-
Pentagull Ltd
Our self-service portal system is a cloud software service for the delivery of online digital transactions through the use of modern, responsive and highly configurable online forms. It also includes a number of pre built forms to deliver unrivalled value for money.
-
Computacenter (UK) Ltd
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
Ceox
Ceox’s Mobile App Development using Power Apps enables Public Sector Organisations to build native Mobile Apps for iOS and Android using the Power Platform. Power Apps provides an easy, quick way to build Mobile Apps, for internal use and engaging with citizens. Build Native Apps, Responsive Apps or PWAs.
-
Softcat Limited
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
RENKAP LTD
Our Site Survey Platform allows clients to easily tender, procure, instruct and manage multiple surveys for property development or refurbishment.
Previously our clients had to manage all the multiple surveys but through RenKap they can now instantly get 3 quotes from vetted surveyors and manage it all on one platform.
-
BOXXE LIMITED
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
INTEGRITY360 LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
MeVitae
Helping organisations hire smarter, faster and fairer, by mitigating unconscious and algorithmic bias. Improving diversity and inclusion typically involves three stages: identifying areas for improvement, selecting appropriate interventions, and assessing their impact. MeVitae’s analytics assists you throughout each of these stages, whilst seamlessly integrating with 20+ ATS' and HR tools.
-
COMMUNICATE TECHNOLOGY LIMITED
We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.
-
Softcat Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
NEO TECHNOLOGY LIMITED
Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.
-
CHESS ICT LIMITED
Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
Computacenter (UK) Ltd
Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.
-
Grove Information Systems
MIRACL Trust Proof is a service using the Designated Verifier Signature (DVS) digital signature scheme that allows the signing of any digital transaction, user action, data transfer or Machine-Machine interaction to make it irrefutable. Authenticity of action can be proven due to the immutable and cryptographic nature of the signatures.
-
Cloudflare, Inc.
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform.
Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams.
Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
COMMUNICATE TECHNOLOGY LIMITED
Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service
-
TotalMobile
Totalmobile is the market leader in construction logistics harnessing its enterprise digital platform supporting major construction/infrastructure programmes to achieve excellence in operational efficiencies and compliance monitoring. Key aspects of our platform include; logistics tracking, lone working, asset/inventory management, delivery management, appointment booking, integrated routing/visual maps, navigation/location APIs and real-time analytics.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Refund Management Solutions streamline the process of issuing refunds in the housing sector. Our system automates refund requests, tracks refund statuses, and facilitates timely reimbursements to tenants. With built-in reporting and communication tools, landlords can efficiently manage refunds while maintaining transparency and compliance.
-
Softcat Limited
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Voids Management Solution optimises the process of managing vacant properties in the housing sector. Leveraging advanced case management and task assignment features, it streamlines workflows, reduces turnaround times, and enhances operational efficiency, ensuring swift property occupancy and tenant satisfaction.
-
Equine Register Ltd
Enables organisations exchange data and record the arrival and departure of an equine, livestock, companion animals (including dogs and cats) also check the biosecurity status of an animal in advance of its arrival. Supports recording of double ended movements and communications between organisations and users to manage biosecurity and risk.
-
BlackBerry UK Limited
CylanceMDR™ provides 24x7x365 detection and protection. Our team is comprised of world-champion experts, and our platform is powered by pioneering Cylance® AI technology for threat protection augmented with proprietary and threat intelligence. CylanceMDR includes hands-on
onboarding, alert-triage, investigation, managed threat hunting, digital forensics, incident response (IR), and critical event management.
-
Lefke IT Limited
LefkeIT delivers comprehensive Threat Intelligence Services. Our expert team monitors global threats, analyzes trends, and provides actionable insights tailored to your organization's risk profile. With proactive threat detection and response measures, we help fortify your defenses against evolving cyber threats, ensuring resilience and protection of your assets.
-
Sapphire
An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).
-
INSIGHTS T/A ISX4 LTD
ISx4 specialises in the implementation of analytics and AI solutions on cloud infrastructure. Options include Azure, AWS, SAS, Watsonx, Posit, Anaconda and bespoke solutions. ISx4 can host and own the cloud environment or deploy to the client cloud environment . In-life management and support is part of the service offering.
-
Claritas Solutions Ltd
Empower users to have complete control of managing multi-agency working. Secure, scalable, with UK GDPR and DPA Pt3 customer special terms.
Hosted in UK it offers quick and flexible deployment with no upfront costs. Full multi-agency working technology platform providingg full UK data sovereignty for efficient, sustainable, and legal operations.
-
Happiest Minds Technologies
We partner with cloud service providers such as AZURE, AWS, and GCP, consult clients to fulfil their needs, and offer the required software subscription services.
In addition to advising clients on the best subscription, we also provide additional value-added services that OEM providers may or may not offer.
-
Charterhouse Voice & Data
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Hoarding Management solution addresses the complex challenges associated with hoarding behaviours in housing. By providing robust tools for assessment, intervention planning, and ongoing support, it enables housing professionals to effectively manage hoarding cases with empathy and efficiency, promoting tenant well-being and property safety.
-
DEFENCE DATASEC LTD
Defence DataSec delivers top-tier Data Security and Privacy Services, safeguarding your sensitive information from threats and ensuring compliance with regulations.Through advanced encryption, access controls, and monitoring, we protect your data assets from unauthorized access and breaches. Partner with us to mitigate risks, build customer trust, and uphold data privacy standards.