- 
        
        
            Viewdeck Consulting Limited
         
            Case Management for the Cloud offers a comprehensive solution for organizations to track, manage, and resolve cases. With features like customisable workflows, document management, and reporting tools, businesses can streamline operations, improve collaboration, and ensure compliance. Experience enhanced efficiency, improved collaboration, and better decision-making with our cloud-based case management service. 
         
- 
        
        
            DEFENCE DATASEC LTD
         
            Defence DataSec specializes in Security Automation and Compliance services,leveraging advanced technologies to automate security processes and ensure regulatory compliance.Our expert team implements robust security measures,ncluding automated vulnerability scanning,configuration management,and compliance checks,to safeguard your infrastructure and data.Partner with us to enhance your security posture,reduce risks,and achieve continuous compliance in dynamic environments. 
         
- 
        
        
            Barrier Networks
         
            Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors. 
         
- 
        
        
            ITHQ LTD
         
            The SentinelOne Endpoint Protection Platform unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all vectors, elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics. 
         
- 
        
        
            COMPUTACENTER (UK) LIMITED
         
            Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform. 
         
- 
        
        
            CDW LIMITED
         
            Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization 
         
- 
        
        
            ULTIMA BUSINESS SOLUTIONS LTD.
         
            AntiPhish Phishing Prevention combines educational phishing campaigns with a realistic experience. Analyse your organisation's click rate and compromise statistics. Effectively monitor the reduction in employee phishing susceptibility with regular simulated phishing campaigns. Following up with ongoing staff awareness, to keep employees on the lookout and continually improve your security defences. 
         
- 
        
        
            CHESS ICT LIMITED
         
            Your cloud SIEM for modern threat detection and response. InsightIDR provides immediate and accurate threat detection and drastically reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry. 
         
- 
        
        
            ITogether
         
            Thinkst Canary deploys virtual traps, mirroring real assets, to detect and deflect threats preemptively. Its deception technology offers early intrusion detection, ensuring robust network security. Easy deployment and low maintenance provide seamless integration, offering unparalleled visibility into your network's threat landscape. 
         
- 
        
        
            TMC3 LIMITED
         
            OneTrust Enterprise Policy Management modernises policy management for public sector entities, enabling centralised control, streamlined workflows, and robust compliance tracking. Facilitate effective policy lifecycle management, attestation processes, and compliance visibility, ensuring operational consistency and regulatory adherence. 
         
- 
        
        
            TRUSTMARQUE SOLUTIONS LIMITED
         
            Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. 
         
- 
        
        
            SOMERFORD ASSOCIATES LIMITED
         
            Island is an Enterprise Browser that provides policy control over every facet of a user’s interaction with a web application giving you limitless visibility, control and compliance with your most critical applications.  Island can serve as the platform for the future of productive and secured work. 
         
- 
        
        
            CLOUD 21 LIMITED
         
            Cloud21 provides BDS Directory Manager that enables JML (joiner, mover and leaver) processes to be automated. The software integrates directly with ESR, Active Directory, NHSmail and Office 365 to allow organisations to establish electronic workflows that streamline staff induction and perform ongoing account management throughout the user lifecycle. 
         
- 
        
        
            Barrier Networks
         
            The Menlo Cloud Secure Browser Platform eliminates the possibility of malware reaching user devices via compromised or malicious websites or documents, or via phishing and credential harvesting attacks with a 100% effectiveness warranty. 
         
- 
        
        
            CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED
         
            Cloud Office Productivity includes Office ProPlus Word, Excel, PowerPoint, OneNote, co-authoring, Outlook Exchange Email, Teams, Instant Messaging, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, Data Loss Protection, Rights Management.  Mobile (iOS, Android, Windows phone), desktop (Windows, Mac). See https://products.office.com/en-gb/secure-productive-enterprise 
         
- 
        
        
            CHESS ICT LIMITED
         
            Sophos Cloud Optix, the Sophos Cloud Security Posture 
Management solution, proactively reduces business risk from 
unsanctioned activity, vulnerabilities, and misconfigurations 
across Amazon Web Services (AWS), Microsoft Azure, and Google 
Cloud Platform public cloud environments. 
         
- 
        
        
            LEFKE IT LIMITED
         
            LefkeIT specializes in Identity and Access Management (IAM) Solutions Deployment. Our expert team implements robust IAM frameworks tailored to your organization's needs, ensuring secure and efficient access control. With meticulous planning and deployment, we safeguard your digital assets and ensure compliance with regulatory standards. 
         
- 
        
        
            Armour Comms
         
            UK company providing NCSC CPA certified secure mobile communications enabling interoperability by extending the reach of mobile secure communications to the desk phones in your enterprise.
Cost-effective, secure voice, video, conferencing, instant messaging, group chat, cross-domain, unified comms, fully auditable. Cloud-based or on-premises deployments UK OFFICIAL SENSITIVE, Advanced Mobile, SECRET. 
         
- 
        
        
            SAPPHIRE TECHNOLOGIES LIMITED
         
            Brand impersonation is on the rise. Many British citizens are unaware that .gov.uk is the domain for public sector organisations. This service monitors and provides critical information about brand-related cyber threats, including organisation and brand impersonations, logo and domain abuse, leaked data and credentials. A takedown service is also available. 
         
- 
        
        
            Barrier Networks
         
            We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behavior analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users. 
         
- 
        
        
            INTEGRITY360 LIMITED
         
            Galaxkey Enterprise Cloud is a CPA Certified solution providing pure end-to-end Email encryption, file encryption, Secure Workspace collaboration and Digital Document Signing. Features include: email revocation, classification, notifications, geofencing, digital signatures, secure collaboration and file sharing capabilities. All centrally managed with complete white labelling capabilities. CPA Certified by the NCSC. 
         
- 
        
        
            BOXXE LIMITED
         
            Sophos Cloud Optix, the Sophos Cloud Security Posture 
Management solution, proactively reduces business risk from 
unsanctioned activity, vulnerabilities, and misconfigurations 
across Amazon Web Services (AWS), Microsoft Azure, and Google 
Cloud Platform public cloud environments. 
         
- 
        
        
            SOFTCAT PLC
         
            Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches. 
         
- 
        
        
            Reliance High-Tech Ltd
         
            Kite is a cloud based video surveillance system designed to integrate with multicamera types and connection methods to provide one seamless interface along with a suit of analytics features . 
         
- 
        
        
            SOFTCAT PLC
         
            Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees. 
         
- 
        
        
            CDW LIMITED
         
            Ensuring data quality, usability, and integrity are key factors in building trust in your organization. Strengthen your data stewardship by driving business value and complying with the latest privacy regulations and security frameworks, all within one unified platform. 
         
- 
        
        
            Nortal UK 
         
            A unique service combining the best of breed open source and commercial COTS technologies to enable cyber threat intelligence and malware analysis capabilities. 3DOT Solutions have proven pedigree in integrating technologies into a workable pipeline to ensure analysts are operational and organisations can operationalise CTI and malware analysis functions. 
         
- 
        
        
            Phishing Tackle Limited
         
            UK's leading Security Awareness & Training provider. British multilingual automated training and testing platform, policy management, PhishNet S.O.A.R. tool, and Microsoft Teams Integration. Granular reporting including high risk users, breach data, and training completion statistics. Encompassing a fully managed service saving you time, budget and quickly reducing user risk. 
         
- 
        
        
            Network Utilities (Systems) Ltd
         
            Combining the techniques known by both traditional and next-gen antivirus engines, Heimdal™ Next-Gen Endpoint Antivirus is the endpoint detection and response tool that will become the the backbone of your enterprise.
Cyber threats are no longer the activity of rogue hackers. 
         
- 
        
        
            BYTES SOFTWARE SERVICES LIMITED
         
            The cloud based VMs provide visibility, assessment, remediation and network control of any IP/MAC address connected cyber assests.. bssgc