-
ROCKTIME LIMITED
Rocktime's verso™ licensing software provides online self-service for dog breeding licensing, data validation and process transformation. Used as a standalone system or fully integrated, verso™ can be tailored to mirror and improve your internal processes, and can power all types of public sector licensing schemes.
-
PHOENIX SOFTWARE LIMITED
A software-defined, immutable data protection and cyber recovery solution from Dell's PowerProtect DD series, also known as Dell Data Domain Virtual Edition - DDVE. Allows fast and flexible deployments for backup and disaster recovery solutions in cloud and hybrid environments.
-
Khipu Networks Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
HOWELL TECHNOLOGY GROUP LIMITED
Office 365 and Microsoft 365 Apps enables you to create, share, and collaborate from anywhere on any device with a cloud-based suite of productivity apps and services. Licensing available from Microsoft 365 Apps for enterprise, O/M365 E1, O/M365 E3 and O/M365 E5.
-
Business Systems (UK) Ltd
NICE ContactEngine proactive conversational AI starts and runs intelligent conversations with your customers, transforming operational efficiency and costs. Remove assumptions about the needs, wants, and actions of the customers that don't contact you. Engage customers in long-duration conversations, through multiple milestones and channels, delivering 90% success (aka containment).
-
ANALYTICS ENGINES LIMITED
Utilises data enrichments, large-language models, data matching and knowledge graph technologies, to allow organisations to improve data quality, connect siloed datasets to surface relationships, search and interrogate the data in new ways, and gain enhanced insights across data estates. Provides no-code interfaces for query/analysis or APIs integrating with other software/services.
-
Proact IT UK Limited
Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:
-
Leicestershire Health Informatics Service
LHIS Web, Mobile and Software Application Development services allows creation of bespoke apps to suit your unique requirement which can be published online. From content creation, usability, design and development, right through to launch and ongoing support. We have the experience and tools on hand to help.
-
Kick ICT
Our managed IT service delivers outstanding IT support and access to a wide range of leading technology providers, meaning we can provide a scalable, secure and modern IT environment for our customers.
Service includes options for 24/7x365 support, cyber security, cloud services, datacentre, back up and disaster recovery and hardware.
-
MAXINITY SOFTWARE LIMITED
Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.
-
BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde
Wonde’s innovative School Data Sync designed and built to integrate seamlessly with a school's Management Information System (MIS). It ensures data is securely maintained, managed, and accessible.
A single, simple-to-use portal enables schools to access and control real-time data transfer to third-party Ed-Tech applications including LAs, MATs, Government departments.
-
2T SECURITY LTD
RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.
-
CDW LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
LEFKE IT LIMITED
LefkeIT offers expert Data Loss Prevention (DLP) Strategy and Implementation services. Our skilled team designs and deploys comprehensive DLP frameworks to safeguard sensitive data across your organization. From policy development to technology implementation, we ensure proactive protection against data breaches and regulatory compliance.
-
StatMap Ltd
eVO Traffic Regulation Orders (TRO) provides the web and cloud-based 'Out-of-the-Box' application to manage all types of TROs/TMOs throughout their lifecycles.
It incorporates full document creation for legal notices, consultations, and general correspondence, an integrated EDMS for documents, integrated advanced GIS, supports data sharing with third-parties and the general public.
-
CDS
Microsoft Power BI enables you to visualise your data from multiple sources, share important insights and drive success, taking direct action based on new insights. Our solutions enable you to effects change based on reports, alerts, dashboards, and applications we configure. Our end-to-end service includes consultancy, design, implementation, and support.
-
Learning Pool Ltd
To succeed in work you need to quickly adapt to the situation and circumstances. Being right is meaningless unless you can rationalise and ask key questions. The essentials in solving problems and getting ideas moving. This Collection enables your organisation to develop your team with the skills to solve problems.
-
Khipu Networks Limited
HPE Aruba's Cloud Managed Networking Services offers a simple, secure and cost-effective way to deliver, manage and monitor wireless access points, mobility controllers, LAN switches, top of rack networking and security appliances, Cloud Authentication and SD-WAN. This service can be delivered in a number of flexible ways.
-
BYTES SOFTWARE SERVICES LIMITED
Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership. bssgc
-
VE3 GLOBAL LTD
VE3's powerful Learning-Evolutionary-AI-Framework (LEAF™) is enables artificial intelligence to move beyond human limits to deal with this complexity today’s extremely complex problems and staggering amounts of data. Taking advantage of massive datasets and distributed computing capacity, it generates complex models and discovers novel decision-making strategies automatically, thereby optimizing business outcomes
-
BESPOKE SOLUTIONS CONSULTANCY LIMITED
Designed to address your business pain points, breathing life into your processes. Explore how Microsoft's Power Platform and wider ecosystem can provide low-code/ no-code solutions.
-
DEEPFINITY LTD
"Parcel Tracker Mailroom" is a parcel management system/software for mailrooms and receptions to digitise and speed up their parcel management process.
Quickly scan packages received at the reception/mailroom using a smartphone camera, automatically notify recipients and collect their e-signatures/photos for proof-of-pickup. Works with all couriers and hand-written parcel labels.
-
Pentagull Ltd
Our ESB weighbridge software is a comprehensive package that leaves no aspect of weighbridge management untouched. It's designed to optimise efficiency, accuracy, and compliance, providing you with a robust solution for all your weighbridge management needs.
-
STORM (ID) LTD
Umbraco Cloud is a fully managed SaaS/UaaS service for the design, build and support of Umbraco CMS (including Heartcore for headless CMS). Storm ID can set up and implement Umbraco Cloud, underpinned by Microsoft Azure, to deliver a highly resilient, secure and scalable environment.
-
Prosperon Networks Ltd
SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.
-
e2e-assure Ltd
SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography
-
NTT DATA Business Solutions (UK) Limited
HxGN EAM is an industry-leading asset management solution designed to extend asset lifecycles and improve productivity. Empowering organizations to evolve from EAM to Asset Performance Management. Its wide range of risk, condition, and reliability-based maintenance instruments can deliver accurate, trusted data and strategic insights, driving better decision-making while ensuring compliance.
-
CSI Limited
IBM Envizi ESG Suite supports the collection, consolidation, and management of client ESG data. Its reporting tools can be used to meet internal and external requirements for ESG reporting and disclosure. The Cloud service provides functionality to identify efficiency and decarbonisation opportunities, to scenario plan and to assess sustainability risk.
-
VE3 GLOBAL LTD
Phone System in Office 365 gives you PBX capabilities, but without the complicated and expensive equipment. Phone System allows you to replace your existing on-premises PBX system with a set of features delivered from Office 365 that is tightly integrated into your cloud experience.
-
LEXISNEXIS RISK SOLUTIONS UK LIMITED
LexisNexis® Risk Management Solutions (RMS) facilitates enhanced due diligence controls to combat financial crime and mitigate risk. Whether it's conducting increased due diligence on a new high-risk customer, correcting a sanctions alert generated by ongoing filtering processes, or compiling suspicious activity reports, you can use RMS throughout the customer lifecycle.