-
BRADLEYSOFT
ESET PROTECT Platform. Available in 5 Tiers. Advanced Multilayered Protection, Including Antivirus, Anti-Malware/Ransomware, Spam Filtering, Comprehensive Cloud Infrastructure Protection. Secure computers, mobiles, file servers, cloud endpoints. Full disk encryption capabilities on Windows and macOS. Advanced protection for Microsoft 365 & Google Workspace apps. Protects your Cloud Email. Patch Management.
-
CDW LIMITED
A Calling Plan is an add-on telephone service that, when combined with Phone System in Office 365, can become the voice solution for your entire organization. A Calling Plan provides people with a primary phone number and lets them make and receive phone calls.
-
EQUINE REGISTER LIMITED
An interoperable and integrated API service that allows organisations to digitally exchange data with each other, communicate with and provide animal (equine, livestock, companion animals) and location specific instructions to operators in the event of a bio- security issue or disease threat. Also supports quarantine controls.
-
TMC3 LIMITED
Veracode Security Labs shifts AppSec knowledge left, giving developers hands-on training to confidently tackle modern threats by exploiting and patching real code, and applying DevSecOps principles to deliver secure code on-time. Regular assignments, progress reports, and leaderboard foster healthy competition, and encourage developers to continuously improve their secure coding skills.
-
COMPUTACENTER (UK) LIMITED
Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.
-
21st Century Technology PLC
The Journeo Portal is the secure and scalable system providing specialist microservices and applications to enhance the data gathering and information dispersal to on-street and in-bus station Passenger Information Displays. The service consumes data in Transmodel data standards and disseminates the information to the right location, at the right time.
-
BARRIER NETWORKS LIMITED
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.
-
SYMETRI LIMITED
Software desktop application for asset management, drainage design (InfoDrainage), stormwater, sanitary sewer (InfoWorks ICM) and water distribution networks (InfoWorks WSPro) and plants. Hydraulic analysis desktop application provider for same networks. Operational analytics platform for real-time descriptive, diagnostic, predictive and prescriptive decision support.
-
PROACT IT UK LIMITED
Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).
-
SOFTCAT PLC
Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.
-
LRQA
Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.
-
NAK Consulting Services Ltd
Extended Security Updates for SQL Server 2012
-
ACCESS UK LTD
Access Mobile TEC solutions include personal alarms with location-based technology built in therefore offering individuals support both inside and outside the home. Different form factors are available including a pendant alarm, mobile app and a wrist-worn watch. Settings are configurable to each individual depending on their telecare needs.
-
Stone Technologies Limited Trading as Converge Technology Solutions
Stone utilises Cisco Duo to provide Multi Factor Authentication.
Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known
vulnerabilities and/or exploits.
-
BARRIER NETWORKS LIMITED
Network Access Control (NAC) is a critical component in the modern-day network. NAC offers organisations the ability to deploy Zero Trust Network Solutions, Secure SD Branch Deployments and ensure IoT, BYOD and user devices are profiled, only allowed to access approved resources and periodically reviewed for compliance.
-
DEF SOFTWARE LIMITED
The Road Adoption module has been designed to manage the transition, processes and intricacies of the Section 38, 278 agreements and APC procedures with ease of use and efficiency in mind. It provides a logical system that automates processes and enables effective
analytical reporting whilst ensuring all milestones are met.
-
CREATIVE NETWORKS LIMITED
3CX PBX VoIP Phone System is software for businesses to make calls via the internet. It replaces traditional phone systems, integrating with SIP trunks, IP phones, and softphones. Offering features like call forwarding and conferencing, it enhances communication, efficiency, and cost-effectiveness for organisations of all sizes.
-
TRUSTCO PLC.
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
KHIPU NETWORKS LIMITED
KHIPU's Safety offering, using CriticalArc's and HPE Aruba's Meridian platforms, provides response teams with complete visibility of everyone and every incident to enhance the protection of people, facilities, and assets. It enables people to respond to any issue/threat/risk by identifying their location and guiding (wayfinding) them to areas of safety.
-
METADATAWORKS LIMITED
MetadataWorks metadata management, data cataloguing and data governance software in the cloud.
-
I-NET SOFTWARE SOLUTIONS LTD
We provide test manager and test leads who got experience in delivering multi million pounds projects across public sector, who got vast experience in various test models and project development models
-
INNAXYS LTD
An equipment booking system for operational and technical equipment and assets, with optional integrated asset management tools. Easy booking process for end users, comprehensively manage equipment bookings and space reservations, assign booking rights, and manage competencies and training qualifications related to equipment usage within a centralised fully audited system.
-
ORTOM8 LIMITED
Selection of Dashboards that provide Management overviews of IT Workload status, Licence Monitoring & Overrun Management and Workload Trends and Analysis to help identify job failures. Innovative tools to simplify Job Definition Creation and utilisation of AI Process Mining technology to optimise batch schedules.
-
SAFE 2 DRIVE SOLUTIONS LIMITED
UK driving licence checking and reporting solution that provides online status, entitlement, and conviction data for UK licence holders using the DVLA ADD service. For professional drivers, it returns CPC and tacho-card dates. Clients access their portal 24/7. The speed of a check response is immediate. A fully managed service.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Power BI Optimisation Service ensures your organisation maximises the potential of its Power BI implementation. Our team of analytics experts offers comprehensive design, implementation, and managed services for both new and existing solutions. We utilise agile delivery methods to provide tailored self-service BI architectures, robust governance models.
-
2IC LIMITED
2iC TRUST is commercial-off-the-shelf (COTS) cross-domain software that delivers assured digital interoperability between devices, systems and networks across different trust domains. These differing trust domains can be defined by different security classifications or different boundaries where there is a need to separate systems, information and equipment.
-
IMOSPHERE LTD
Formulate for SEND is a needs-based education banding tool which helps local authorities to manage top-up funding allocations for young people with special educational needs in an equitable way that is mindful of budgetary pressures. Formulate not only ensures fairness today but also equips LAs to forecast for future needs.
-
IMOSPHERE LTD
An off-the-shelf but customisable solution that enables local authorities to deliver efficient, strengths-based Care Act assessments, and ensure fair, accurate, and sustainable personalised budgets.
-
IDOX SOFTWARE LTD
Our API can be used to share your directory data with any third-party website or system. The API can be configured for each customer so that you're in control of which data fields you wish to make available.
-
TRUSTMARQUE SOLUTIONS LIMITED
Trustmarque SIP Trunks provide a flexible alternative to ISDN and are compatible with leading IP PBX brands in the UK.
Compared to ISDN, SIP Trunks are cheaper, more flexible, and offer a robust business continuity service.
They deliver enhanced features including; automatic fail-over, flexible SIP channels and inbound call control.