-
INTEGRITY360 LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more. bssgc
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.
-
SOFTCAT PLC
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
INTEGRITY360 LIMITED
Galaxkey Enterprise Cloud Plus - Hybrid provides pure end-to-end Email encryption, file
encryption, Secure Workspace collaboration and Digital Document Signing. All based
on CPA certified encryption through the NCSC. Features: email revocation,
classification, notifications, geofencing, digital signatures, secure collaboration and file
sharing capabilities. Centrally managed with complete white labelling capabilities
-
NEO TECHNOLOGY LIMITED
Propsys360 streamlines every stage of the repairs lifecycle, from logging faults and triaging priorities to scheduling operatives, tracking progress and analysing data, ensuring faster first-time fixes, reduced downtime and happier residents. Automated workflows, mobile apps and intuitive dashboards unite teams, optimise parts usage, drive compliance and protect long-term asset value.
-
APPLIED NETWORK SOLUTIONS LIMITED
247lib.com is a secure library asset and online resource management system. 247lib.com is a library management system, which allows prisons to manage their collections easily and efficiently. All applications are backed by full training, migration, implementation and support services.
-
VIEWDECK ENGINEERING LIMITED
Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.
-
Red Sift Ltd
Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.
-
SOFTCAT PLC
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action. bssgc
-
HANDD Business Solutions
GoAnywhere MFTaaS (Managed File Transfer as a Service) is a cloud-based solution for secure file transfers. It offers encryption, automation, and centralised management, enabling businesses to securely exchange data across systems, partners, and platforms. It simplifies file transfer processes while ensuring compliance with data security regulations.
-
INTEGRITY360 LIMITED
Claroty xDome spans the entire cybersecurity journey, empowering organisations with comprehensive OT (operational techncology)/ICS (Industrial Control Systems) asset visibility, identifying, measuring, prioritising risk, deploying Zero Trust-based protective controls, to optimising threat-detection through a vast network of integrations. xDome is a modular, SaaS platform that makes XIoT cybersecurity decision clear through:
-
Experian
Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime
-
Proact IT UK Limited
Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).
-
Transparity
Our CSP Subscriptions for Microsoft 365 provide the subscription licensing of your Microsoft Cloud environment in a flexible and cost-effective manner. We also offer proactively managed services which are offered as a chargeable add-on services, which are materially lower in cost than traditional asset and user based managed service offerings.
-
Atlas Cloud Ltd
Microsoft 365 is widely used, but its standard email security may not be enough. Mimecast offers layered protection that complements Microsoft’s defences. It stops threats without hindering collaboration, keeps archives compliant, and empowers end-users. Think of it as adding an extra lock to your digital door.
-
Cyberlab
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
CYMBALSTREAM SOLUTIONS LIMITED
Cymbalstream delivers 24/7 monitoring and response software designed to detect, investigate, and mitigate cyber threats across networks, endpoints, and cloud environments. Combining advanced security technology, threat intelligence, and expert-driven workflows, our platform enables organisations to proactively hunt for threats and respond to incidents across their IT infrastructure.
-
BYTES SOFTWARE SERVICES LIMITED
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud. bssgc
-
BOXXE LIMITED
boxxe's Vulnerability and Patch Management services aims to take away the burden of identifying and remediating software vulnerabilities within your IT environment including on your server estate and your end user devices. boxxe uses market leading solutions along with our internal security analysts to identify, prioritise and remediate software.
-
Gradian Systems Ltd
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
RPOST UK LIMITED
RSign® is the award-winning eSign and eForms feature-rich and affordable solution by RPost®. Recognized by IDC MarketScape and Aragon Research, RSign ensures compliance, security, and convenience. It integrates seamlessly with platforms like Outlook and Salesforce. Streamline workflows, reduce eSignature costs, and improve customer service. Choose RSign - just switch it!
-
OSTRATTO LTD
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
BOXXE LIMITED
Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service.
You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
SOFTCAT PLC
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Document Management solution offers features like document retrieval, upload and tagging, notifications, search functionality, access permissions, secure storage, online edits, photo upload extension, and bulk letter splitting. It ensures compliance, improves information accessibility, enhances customer experience, and streamlines internal processes.
-
Elemendar - AI for Cyber Threat Intelligence (CTI)
Elemendar supplies READ, an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. READ makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.
-
Admincontrol AS
Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.