-
INTEGRITY360 LIMITED
Remote access to Trend Micro’s infrastructure is strictly controlled and monitored. All authentication methods used adhere to industry best practices/standards such ascertificate-based and/or multi-factor authentication. Where appropriate, single sign-on (SSO) leveraging the corporate directory is used.
-
WR LOGIC LIMITED
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
-
SAPPHIRE TECHNOLOGIES LIMITED
A security operations service (SOC) tuned and designed for public sector use, effectively building a common SOC for public sector. This allows public sector to individually buy into a common set of standards and processes aligned to public sector threat intelligence.
-
CYBERIAM HOLDINGS LIMITED
CyberIAM's MISP is a Managed Identity Service Platform, offering a set of services tailored to the size and needs of your environment; providing implementation of privileged and identity and access management (IAM and PAM) solutions to protect your identities as well as the management of the software after implementation.
-
APPVIA LTD
A developer self-service platform: Provide self-service capabilities to Developers, ensuring secure and consistent infrastructure and application deployments on Azure, AWS and GCP.
Manage a fleet of Kubernetes Clusters, (GKE, AKS, EKS) and Helm packages with automated workload identities and package up Terraform modules for self-service with application deployment templates.
-
ACCESS UK LTD
Our cloud-based risk and compliance platform helps firms record, track and manage their regulatory and quality standard obligations. The system is used to help them comply with the SRA Standards and Regulations, Lexcel and CQS.
We have designed modules to make it easier to complete common risk and compliance activities
-
PMD DATA SOLUTIONS LIMITED
Specialist reseller of cloud-based backup, email protection, data retention, archive, migration and DRaaS (Disaster Recovery as a Service).
Partner technologies include Barracuda, AvePoint, Redstor, Unitrends & Spanning. Protection for MicroSoft Office 365, Google Workspace, Google Classroom, Dynamics 365, Salesforce and Azure workloads.
-
BARRIER NETWORKS LIMITED
Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.
-
Intercity Technology Limited
Managed Anti Malware (AppGuard) provides proactive endpoint security against advanced threats. It utilises zero-trust application control to prevent malware and ransomware attacks. Centralised management provides real-time monitoring and automatic updates. Enhance your defence without impacting performance. Ideal for businesses prioritizing robust, cloud-managed cybersecurity solutions.
-
SOFTCAT PLC
Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations
-
SOFTCAT PLC
Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.
-
AUTODATA PRODUCTS LIMITED
Veeam software ensures that you can backup all workloads regardless of whether they are on premise, in the cloud or within a SaaS provider. Autodata’s Cloudlake Backup service ensures that you can protect every workload, regardless of location, whilst reducing costs and having support from an award-winning Veeam partner.
-
COOLSPIRIT LIMITED
Safeguard your organisation, stop digital attacks in their tracks. Illumio provides the only proven segmentation product suite purpose-built for Zero Trust security. Illumio has pioneered an unprecedented way to orchestrate Zero Trust segmentation down to the application and workload level, identifying and easily blocking pathways of attack to digital operations.
-
SCG CORPORATE LIMITED
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.
-
PANLOGIC LIMITED
Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)
-
IBM UNITED KINGDOM LIMITED
IBM OpenPages with Watson is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape.
-
COMPUTACENTER (UK) LIMITED
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
4SECURE LIMITED
TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.
-
NETWORK 2 SUPPLIES LIMITED
N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.
-
SERA NEON LIMITED
Support Local Government end-users and the Business/Operations team with Oracle Cloud incidents—local Government expertise, supporting Business and System experts. Recent success includes onboarding a London Borough for Managed services and successfully transitioning from the outgoing Solution Integrator. ITIL/SWOT analysis for LocalGov Programmes. Automation utilities, ITSM tool.
-
ITogether
Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.
-
CDW LIMITED
Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.
-
CM SECURITY LTD
Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.
-
INTEGRITY360 LIMITED
Calculate, communicate and compare your cyber risk.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
ITogether
OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc
-
SOFTCAT PLC
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.
-
GET SWARMS LIMITED
GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.
-
PEGASUS LABS PTY LTD
When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.