-
Computacenter (UK) Ltd
Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
Computacenter (UK) Ltd
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
WR LOGIC LIMITED
Integration of Microsoft Power Platform applications with public-sector systems and third-party services through custom APIs. Ensuring smooth data flow and integrity, enhancing low-code/no-code apps on PowerApps, Power Automate, and Power BI. Leveraging advanced API techniques and Microsoft's secure cloud, optimising connectivity and functionality for improved service delivery and operational efficiency.
-
Digital Interactive Ltd
Infreemation is an advanced online cloud based application for processing and storing your organisations Information Asset Register
-
OGEL IT LTD
Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.
-
MetaCompliance Ltd
MetaPrivacy is a cloud-based privacy lifecycle management system that delivers an automated approach to data privacy compliance. The platform has been designed to increase stakeholder engagement by providing graphically rich, interactive assessments incorporating video instruction, as part of the personal data information gathering phase.
-
CDW LIMITED
Alation’s enterprise data catalog dramatically improves the productivity of analysts, increases the accuracy of analytics, and drives confident data-driven decision making while empowering everyone in your organization to find, understand, and govern data.
-
SOFTCAT PLC
Netwrix Change Tracker enables organizations of all sizes to enhance their security posture by hardening configurations, monitoring changes, and delivering superior forensic capabilities that minimize the time and effort needed to identify the cause and scope of a security breach.
-
SOMERFORD ASSOCIATES LIMITED
Lacework offers automated anomaly detection providing consistent visibility, context, and security across cloud environments, providing customers with the ability to detect attack activity stemming from known and unknown threats. Lacework uses data and automation facilitating the security of multi-cloud environments, helping customers prioritise risk, so they can innovate with confidence.
-
ARX PARTNERS LIMITED
Citadel, is a highly secure, customisable enterprise-wide Audit, Survey, Accreditation and Compliance tool that assesses and evidences any area of risk in a consistent and scalable manner. An integrated risk register enables risks to be monitored, tolerated or mitigated. Live threat or risk-related data can be integrated through APIs.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike EDR licences to utilise the power of the Crowdstrike Falcon Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Crowdstrike EDR for signs of malicious activity on your network.
-
PHOENIX SOFTWARE LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
AMX Solutions Ltd
AMX for Protected Sites is designed to manage Sites of Special Scientific Interest (SSSIs), National Nature Reserves (NNRs), Special Areas of Conservation (SACs), RAMSAR sites etc. Management of these sites includes all aspects of feature definition, subdivision of sites (Unitisation) and the assignment of actions for their maintenance.
-
SOMERFORD ASSOCIATES LIMITED
SecurityScorecard’s Managed Cyber Risk Services bridge the gap between
vendor risk and cybersecurity by helping organizations augment their existing
third-party risk cyber programs with a team of cybersecurity professionals with
experience in incident response to uncover vulnerabilities and improve cyber
hygiene across their vendor landscape
-
BYTES SOFTWARE SERVICES LIMITED
PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings. bssgc
-
TMC3 LIMITED
Veracode is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Dynamic Analysis engine crawls and audits hundreds of target applications simultaneously, improving performance and time to results. SaaS platform helps automate security feedback and aligns with development technologies, providing secure software, faster.
-
Kainos Worksmart Limited
Pinpoint, manage and reduce the risk of fraud, breach, or human error. Exclusively designed for Workday, Smart Audit enables customers to define, modify and execute automated audit checks against Workday tenants, strengthening security controls and enabling risk mitigation across their Workday ecosystem – lowering risk, costs and protecting your reputation.
-
SPECIALIST COMPUTER CENTRES PLC
Quest-On-Demand is a secure, Azure-hosted SaaS management platform to help MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.
-
INTEGRITY360 LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines. bssgc
-
FLYTE CLOUD SERVICES LTD
The Flyte Asset Management App allows your organisation to keep a digital record of all physical devices, and the activity relating to each asset. This makes it easier to allocate resources, plan for projects, and ensures employees are held accountable for the condition of the devices that they use.
-
Collab-Advisor Limited
Collab-Advisor, a UK software firm, promotes collaboration, compliance, and data sharing for workspace documentation and standards. Our tools enable organisations to integrate workflows, such as BIM and Project Management, visualise data in 3D, and efficiently manage ongoing data maintenance, enhancing workspace efficiency and asset sustainability
-
INTEGRITY360 LIMITED
Auth0 Identity Platform is a cloud-based identity management service that helps organizations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.
-
Computacenter (UK) Ltd
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
Barrier Networks
CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.
-
SOFTCAT PLC
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
MADE PURPLE LTD
Purple Scribe is an ISO27001 certified transcription and summarisation solution that processes any audio or video file—including interviews, meetings, and recordings—with over 98% accuracy. It separates speakers, highlights uncertainties, integrates with existing systems , and outputs onto custom templates, saving thousands of man-hours for police, local-authorities, prisons and healthcare organisations.
-
SCG CORPORATE LIMITED
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
-
ABM Intelligence Limited
ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.
-
Computacenter (UK) Ltd
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.