-
BROOKCOURT SOLUTIONS LIMITED
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
SOFTCAT PLC
Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support
-
2T SECURITY LTD
Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business.
This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.
-
INTEGRITY360 LIMITED
Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling
administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime.
This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects
(GPOs), and more
-
Reliance High-Tech Ltd
Nedap access control solution hosted in the cloud. Providing app integration, multiple access control methods and integrations.
-
Barrier Networks
MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.
-
GET SWARMS LIMITED
Swarms Alert Management Solution is designed to handle notifications and alarms within an organization. Includes intelligent alert prioritization, automated responses, real-time monitoring, ensuring swift resolution of critical issues. Seamlessly integrating with current systems, it centralizes alert management, reducing downtime, improving response times, and boosting operational efficiency.
-
Network 2 Supplies Ltd
N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.
-
PHOENIX SOFTWARE LIMITED
BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.
-
Core to Cloud Ltd
Improve your organisation's resilience and ability to respond to cyberattack incidents and threats through the delivery of a series of crisis simulation exercises. The exercises are gamified with organisation relevant, interactive questions on a web interface. Full reports are shared to highlight performance and areas of improvement.
-
Cyberlab
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
SOFTCAT PLC
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Unify Business Solutions Limited
The Unify Mobile Detection System (UMDS) is an effective and affordable solution enabling covert mobile phone detection in a secure environment. Using surveillance instead of blocking, UMDS is 100% legal and provides an accurate solution to eliminate unwanted mobiles in prisons. The UMDS is undetectable and operates with autonomy 24/7.
-
SAPPHIRE TECHNOLOGIES LIMITED
Our service delivers critical insights into the shifting dynamics in every geographic area that matters to you.
Accelerate your decision-making with contextualized OSINT data about geopolitical threats
and trends. We fuse open source, dark web, technical
sources, and original research. By dynamically linking, categorising, and
updating intelligence in real time,
-
YUDU Sentinel
Automated Cloud based information lines for people to call in an incident. Reporting hotlines for messages and a message handling console. Deliver crisis updates by simply typing a message with AI conversion to Voice. 27 languages supported. A low cost call centre.
-
GB Group plc
GBG IDscan’s configurable identity platform automatically recognises and classifies global Passports, ID Cards, Visas, Drivers Licenses and utility bills extracts all data fields and performs authentication checks. The technology including on-device or web SDKs, REST APIs and combined with NFC and NIST facial recognition and liveness to provide level confidence.
-
Computacenter (UK) Ltd
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
CYBIT LIMITED
Prisma Cloud offers the industry’s broadest security and compliance coverage for applications, data, and the entire cloud native technology stack throughout the development lifecycle across multi- and hybrid cloud environments. This include:
Prisma Cloud for cloud application security
Prisma Access (SASE) Cloud access security
Prisma SaaS for visibility and control
-
SOFTCAT PLC
Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.
-
CYBEXER TECHNOLOGIES
The Digital Twin Management Platform (Hybrid) provides a public/private/hybrid cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.
-
Databricks, Inc.
The Databricks Data Intelligence Platform integrates data warehouses, data lakes and AI into a unified "lakehouse," supporting diverse data types and AI workloads. Powered by an open-source foundation, it offers cohesive governance and security measures. Its Data Intelligence Engine ensures tailored insights, fostering organisation-wide data utilisation and AI adoption.
-
Network 2 Supplies Ltd
Decommissioning, data destruction and disposal of legacy equipment is central to managing a system migration to Cloud. N2S ensure any equipment or media that has previously been classified up to, and including, Official Sensitive, is destroyed and disposed of in line with CESG and WEEE regulations.
-
SOFTCAT PLC
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
CDW LIMITED
In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance
-
BLUEFORT SECURITY LIMITED
Allows organisations to protect their Active Directory Environment and Users, by the use of user behaviour analysis, MFA, Service Account Protection and ITDR
-
NIMBUS DIGITAL & TECHNOLOGY INNOVATIONS LTD
Nimbus can provide Cloud Software & Support Services to meet your needs. Using our Nimbus Cloud Automation Pipelines (NCAP), we can quickly provision your Enterprise Scale Microsoft 365 Tenant ready to support the migration of your existing workloads or provide new cloud-ready workloads using policy-driven Infrastructure as Code pipelines.
-
CDW LIMITED
Proofpoint Essentials is a Secure Email Gateway (SEG) that includes AV antivirus, spam detection and authentication controls (SPF, DKIM and DMARC). Essentials does sandboxing of attachments and URLs as well as URL rewritting. Block advanced phishing, malware and imposter attacks with Proofpoint Essentials.
-
Armour Comms
UK company providing NCSC CPA certified out of band secure mobile communications. iOS and Android smartphones and tablets, Windows desktops. Cost-effective, easy to use solution for governments. Secure voice, video, conferencing, instant messaging, group chat, file transfer, cross-domain, interoperability, auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET.
-
Khipu Networks Limited
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP). It provides the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.