-
INFOSYS LIMITED
Infosys help transform client’s strategies into viable technology-enabled outcomes through its various service offerings such as Consulting, Implementation, Support and Maintenance, Development & License Optimisation for below Oracle Cloud Products:
1. Financials (ERP)
2. HCM/Payroll
3. SCM
4. Sales & Marketing (CX)
5. BI & Analytics
6. PaaS
-
PROSPERON NETWORKS LTD
SolarWinds® Log Analyzer (LA) is a powerful log management tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualisation, you can quickly and easily gain out-of-the-box visibility into the performance and availability of your IT infrastructure.
-
FACTORY INTERNET LTD
Factory provide a Cloud Based SOC and SIEM Service. Our service has fully management and analyst support along with support for onboarding data. We provide full EDR/XDR functionality with Log Collection from Cloud, SaaS, Network and hundreds of different technologies.
-
INTEGRITY360 LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation
-
CDW LIMITED
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.
Proofpoint CORE Plus - Requires CORE P0 or CORE P1
-
NEOTAS LIMITED
Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.
-
PHOENIX SOFTWARE LIMITED
Visibility across your attack surface, focus efforts to prevent attacks/accurately communicate cyber risk to support optimal business performance.
Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.
-
4 DATA SOLUTIONS LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
INTEGRITY360 LIMITED
Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed
-
SAPPHIRE TECHNOLOGIES LIMITED
Web Application and API protection. Deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. Whether your application is hosted in a data center or in a public/private cloud, decision engine covers, OWASP top ten attacks, API attacks and Bots
-
ARMADILLO SEC LTD
SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.
-
COMPUTACENTER (UK) LIMITED
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.
-
OFFICELABS LIMITED
The OfficeLabs Contract Management Platform maximises the integration capabilities of the Microsoft Power Platform using Power Apps, Power Automate, SharePoint along with Azure. The platform allows multiple users access and guidance through the Contract Process with an easy-to-use contract form while maintaining the built-in security of Microsoft 365.
-
Lloyds Ventures
CyberForceHQ.com: Skills speak louder than words. CyberForce utilizes a science-backed methodology in cyber security skill assessment, developing and validating its tests with input from cyber security experts. These assessments are constructed around established cyber security skill frameworks and have been independently verified for predictive accuracy.
-
SOFTCAT PLC
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
COGNITAS GLOBAL LIMITED
View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising
-
METERIAN LTD
Meterian security suite for enterprise applications continuously protects against vulnerabilities in open source components, stability and licensing risks, while validating the underlying digital infrastructure. Thanks to its unique ingestion algorithms, Meterian ensures unparalleled coverage and precision.
-
JBi Digital
JBi Digital has years of experience designing and developing both online and offline mobile applications.
JBI’s user-focused (UX) applications are built securely using industry best practices. The result is an intuitive, engaging and seamless mobile app that supports your goals and caters to your users’ specific needs.
-
PHOENIX SOFTWARE LIMITED
CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection
-
SOMERFORD ASSOCIATES LIMITED
Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.
-
CYBIT LIMITED
F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.
-
INTEGRITY360 LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
ITogether
Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.
-
SOFTCAT PLC
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
ITogether
Tufin Enterprise elevates your network security program to a highly evolved state, in which, network and cloud security processes are integrated, policy is managed and implemented via zero-touch automation, and everything is administered via a central control plane that delivers unmatched scalability and extensibility
-
VIEWDECK ENGINEERING LIMITED
Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.
-
HSO ENTERPRISE SOLUTIONS LIMITED
HSO's Power Platform Assessment reviews your maturity in governance, security and platform management, alongside envisioning of use cases for development, building a road map around priority, complexity, business goals and value. We then build out your bespoke, governed infrastructure, and validate by developing a high-priority solution, delivering immediate value.
-
Red Sift
Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.
-
SOFTCAT PLC
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action. bssgc