-
SOFTCAT PLC
Adaptive Email DLP uses behavioural AI to learn about your employees’ normal email sending behaviours, their trusted relationships and how they communicate sensitive data. It then analyses each email to detect anomalous behaviour, notifying admins of potential data loss incidents. warn users in real-time, prevent sensitive data loss through email.
-
AUTODATA PRODUCTS LIMITED
Veeam software ensures that you can backup all workloads regardless of whether they are on premise, in the cloud or within a SaaS provider. Autodata’s Cloudlake Backup service ensures that you can protect every workload, regardless of location, whilst reducing costs and having support from an award-winning Veeam partner.
-
COOLSPIRiT, a Databarracks company
Safeguard your organisation, stop digital attacks in their tracks. Illumio provides the only proven segmentation product suite purpose-built for Zero Trust security. Illumio has pioneered an unprecedented way to orchestrate Zero Trust segmentation down to the application and workload level, identifying and easily blocking pathways of attack to digital operations.
-
SCG CORPORATE LIMITED
Data Loss Prevention (DLP) is a strategy for ensuring your employees and vendors do not accidentally or intentionally share sensitive and company confidential data outside your organization. A DLP solution utilizes content discovery, digital inspection techniques, and contextual analysis to identify and categorize sensitive data and IP.
-
PANLOGIC LIMITED
Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)
-
IBM UNITED KINGDOM LIMITED
IBM OpenPages with Watson is an AI-driven, highly scalable governance, risk and compliance (GRC) solution that runs on any cloud. Centralize siloed risk management functions within a single environment designed to help you identify, manage, monitor and report on risk and regulatory compliance, especially in today’s changing business landscape.
-
Computacenter (UK) Ltd
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
4SECURE LIMITED
TrustedFilter transforms, inspects, and filters a wide spectrum of data types and protocols such that only 'known good' data is allowed to cross network boundaries and between networks of different trust. We also provide file content disarm and reconstruction to sanitise files during transfer.
-
Network 2 Supplies Ltd
N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.
-
SERA NEON LIMITED
Oracle Cloud BAU Support. Programme-BAU Transition. Support end-users and the Business/Operations team with Oracle Cloud Functional and Technical incidents. Manage the BAU Service desk, including incident triaging. Manage the complete incident-to-deployment lifecycle. Working collaboratively with the business ensures robust enablement and continuous service improvement.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Darktrace Antigena is the world’s first proven Autonomous Response technology for the enterprise. The system operates as an AI decision-making framework that neutralises fast-moving and unpredictable attacks in seconds, while sustaining normal operations by design.
-
CDW LIMITED
Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.
-
CM Security Ltd
Censornet Web Security safeguards organisations from online threats by filtering web traffic. It offers URL filtering, malware detection, content inspection, and real-time threat intelligence for secure internet usage. Granular control over web access policies ensures compliance and risk mitigation.
-
INTEGRITY360 LIMITED
Calculate, communicate and compare your cyber risk.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc
-
SOFTCAT PLC
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.
-
GET SWARMS LIMITED
GetSwarms provides an intuitive, cloud-based Vulnerability Management system that is easy to set up and deploy. It conducts comprehensive scans of your network, assets, and the deep web to identify potential security risks. The system also ensures compliance with industry standards, helping organizations protect their infrastructure and data effectively.
-
PEGASUS LABS PTY LTD
When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.
-
SAPPHIRE TECHNOLOGIES LIMITED
Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services
-
FLYFORM LTD
ServiceNow implementation and software.
A portfolio of robust cloud-based applications that automate and manage enterprise services providing a complete ServiceNow ITSM solution. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, one data model, delivering easy, automated upgrades.
-
OFFICELABS LIMITED
The Incident management application supports the process by which companies identify, prevent, respond to, record, and analyse health and safety risks in the workplace.
Providing a way to record and report activity and use workflow to action any follow on activities. Includes intuitive forms and comprehensive reporting.
-
SOFTCAT PLC
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
WR LOGIC LIMITED
Our service offers a secure, air-gapped sandbox for data science and processing, tailored for national security departments. It ensures maximum data isolation and protection using Azure Stack Hub, Azure Synapse Analytics, Azure Data Factory, and Azure Databricks, among other technologies.
-
BROOKCOURT SOLUTIONS LIMITED
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
4 DATA SOLUTIONS LIMITED
CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.
-
HANDD Business Solutions
Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.
-
HANDD Business Solutions
Spirion's Sensitive Data Platform (SDP) provides Privacy Grade™ data discovery and purposeful classification in a highly scalable SaaS hybrid architecture, that thoroughly scans both on-premises endpoints/servers and cloud repositories at enterprise scale. It automatically discovers, classifies, and remediates almost any form of sensitive data anywhere on-premises, the cloud, and endpoints.
-
BITZ 'N' PC'Z LIMITED
Heimdal Security elevates your digital defense, seamlessly integrating powerful anti-virus and firewall capabilities with cutting-edge ransomware protection and vulnerability management, ensuring unparalleled security for your data and systems.
This bundle includes:
• Next-Gen Anti-Virus, Firewall & MDM
• Ransomware Encryption Protection
• Patch & Asset Management
• 24/7 Monitoring