, enforcing strong security protection.
-
Computacenter (UK) Ltd
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
Bytes Software Services
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response. bssgc
-
Softcat Limited
The SonicWall NSv Series virtual firewall offers you all the security advantages of a physical firewall with the operational and economic benefits of virtualization.
NSv shields all critical components of your private/public cloud environments from resource misuse attacks, cross-virtual-machine attacks, side-channel attacks and common network-based exploits and threats.
-
IP Performance Limited
Controlling Access to target resources and applications.
Monitor all user sessions.
Manage and rotate account passwords.
Just-In-time access and application usage.
Implement zerotrust methodology
-
MISCO TECHNOLOGIES LIMITED
Barracuda Web Application Firewall protects applications, APIs, and mobile app backends against a variety of attacks including the OWASP Top 10, zero-day threats, data leakage, and application-layer denial of service attacks. By combining signature-based policies and positive security with robust anomaly-detection capabilities, Barracuda WAF can defeat today’s most sophisticated attacks.
-
adappt
A smart and simple user-friendly application. The dynamic features of the product provide a scalable solution to several business modules. The Agile business task manager caters for an easily understandable activity management control system. An efficient time evaluator, progress tracker, enables adding multiple tasks in an organised manner.
-
Elcom Systems Ltd
Full purchase to pay process covering requisition, purchase order, receipting, invoicing, payment and returns. Advanced workflows enable effective budget management and create back office efficiencies, control costs and give full transparency. Reporting and analytics tailored to your requirement and integration to 3rd party systems including ERP, Finance, Catalogues and Inventory
-
Logit.io
The Logit.io platform makes logging, metrics and tracing analysis easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
QUADRIS LIMITED
Quadris and Datto work together to provide an industry leading hybrid on-premise and cloud DR and backup solution. An on-premise backup appliance backups up locally, but also syncs this data to a different data centre, this same backup job can be booted live in a DR event.
-
Claritas Solutions Ltd
Empowers users to have complete control of their IT Helpdesk Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.
-
BT PLC
Falcon Insight XDR, an EDR solution, delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
ITGL Limited
Services to cover all Cisco Enterprise Network Software including DNA Essentials/Advantage/Premium Software, Catalyst Centre Software, Identity Services Engine Software, Enterprise Agreements 3.0 and Cisco Spaces.
-
Edge Health Ltd
Edge Data Analytics and Software Hub (DASH) is our cloud-powered solution that can be tailored to requirements. Our DASH can be built bespoke for as variety of use cases ranging from data ingestion, curation and storage, to interactive dashboards with predictive and prescriptive analytics solutions.
-
CYBER SECURITY DEFENCE CONSULTANTS LIMITED
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
-
Bytes Software Services
Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location. bssgc
-
Vidatum Ltd
Vidatum Academic offers a full Research Management System offered in modules from pre- award to post-award stages, including ethical reviews and Export Control, Researcher profiles, outputs, and impact tracking with optional research portal. Vidatum Timesheets covers timesheet compliance for research projects. All modules are supported with a robust reporting console.
-
Redinet Ltd
WatchGuard EPDR is a cybersecurity solution for computers and servers that combines a range of endpoint protection with EDR capabilities. It protects against advanced threats, zero-day malware, ransomware, phishing and malware-less attacks and URL & content filtering capabilities. EPDR automates the prevention, detection, containment, and response actions for ultimate security.
-
Barrier Networks
Leveraging Fortinet’s FortiSIEM and FortiSOAR, the Protective Monitoring and Automated Remediation solution offers users deep multivendor integration for configuration, change management, log collection & correlation, and Indicators of Compromise to detect and contextualise threats in real-time. Automated remediation through playbooks provides a seamless mitigation capability to security teams.