-
SAPPHIRE TECHNOLOGIES LIMITED
Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services
-
FLYFORM LTD
ServiceNow implementation and software.
A portfolio of robust cloud-based applications that automate and manage enterprise services providing a complete ServiceNow ITSM solution. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, one data model, delivering easy, automated upgrades.
-
OFFICELABS LIMITED
The Incident management application supports the process by which companies identify, prevent, respond to, record, and analyse health and safety risks in the workplace.
Providing a way to record and report activity and use workflow to action any follow on activities. Includes intuitive forms and comprehensive reporting.
-
SOFTCAT PLC
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
WR LOGIC LIMITED
Our service offers a secure, air-gapped sandbox for data science and processing, tailored for national security departments. It ensures maximum data isolation and protection using Azure Stack Hub, Azure Synapse Analytics, Azure Data Factory, and Azure Databricks, among other technologies.
-
BROOKCOURT SOLUTIONS LIMITED
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
4 DATA SOLUTIONS LIMITED
CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.
-
HANDD BUSINESS SOLUTIONS LIMITED
Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.
-
HANDD BUSINESS SOLUTIONS LIMITED
Spirion's Sensitive Data Platform (SDP) provides Privacy Grade™ data discovery and purposeful classification in a highly scalable SaaS hybrid architecture, that thoroughly scans both on-premises endpoints/servers and cloud repositories at enterprise scale. It automatically discovers, classifies, and remediates almost any form of sensitive data anywhere on-premises, the cloud, and endpoints.
-
BITZ 'N' PC'Z LIMITED
Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems.
This bundle includes:
• Next-Gen Anti-Virus, Firewall & MDM
• Ransomware Encryption Protection
• Patch & Asset Management
• 24/7 Monitoring
-
BYTES SOFTWARE SERVICES LIMITED
"Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments." bssgc
-
Grove Information Systems
ESETs combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect organisations against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
-
ENTRUST (EUROPE) LIMITED
Entrust’s Cloud-Based Multi-Factor Authentication Platform, Identity as a Service, empowers organizations and users to secure access to cloud, legacy and on-premise apps while safeguarding enterprise assets. Identity as a Service is a full-scale, multi-factor authentication platform based in the cloud, suitable for user bases of all sizes.
-
IMMERSIVE LABS LTD
True resilience requires people and teams work together. With a seamless and tailored experience for individuals, teams, and organization, we provide unmatched cybersecurity exercises and training, along with data-driven insights and guidance to improve resilience.
Immersive provides enterprise-class scale, security, reliability, and integrations for the world's largest organizations.
-
AVOCO SECURE LIMITED
Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.
-
VE3 GLOBAL LTD
Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.
-
MISCO TECHNOLOGIES LIMITED
Explore. Investigate. Take Action. Reactor is the investigation software that connects cryptocurrency transactions to real-world entities. Examine criminal activity, such as the movement of stolen funds, as well as legitimate activity like flash loans and NFT transfers
-
Bright Cyber
Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.
-
ZINC DIGITAL BUSINESS SOLUTIONS LIMITED
ZINC 'SYNAPSE' is a intuitive solution crafted for organisations navigating high-risk and complex environments, safeguarding public safety, personnel, brand and assets. With features spanning incident management, mass communications, health and safety oversight, compliance activities, and security patrols, SYNAPSE consolidates operations into a unified platform.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.
-
XPERTEX LTD
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.
-
MONDAS CONSULTING LTD
Purchase SentinelOne EDR licences to utilise the power of the SentinelOne’s Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the SentinelOne EDR for signs of malicious activity on your network.
-
SOMERFORD ASSOCIATES LIMITED
We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.
-
BYTES SOFTWARE SERVICES LIMITED
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence. bssgc
-
INTEGRITY360 LIMITED
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
TMC3 LIMITED
OneTrust IT & Security Risk Management transforms public sector security strategies with comprehensive risk identification, management, and mitigation capabilities. Our IT & Security Risk Management platform integrates seamlessly, enabling real-time risk assessment and promoting resilient, compliant operations.
-
LEIDOS INNOVATIONS UK LTD
Leidos offers Cloud Health Check services to provide a holistic review of IT services and applications, assessing configuration, performance, security and scalability of cloud infrastructure. Our expert engineers/consultants work with you to determine scope, pain points, concerns and expected outcomes, followed by detailed discovery exercises, reporting and action plans.
-
I-NET SOFTWARE SOLUTIONS LTD
We provide end2end cyber security services for desktop, mobile and cloud applications
-
SCG CORPORATE LIMITED
An Autonomous Security Awareness Program Built For The Enterprise
A complete, fully-managed training program that transforms security culture. Pairing the most advanced training solutions: including phishing simulation, awareness training & compliance.
-
ITogether
ITogether's Check Point Renewals service ensures continuous protection and performance by managing the renewal process of your Check Point security solutions. Our expert team provides timely updates, license management, and support, ensuring your cybersecurity measures remain robust, up-to-date, and aligned with evolving threats and compliance requirements.