-
Bytes Software Services
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines. bssgc
-
Cloud Cover IT Limited
The Flyte Asset Management App allows your organisation to keep a digital record of all physical devices, and the activity relating to each asset. This makes it easier to allocate resources, plan for projects, and ensures employees are held accountable for the condition of the devices that they use.
-
INTEGRITY360 LIMITED
Auth0 Identity Platform is a cloud-based identity management service that helps organizations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.
-
Computacenter (UK) Ltd
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
Barrier Networks
CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.
-
Softcat Limited
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Made Purple Ltd
Purple Scribe is an ISO27001 certified transcription and summarisation solution that processes any audio or video file—including interviews, meetings, and recordings—with over 98% accuracy. It separates speakers, highlights uncertainties, integrates with existing systems , and outputs onto custom templates, saving thousands of man-hours for police, local-authorities, prisons and healthcare organisations.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
-
ABM Intelligence Limited
ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.
-
Computacenter (UK) Ltd
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
Trustmarque Solutions Limited
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
BOXXE LIMITED
ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.
-
Barrier Networks
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
Empowering Communities
The Client/Victim Engagement Module is a unique communications platform that allows clients/victims to share information with you and you share in return. Designed around evidence based best practice. Use with clients, victims, vulnerable persons and students. Enhances wellbeing, electronic safety plans, social prescribing projects. Includes attendance tracker and mood diary
-
BASEEL PARTNERS LLP
Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.
-
MICRO FOCUS
Fortify on Demand (FoD) is a remotely-delivered, cloud-based application security as a service solution. Application security testing is performed and reviewed by application security experts using application testing technologies and manual techniques. All customers are provided access to our technical account support team.
-
Softcat Limited
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
Arcus Global Limited
Arcus Corporate Governance aids teams managing complaints, freedom of information requests, personal data rights requests, MP and Member enquiries, and other corporate requests. It enables these requests to be logged, allocated, tracked, and aids in collation of answers and approvals. Online forms and publishing FOI responses is included.
-
Resulting Ltd
Pathlock Cloud AAG provides cross application
Identity and Access Security Governance, Risk
and Compliance (GRC) allowing you to monitor
and cleanse system access and authorisations,
detect and manage Segregation of Duties (SoD)
violations, detect fraud, and automate joiner,
mover, leaver processes and privileged
(emergency) Access.
-
Leidos Innovations UK Limited
The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.
-
promatica digital
Social Rx is an end-to-end digital social prescribing solution for social prescribing teams to manage cases and get population-level insights with a range of dashboard and reports. The product is interoperable with the main GP IT systems.
-
INTEGRITY360 LIMITED
Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.
-
macseu
MACS IBM Control Desk for cloud based management of IT assets (ITAM) and IT services (ITSM) according to ITIL standards and processes. Simplifying IT support needs for users and infrastructures, they reduce costs and increase user satisfaction through self-service, automated service management and integrated, best-practice based on an ITIL approach.
-
BlackBerry UK Limited
BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.
-
Computacenter (UK) Ltd
Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.
-
Panlogic Limited - Digital Engineering
Content strategy Current (as-is) content mapping (both online/offline) Defining new (to-be) processes Content matrix: map content & users Content generation: web-friendly content Content engine: resources, process & matrix Formats/structure/limits Create/Revise/Re-use Content relationships Meta-data Content migration/upload Migration tool Proofing/checking Content partner provision
-
MetaCompliance Ltd
MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.
-
Computacenter (UK) Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
Bytes Software Services
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
bssgc
-
Billigence
ThoughtSpot is a business intelligence platform that provides a search based business analytics for non-technical users with wide data connectivity, preparation, interactive analytics, natural language search, visualization, collaboration, security, and scalable performance, with deployment options ranging from on-premises to cloud.
ThoughtSpot can provide you with