-
ARISSIAN LTD
Quickly add FIDO2 Passwordless Biometric Authentication to your Applications using the Luciditi low-code SDK.
In place of a password, a users’ unique biometrics such as fingerprints are used to generate a unique private key which is stored on a users device and is unique and used to access the application.
-
Computacenter (UK) Ltd
CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.
-
Khipu Networks Limited
Visibility, control, compliance and remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.
-
INTEGRITY360 LIMITED
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
SOFTCAT PLC
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
PHONEHUB IO LTD
Secure intelligent system to identify, authenticate, and manage prisoner contacts. Designed to reduce resource requirements, improve security and public protection, and improve family contact. Integrates with HMPPS systems.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Keepnet Labs focuses on cyber security, particularly human factors, using advanced technology and behavioural insights to enhance digital security across organisations. It provides comprehensive solutions for managing human-related security risks with tools like phishing simulators and incident response platforms, aiming to foster a proactive and resilient security culture.
-
PEGASUS LABS PTY LTD
Pegasus Labs AD Protection stops users adding common or compromised passwords to their accounts, resets existing breached passwords and detects AD misconfigurations. It continually monitors and automatically responds to new breaches keeping Active Directory and Azure AD secure.
-
CHESS ICT LIMITED
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
THE SERVER LABS LTD
Darktrace AI interrupts in-progress cyber-attacks in seconds, including ransomware, email phishing, and threats to cloud environments and critical infrastructure. Join over 6,800 organizations worldwide that rely on a digital immune system to avoid cyber disruptions, without impacting regular business operations
-
BROADSTONES SOLUTIONS LTD
Our unique discovery platform works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, our insight engine adapts to your needs. Financial Times-recognised top UK management consultant.
-
CDW LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
Netsweeper Inc.
Part of the Netsweeper Education Ecosystem, works with the Netsweeper central platform to extend web filtering and digital monitoring to student devices, ensuring they remain protected when they leave the school’s network. It can be installed on Windows, OSX, Chrome, iOS and Android devices.
-
JBi Digital
JBi Digital will guide you to build the optimal tech stack for your organisation with robust, scalable and secure solutions that are customised by certified professionals.
Whether you’re updating entire systems or making targeted improvements, our approach is driven by your requirements and informed by in-depth user and system analysis.
-
CYBERIAM HOLDINGS LIMITED
BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts.
-
SOFTCAT PLC
Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)
-
SOFTCAT PLC
Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA.
-
VE3 GLOBAL LTD
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
SOFTCAT PLC
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
INTEGRITY360 LIMITED
As the industry’s first network detection and response solution for the cloud, Vectra Detect for Office 365 and Azure AD extends the proven platform that currently protects public clouds, private data centres, and enterprise environments to Microsoft Office 365.
-
TMC3 LIMITED
Data Mapping and Records of Processing Activities by OneTrust. The platform enables organisations to identify personal data flows and maintain adequate records of processing activities to meet UK GDPR requirements. Seamlessly connect and discover all data systems utilising flexible intake methods including pre-built connectors, expert-crafted questionnaires, and bulk import tools.
-
Gradian Systems Ltd
Symantec Protection Engine (SPE) for Cloud Services 8.2 is a flexible and feature-rich client/server application that allows customers to incorporate malware and threat detection technologies into almost any application. SPE for Cloud Services provides access to innovative security that helps to ensure the safety of incoming content to your environment.
-
VIABLE DATA LTD
Experts in authentication and access controls, Viable Data offer effective Multi-Factor Authentication (MFA) to enhance your security by using a second source of validation to verify user identity before granting access. This includes Single Sign-On (SSO) and flexible authentication methods (authenticator apps, e.g., Google Authenticator, and methods, e.g., facial biometrics).
-
Barrier Networks
Autonomous cybersecurity platform that consolidates security functions across surfaces–endpoint, cloud, and identity–and makes intelligent use of the data natively ingested and through our partner integrations. SentinelOne strives to extend our native detection and response capabilities with XDR integrations to improve workflows and provide more human context to enterprise security teams.
-
Planet IT
Sophos Intercept X Advanced with EDR consolidates powerful endpoint detection and response (EDR) with unmatched endpoint protection. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely, respond with precision.
-
IOCO SOLUTIONS LIMITED
FortiGate, FortiManager and FortiAnalyzer solutions provide a core capability to any organization looking to improve their security posture. Flexible licensing models based on organizational and regulatory requirements results in great ROI. Backed by world leading security researchers and developers results in solutions for now and the future.
-
CHESS ICT LIMITED
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point CloudGuard WAF provides Web Application and API protection.With deep application contextual analysis,it eliminates the tradeoff between the level of security and the complexity of managing application security.Whether your application is hosted in a datacenter or in a public/private cloud,CloudGuard's patent-pending decision engine covers,OWASP top ten attacks,API attacks
-
Virgin Media Business
Zscaler is a global cloud-based information security company that provides Secure Access Service Edge (SASE) solutions; internet security; web security; next generation firewalls; sandboxing; SSL inspection; antivirus; vulnerability management and granular control of user activity in cloud computing, mobile and Internet of Things (IoT) environments.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.