-
BYTES SOFTWARE SERVICES LIMITED
"Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments." bssgc
-
Grove Information Systems
ESETs combination of spam filtering, anti-malware scanning, anti-phishing and cloud sandboxing helps protect organisations against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
-
ENTRUST (EUROPE) LIMITED
Entrust’s Cloud-Based Multi-Factor Authentication Platform, Identity as a Service, empowers organizations and users to secure access to cloud, legacy and on-premise apps while safeguarding enterprise assets. Identity as a Service is a full-scale, multi-factor authentication platform based in the cloud, suitable for user bases of all sizes.
-
Immersive Labs
True resilience requires people and teams work together. With a seamless and tailored experience for individuals, teams, and organization, we provide unmatched cybersecurity exercises and training, along with data-driven insights and guidance to improve resilience.
Immersive provides enterprise-class scale, security, reliability, and integrations for the world's largest organizations.
-
AVOCO SECURE LIMITED
Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.
-
VE3 GLOBAL LTD
Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.
-
MISCO TECHNOLOGIES LIMITED
Explore. Investigate. Take Action. Reactor is the investigation software that connects cryptocurrency transactions to real-world entities. Examine criminal activity, such as the movement of stolen funds, as well as legitimate activity like flash loans and NFT transfers
-
Bright Cyber (Voodoo technology LTD)
Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.
-
Zinc Digital Business Solutions Ltd
ZINC 'SYNAPSE' is a intuitive solution crafted for organisations navigating high-risk and complex environments, safeguarding public safety, personnel, brand and assets. With features spanning incident management, mass communications, health and safety oversight, compliance activities, and security patrols, SYNAPSE consolidates operations into a unified platform.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.
-
XPERTEX LTD
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.
-
MONDAS CONSULTING LTD
Purchase SentinelOne EDR licences to utilise the power of the SentinelOne’s Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the SentinelOne EDR for signs of malicious activity on your network.
-
SOMERFORD ASSOCIATES LIMITED
We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.
-
BYTES SOFTWARE SERVICES LIMITED
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence. bssgc
-
INTEGRITY360 LIMITED
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
TMC3 LIMITED
OneTrust IT & Security Risk Management transforms public sector security strategies with comprehensive risk identification, management, and mitigation capabilities. Our IT & Security Risk Management platform integrates seamlessly, enabling real-time risk assessment and promoting resilient, compliant operations.
-
LEIDOS INNOVATIONS UK LTD
Leidos offers Cloud Health Check services to provide a holistic review of IT services and applications, assessing configuration, performance, security and scalability of cloud infrastructure. Our expert engineers/consultants work with you to determine scope, pain points, concerns and expected outcomes, followed by detailed discovery exercises, reporting and action plans.
-
I-NET SOFTWARE SOLUTIONS LTD
We provide end2end cyber security services for desktop, mobile and cloud applications
-
SCG CORPORATE LIMITED
An Autonomous Security Awareness Program Built For The Enterprise
A complete, fully-managed training program that transforms security culture. Pairing the most advanced training solutions: including phishing simulation, awareness training & compliance.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
ITogether's Check Point Renewals service ensures continuous protection and performance by managing the renewal process of your Check Point security solutions. Our expert team provides timely updates, license management, and support, ensuring your cybersecurity measures remain robust, up-to-date, and aligned with evolving threats and compliance requirements.
-
INFOSYS LIMITED
Infosys help transform client’s strategies into viable technology-enabled outcomes through its various service offerings such as Consulting, Implementation, Support and Maintenance, Development & License Optimisation for below Oracle Cloud Products:
1. Financials (ERP)
2. HCM/Payroll
3. SCM
4. Sales & Marketing (CX)
5. BI & Analytics
6. PaaS
-
Prosperon Networks Ltd
SolarWinds® Log Analyzer (LA) is a powerful log management tool, designed to fully integrate with the Orion Platform. With real-time log collection, analysis, and visualisation, you can quickly and easily gain out-of-the-box visibility into the performance and availability of your IT infrastructure.
-
Factory Internet Ltd
Factory provide a Cloud Based SOC and SIEM Service. Our service has fully management and analyst support along with support for onboarding data. We provide full EDR/XDR functionality with Log Collection from Cloud, SaaS, Network and hundreds of different technologies.
-
INTEGRITY360 LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation
-
CDW LIMITED
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.
Proofpoint CORE Plus - Requires CORE P0 or CORE P1
-
NEOTAS LIMITED
Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.
-
PHOENIX SOFTWARE LIMITED
Visibility across your attack surface, focus efforts to prevent attacks/accurately communicate cyber risk to support optimal business performance.
Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.
-
4 DATA SOLUTIONS LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
INTEGRITY360 LIMITED
Threat detection software from Netwrix to detect and respond to abnormal behavior and advanced attacks with high accuracy and speed
-
SAPPHIRE TECHNOLOGIES LIMITED
Web Application and API protection. Deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. Whether your application is hosted in a data center or in a public/private cloud, decision engine covers, OWASP top ten attacks, API attacks and Bots