-
Somerford Associates Limited
Kafka’s founders Confluent sets Organisations’ data in motion
Real-time/Digital Transformation/Edge/Citizen Data 360 View/Personalisation/Self-Service/Continuity/Data connectivity
Streamlining Defence/Central Agencies' Operational decisions
Cross-Departmental Data sharing
Smart Supply Chain/Logistics
Event-driven microservices, modernising legacy & connecting hybrid cloud systems
Delivering real-time usage/analytics, streaming ETL.
Flink/Stream processing
Available on AWS Marketplace
-
MTI Technology Ltd
MTI provide market leading CyberArk Privileged Access Security Licensing, Integration and Management Services. We can fully secure privileged accounts across your organisation including password control and full auditing of administrator actions via recorded sessions. The service is supported by our UK based 24x7x365 Security Operations Centre (SOC).
-
Softcat Limited
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
AMS
AMS File Transfer is a secure encrypted file transfer and file sharing solution used for digital delivery of large and/or confidential files internally and externally. Highly secure, trusted by the NHS and government bodies across the UK, AMS File Transfer will provide a full audit trail, traceability and compliance.
-
Softcat Limited
Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behaviour as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.
-
Somerford Associates Limited
Splunk Edge Hub is a fully integrated solution with in built sensors and all necessary connectivity libraries already integrated into it. Providing a quick and easy to use solution of getting data from their environmental sensors, IoT devices and industrial equipment into their Splunk environment.
-
Grove Information Systems
Powered by Cyber Risk Context Technology, the platform leverages data science to accurately track, measure and predict real-world exploit activity across the enterprises’ global attack surface. With Kenna, security and IT Operations teams can finally align to proactively manage the vulnerabilities that matter most.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point XDR/XPR delivers comprehensive threat prevention by integrating network, endpoint, and cloud data. It employs advanced analytics to detect and mitigate sophisticated cyber threats, ensuring real-time protection across all IT environments. This solution bolsters cyber security resilience and streamlines incident response operations.
-
Brookcourt Solutions
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Extends our human-centric security from Email to cloud apps. Protects users from cloud threats, safeguards sensitive data and helps you stay compliant with cloud app governance.
-
MLL Telecom Ltd.
Sophos MDR is a flexible, fully managed, 24x7x365 cyber security threat protection, detection, and response service. It provides SOC analyst-led threat hunting and investigation, combining human expertise with protection technologies and advanced machine learning. MDR can detect, investigate, and neutralize advanced human-led attacks, preventing data breaches, exfiltration, and ransomware attacks.
-
Blacklight Software
Blacklight work with Microsoft 365 to allow public sector organisations such as central and local government bodies, education, healthcare and social housing providers to improve collaboration and working processes.
Microsoft Azure offers a wide platform of specialist services from identity to AI.
Integrations with other systems allow for automated processes.
-
SAP UK Ltd
SAP Customer Data Cloud builds trust with businesses, partners, and customers through seamless engagements and personalised digital experiences, turning anonymous visitors into loyal customers.
-
Chess CyberSecurity Ltd
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
RAZOR THORN SECURITY LTD
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
Softcat Limited
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
Astun Technology Ltd
Astun Clarity is a cloud based metadata service that provides both internal metadata maintenance and discovery services with a workflow for quality approval and subsequent publication of a subset of records to data.gov.uk or another standards compliant portal.
-
Computacenter (UK) Ltd
Cloud-delivered DDoS protection that detects and mitigates attacks before they reach your network infrastructure.
-
Netpremacy Limited
Google Gemini AI Security for Google Workspace gives customers access to the AI Classification capability in Google Drive, allows IT teams to automatically and continuously identify, classify, and label sensitive files across the organisation. Classified files can then be protected with existing data loss prevention (DLP) controls.
-
CDW Limited
We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.
-
Cobry
Google Workspace is Google’s secure productivity and collaboration platform, giving teams of all sizes the tools they need to get everything done, all in one place.
The cloud based IT system means your teams can work and collaborate effectively no matter where they are.
-
Softcat Limited
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
Softcat Limited
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.
-
Gradian Systems Ltd
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
Spindogs Ltd
Bilingual open source website design & development. Mobile optimised, and accessible. Spindogs' open source Content management system platform provides bespoke templates for content editors. GDPR compliant CMS has an easy to use admin interface and flexible content editing features. The content management system is open-source, user friendly, and fully customisable.
-
BOXXE LIMITED
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
-
Responsiv Solutions Ltd
The IBM Security Guardium for Marketplaces offering delivers an advanced data security solution based on the IBM Security Guardium Data Protection product. It allows Clients to automatically discover and classify sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behaviour analytics.
-
AVORD Limited
A powerful client based platform that provides the management of time and costs across a wide range of consultancy, including security, operations and strategy.
Examples include penetration testing, compliance certifications, Operational Technology (OT), 24x7 365 SOC Services.
-
INTEGRITY360 LIMITED
Simple, scalable and automated vulnerability scanning for web applications.
-
Gradian Systems Ltd
Symantec WPS gives organizations an advanced cloud-delivered Secure Web Gateway and leading on-premise SWG deployment—both of which can operate seamlessly together with a unified management, reporting, and policy control interface. It also includes Threat Intelligence, SSL Inspection, Content Analysis, Isolation, Sandboxing, WAF, and more.