-
I-NET SOFTWARE SOLUTIONS LTD
This assessment service is designed to review and analyse an organisations current multi-cloud deployment against the our multi-cloud good practice blueprint. Data backed recommendations will then be made against the goal of unifying and streamlining multi-cloud architecture and operations
-
Central Networks and Technologies Ltd
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
SCG CORPORATE LIMITED
Barracuda MSP Log Security Monitoring is a managed security that collects, aggregates, and normalizes log data from hundreds of sources for AI-enabled analysis using BMSP’s analytics platform, SIEM, threat intelligence, and 24/7 365 SOC. Identify threat-like behavior in your systems such as impossible logins, multi-factor bypass & coordinated attacks.
-
Gradian Systems Ltd
With no means to authoritatively identify the sender, anyone can easily impersonate sending domains. Valimail is the only fully automated, anti-phishing platform that governs DMARC, DKIM, Unlimited SPF & BIMI. Only full automation provides a guaranteed path to rapid and critically, safe enforcement of DMARC.
-
INTEC SYSTEMS LIMITED
HCL Domino is a Rapid Application Development (RAD) platform which can be customised and helps companies build and launch applications faster.
-
PHOENIX SOFTWARE LIMITED
"Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface.
Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs. bssgc
-
NVT Group
Concepta XDR & SOC is an all-in-one cyber security platform. It includes all the prevention, detection, correlation, investigation and response you need, backed by a 24/7 Security Operations Centre (SOC) service, without the traditional costs and complexities.
-
CHESS ICT LIMITED
Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents
-
Blue Lights Digital
A digital forensics service that supports extraction of data from global cloud services such as AWS, Google and iCloud, along with a large variety of other cloud services. Supporting extraction of email, data from IoT devices and provides users with an automated web capture feature and real-time extraction monitoring.
-
SPINDOGS LTD
Kentico deployment. For mobile optimised, accessible website development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) and launchpad provide a secure and seamless single sign on (SSO) and context management (CM) capability. Our SSO and CM solution allows you to securely login to any application at the click of a button and find the correct patient, client or customer context.
-
Netcraft
We offer a highly automated solution for promptly detecting and removing malicious content from the internet. We can handle a wide range of attack vectors including phishing URLs, brand infringement, malware, fraudulent social media profiles, fake mobile apps, and e-mail addresses being used to conduct fraud.
-
Gradian Systems Ltd
Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.
-
IRIS INTELLIGENCE LIMITED
The IRIS Net Zero Tracker helps government departments and Arms Length Bodies (ALBs) deliver on their net zero obligations. Building on the IRIS ESG System, the Net Zero Tracker helps implement carbon reduction and remediation actions against international standards such as SASB and TCFD. Authorised reseller of RIO AI Platform
-
INTEGRITY360 LIMITED
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.
-
BYTES SOFTWARE SERVICES LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices. bssgc
-
NETWORKOLOGY LTD
Networkology are proud to partner with Dynatrace for their best-of-breed APM and systems observability solution, offering
unprecedented insight into the performance, health, and user experience of complex modern IT systems, combined with detailed user
experience and business analytics.
Dynatrace works with multiple cloud subscribers to provide true multi-cloud observability.
-
BT PLC
With CrowdStrike Falcon Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
Cyberlab
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
CHESS ICT LIMITED
Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.
-
BYTES SOFTWARE SERVICES LIMITED
"Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface.
Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."
bssgc
-
SOFTCAT PLC
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.
-
Cyberlab
Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business
-
CALQRISK (UK) LIMITED
CalQRisk is an online, modular, Governance, Risk and Compliance solution that can be tailored to suit your needs. CalQRisk brings consistency and completeness to your GRC efforts. It joins up your GRC processes in one platform, resulting in efficiencies across the organisation.
-
QUADRIS LIMITED
Cisco Secure Endpoint offers next-generation cloud-delivered endpoint protection and advanced endpoint detection and response across multidomain and multiple OSs. Cisco Secure Endpoint protects your organizations Servers, Desktops, and Mobile devices from malware. Cisco Secure Endpoint stop threats and then rapidly detect, contain, and remediate advanced threats that evade front-line defenses.
-
Cyberlab
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
BYTES SOFTWARE SERVICES LIMITED
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide
bssgc
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
The Business Software Centre Ltd
marter 365, cloud-based Software Asset Management solution optimizing Microsoft Office 365 subscriptions, automatically recommends how to reduce IT costs whilst finding the best 365 subscriptions for every user. Included with Smarter Secure, addressing the problem of Microsoft 365 security with data collection and analysis of weaknesses and security issues