-
HANDD BUSINESS SOLUTIONS LIMITED
GoAnywhere MFTaaS (Managed File Transfer as a Service) is a cloud-based solution for secure file transfers. It offers encryption, automation, and centralised management, enabling businesses to securely exchange data across systems, partners, and platforms. It simplifies file transfer processes while ensuring compliance with data security regulations.
-
AVELLA SECURITY LIMITED
BLOCKPHISH delivers cloud-based Cyber Security Training and Awareness to help reduce the risk of a cyber attack on your business. As phishing and socially engineered attacks rely on exploiting human vulnerabilities, improving user behaviour is essential. Our cloud platform delivers learning in multiple formats to ensure the most effective results.
-
INTEGRITY360 LIMITED
Claroty xDome spans the entire cybersecurity journey, empowering organisations with comprehensive OT (operational techncology)/ICS (Industrial Control Systems) asset visibility, identifying, measuring, prioritising risk, deploying Zero Trust-based protective controls, to optimising threat-detection through a vast network of integrations. xDome is a modular, SaaS platform that makes XIoT cybersecurity decision clear through:
-
EXPERIAN LIMITED
Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime
-
Atlas Cloud
Microsoft 365 is widely used, but its standard email security may not be enough. Mimecast offers layered protection that complements Microsoft’s defences. It stops threats without hindering collaboration, keeps archives compliant, and empowers end-users. Think of it as adding an extra lock to your digital door.
-
CYMBALSTREAM SOLUTIONS LIMITED
Cymbalstream delivers 24/7 monitoring and response software designed to detect, investigate, and mitigate cyber threats across networks, endpoints, and cloud environments. Combining advanced security technology, threat intelligence, and expert-driven workflows, our platform enables organisations to proactively hunt for threats and respond to incidents across their IT infrastructure.
-
BYTES SOFTWARE SERVICES LIMITED
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud. bssgc
-
GRADIAN SYSTEMS LTD
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
RPOST UK LIMITED
RSign® is the award-winning eSign and eForms feature-rich and affordable solution by RPost®. Recognized by IDC MarketScape and Aragon Research, RSign ensures compliance, security, and convenience. It integrates seamlessly with platforms like Outlook and Salesforce. Streamline workflows, reduce eSignature costs, and improve customer service. Choose RSign - just switch it!
-
Ostratto
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
Transparity
Our Azure CSP Subscriptions provide monthly billing and services for Microsoft's Azure public cloud platform in a flexible and cost-effective manner. We also offer proactively managed services which are offered as a chargeable add-on services, which are materially lower in cost than traditional asset and user based managed service offerings.
-
SOFTCAT PLC
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
MELISSA DATA LTD.
Mobile Service that runs advanced scans against UK & Global ID documents: Passport; Driver Licence; National ID etc, to ensure a person's identity is thoroughly authenticated and verified. Verification checks combine Facial Matching, Liveness Test, Pattern Match, Data Crosscheck, and MRZ uplift, for efficient onboarding and protection from fraudulent identities.
-
Elemendar - AI for Cyber Threat Intelligence (CTI)
Elemendar supplies READ, an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. READ makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.
-
ADMINCONTROL AS
Admincontrol is a leading Board Portal and Virtual Data Room provider. Working to the highest level of security and with a tablet based intuitive user interface, our services are utilised by private and public sector organisations to enhance the the flow of sensitive information across Boards and Management worldwide.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
CDW LIMITED
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
BRIDGEALL LIMITED
We provide a comprehensive 24/7 security service for Microsoft 365 and Azure. Our service includes advanced threat detection across your email, documents, and collaboration tools, with real-time protection against phishing, malware, and ransomware. Our team manages your security posture, ensuring best practices are followed and vulnerabilities are quickly addressed.
-
COALESCENT LIMITED
Dapian provides an Information Asset Register (IAR) and Record of Processing Activity (RoPA), which is auto-updated from Data Protection Impact Assessment (DPIA) data, as well as manual entries, to ensure it remains accurate. Dapian is based on ICO templates and other best practice from public sector organisations and national bodies.
-
BOXXE LIMITED
VMware Workspace ONE UEM is the secure enterprise platform that delivers
and manages any app on any device. By integrating app management, unified
endpoint management, and real-time application delivery, Workspace ONE
UEM engages digital employees, reduces the threat of data loss, and
modernizes traditional IT operations for the mobile-cloud era.
-
WR LOGIC LIMITED
GovAI Transform is a tailored service empowering UK government entities by integrating artificial intelligence into their workflows. Leveraging Microsoft Azure's AI tools like Cognitive Services, Logic Apps, and Functions, it automates complex tasks, boosting service delivery, regulatory compliance, data security, and operational efficiency.
-
SAPPHIRE TECHNOLOGIES LIMITED
Penetration testing is often performed annually or after a major change, yet minor changes and vulnerabilities are discovered all the time while criminals constantly scan you. This service offers constant exterior scanning of your estate to look for weaknesses and goes beyond vulnerability scan.
-
BYTES SOFTWARE SERVICES LIMITED
M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform.
Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization.
bssgc
-
BARRIER NETWORKS LIMITED
The Medigate Platform is the industry’s leading healthcare cyber-physical systems protection platform that enables healthcare organisations to safely deliver connected care while enhancing efficiencies across the clinical environment. The Medigate Platform spans the entire healthcare cybersecurity journey regardless of the scale or maturity of your environment.
-
MASS CONSULTANTS LIMITED
MASS provides expert support and training in tools like SharePoint, Purview, and PowerApps. We automate workflows, develop bespoke PowerApps, build data visualisations, and create RRD processes. Training is delivered remotely or onsite. Operating at Official, Official-Sensitive and SECRET, we work via outcome-based SoWs or flexible rate card models.
-
BARRIER NETWORKS LIMITED
Leveraging Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide Area Networking (SD-WAN) and Software Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
MOZAIC-SERVICES LTD
A Digital Service Management (DSM) enabler, this service is for the purchase of ServiceNow Subscriptions. This service typically works in concert with our ServiceNow Tooling Implementation Service and provides a managed procurement of any ServiceNow modules including: ITSM, ITOM, SPM, SAM, GRC, DevOps, SecOps, HR, App Engine and CSM.
-
CANTARUS LIMITED
CyberSmart - A platform to continuously monitor your Cyber Essentials compliance and help protect your business from cyber attacks.
-
PHOENIX SOFTWARE LIMITED
iboss is a Zero Trust Edge. iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. Allowing for PDNS intergration, admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection, Data Loss Prevention
-
INTEGRITY360 LIMITED
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.