-
MADE PURPLE LTD
ArkDNS provides AI powered DNS Filtering and Security for your network. Get protection from malware, ransomware and phishing at the DNS level protecting all of your devices. Filter domains based on categories or whitelists making sure all sites are safe for work and forcing SafeSearch on all search engines.
-
INTEGRITY360 LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.
-
LEFKE IT LIMITED
LefkeIT excels in Business Process Modeling and Workflow Design. Our expert team collaborates closely with stakeholders to analyze existing processes and design optimized workflows. Through meticulous modeling, we streamline operations, improve efficiency, and align processes with organizational goals. Trust us to enhance your business processes and drive productivity effectively.
-
BOOMERANG I-COMMS LTD
Boomerang’s Dynamics 365 plug-in and custom Connector provides seamless integration to Microsoft apps and Power Platform, overcoming broadcast limitations by matching activities with responses. This fosters conversational engagements, recorded in contacts’ timelines for seamless automation and stakeholder interactions. ISO-27001, CyberEssentials,Cyber Essentials Plus certifications ensure data security.
-
INTEGRITY360 LIMITED
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
INTEGRITY360 LIMITED
CloudGuard Code Security provides automated tools to detect code vulnerabilities, identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, and remediate security misconfigurations. CloudGuard Code Security ensures security without compromising productivity.
-
PANLOGIC LIMITED
Digital giving service Multi-channel donations: mobile/tablet/web, SMS/text, debit/credit, PayPal Gift Aid reclaim White-label cause curation/donation mechanism Self-serve organisational sign-up mechanism Management portal: pipeline status of organisations/causes/donations Reporting portal: stakeholders to see their donations/donor data DONATEevents product for competitive event-based giving/payments Generalist/sector-specific ‘Reason to give’ location-specific signage
-
BOXXE LIMITED
OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.
-
CDW LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Lease Enquiry Solution offers a streamlined approach to handling lease-related enquiries in the housing sector. Our efficient case management system ensures prompt and accurate responses to lease queries, facilitating smoother communication between tenants and landlords. With automated tracking and documentation, lease enquiries are resolved promptly.
-
E2E-ASSURE LIMITED
Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle
-
Hicom Technology Ltd
Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes, ensuring compliance with established regulations. Currently used by over 200,000 users in 5,000+ sites worldwide, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.
-
POLICY MONITOR LIMITED
Policy Monitor provides a cybersecurity management platform, Cyber Security Policy Monitor (CSPM). CSPM gives you a centralised platform to support your organisation through complex industry-certified accreditations, to create and implement internal security policies, train your staff, scan for vulnerabilities and establish best practices to provide the best defence against criminals.
-
R2P UK SYSTEMS LIMITED
This service allows bus operators and local authorities to report on arrival/departures and lateness of vehicles. It provides detailed arrivals/departure times at bus stops along journeys. At the high level, it provides a complex timetable schedule heading report to see how vehicles are performing against timetables.
-
TMC3 LIMITED
OneTrust Third-Party Management streamlines third party assurance for public sector entities, offering comprehensive risk monitoring, due diligence automation, and robust compliance tools. Our solution effectively manages third-party risks across security, privacy, and ESG domains, enhancing trust and compliance.
-
CDW LIMITED
Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.
Proofpoint CORE Plus - Requires CORE P0 or CORE P1
-
MICRO FOCUS SOFTWARE UK LTD
NetIQ Identity Intelligence service provides a cloud-based enterprise service that is intended:
To assess risk based on insights from identity information
Apply methods to remove excessive, anomalous, or erroneous entitlements
Improve the ongoing identity governance process, including risk reporting
-
ACTIONABLE LTD
REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors.
The platform incorporates the REACH data acquisition engine for precision cyber data analytics.
-
AMAZON WEB SERVICES EMEA SARL, UK BRANCH
Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.
-
COMPUTACENTER (UK) LIMITED
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
Premier IT Partnership Ltd.
Our rostering solution caters for all staff groups including Medics, Nurses and AHPs. The system was developed using NHSI guidelines and is fully compliant with the NHS Standards and Levels of Attainment. The platform is configurable, modular and interoperable to manage the complexity and challenges of the modern NHS.
-
KHIPU NETWORKS LIMITED
This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.
-
ELCOM SYSTEMS LIMITED
EVOLVE Spend Management, seamlessly integrated Source to Pay process including MultiQuote, eSourcing, Tracker, Tail Spend, eAuction, Contract Management, Catalogues, Inventory Management (inc. Scan4Safety), Community Stores, PPE Central Store, Purchase to Pay (P2P), Analytics, Electronic Trading (PEPPOL access point), Supplier Financing and eMarketplaces.
Integration with legacy, supply chain and external systems.
-
CYBERLAB CONSULTING LTD
SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.
-
TRUSTMARQUE SOLUTIONS LIMITED
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Avepoint UK Ltd
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide.
-
SOFTCAT PLC
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
OpenSky Data Systems
OpenSky's Data Analytics as a Service unlocks the full potential of your data. We integrate advanced analytics, AI, and data management to transform complex data into clear, actionable insights. Our experts help you drive smarter decisions, uncover opportunities, and innovate with trusted data woven into compelling stories.
-
CDW LIMITED
Proofpoint Security Awareness Training helps you deliver the right
training to the right people at the right time. It turns your end users into
a strong last line of defense in identifying cyber attacks and protecting
your organization.
-
BOOMERANG I-COMMS LTD
Intelligent, automated, threaded messaging designed for the Police. Multi-channel broadcasts, conversational SMS, Email and voice messaging, and appointment management all from an easy-to-use user interface, email inbox or integrated through API. A communication solution for the Police to streamline and manage workflows. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited