-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs. bssgc
-
NVT Group
Concepta XDR & SOC is an all-in-one cyber security platform. It includes all the prevention, detection, correlation, investigation and response you need, backed by a 24/7 Security Operations Centre (SOC) service, without the traditional costs and complexities.
-
CHESS ICT LIMITED
Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents
-
Blue Lights Digital
A digital forensics service that supports extraction of data from global cloud services such as AWS, Google and iCloud, along with a large variety of other cloud services. Supporting extraction of email, data from IoT devices and provides users with an automated web capture feature and real-time extraction monitoring.
-
SPINDOGS LTD
Kentico deployment. For mobile optimised, accessible website development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) and launchpad provide a secure and seamless single sign on (SSO) and context management (CM) capability. Our SSO and CM solution allows you to securely login to any application at the click of a button and find the correct patient, client or customer context.
-
Netcraft
We offer a highly automated solution for promptly detecting and removing malicious content from the internet. We can handle a wide range of attack vectors including phishing URLs, brand infringement, malware, fraudulent social media profiles, fake mobile apps, and e-mail addresses being used to conduct fraud.
-
Gradian Systems Ltd
Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.
-
IRIS INTELLIGENCE LIMITED
The IRIS Net Zero Tracker helps government departments and Arms Length Bodies (ALBs) deliver on their net zero obligations. Building on the IRIS ESG System, the Net Zero Tracker helps implement carbon reduction and remediation actions against international standards such as SASB and TCFD. Authorised reseller of RIO AI Platform
-
INTEGRITY360 LIMITED
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.
-
BYTES SOFTWARE SERVICES LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices. bssgc
-
NETWORKOLOGY LTD
Networkology are proud to partner with Dynatrace for their best-of-breed APM and systems observability solution, offering
unprecedented insight into the performance, health, and user experience of complex modern IT systems, combined with detailed user
experience and business analytics.
Dynatrace works with multiple cloud subscribers to provide true multi-cloud observability.
-
BT PLC
With CrowdStrike Falcon Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
Cyberlab
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
CHESS ICT LIMITED
Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.
-
BYTES SOFTWARE SERVICES LIMITED
"Comprehensive solution for Information Lifecycle Management allowing you to have complete control from creation to archive or defensible disposal, all through a central interface.
Discover and understand your data, remove redundancy, optimize storage, automate lifecycle, ensure compliance, and classify content intelligently with advanced machine learning for efficiency."
bssgc
-
SOFTCAT PLC
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency.
-
Cyberlab
Rapid7 Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers. By proactively monitoring thousands of sources across the clear, deep, and dark web, Threat Command enables you to make informed decisions and rapidly respond to protect your business
-
CALQRISK (UK) LIMITED
CalQRisk is an online, modular, Governance, Risk and Compliance solution that can be tailored to suit your needs. CalQRisk brings consistency and completeness to your GRC efforts. It joins up your GRC processes in one platform, resulting in efficiencies across the organisation.
-
QUADRIS LIMITED
Cisco Secure Endpoint offers next-generation cloud-delivered endpoint protection and advanced endpoint detection and response across multidomain and multiple OSs. Cisco Secure Endpoint protects your organizations Servers, Desktops, and Mobile devices from malware. Cisco Secure Endpoint stop threats and then rapidly detect, contain, and remediate advanced threats that evade front-line defenses.
-
Cyberlab
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
BYTES SOFTWARE SERVICES LIMITED
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide
bssgc
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
The Business Software Centre Ltd
marter 365, cloud-based Software Asset Management solution optimizing Microsoft Office 365 subscriptions, automatically recommends how to reduce IT costs whilst finding the best 365 subscriptions for every user. Included with Smarter Secure, addressing the problem of Microsoft 365 security with data collection and analysis of weaknesses and security issues
-
LEIDOS INNOVATIONS UK LTD
Check (ITHC) services in line with NCSC (formerly CESG) requirements through partnership with trusted suppliers holding CHECK, CREST and PCI DSS accreditation. Leidos provides analysis of systems and networks to identify vulnerabilities, provide daily management throughout the engagement and detailed reporting with remediation actions upon completion.
-
Computacenter (UK) Ltd
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
Barrier Networks
Our Managed SIEM Service provides customers with first-class security expertise, advanced threat intelligence, efficiency and automation. Our cyber security experts are well placed to manage the system effectively ensuring that security incidents and breaches are handled swiftly and accordingly.
-
BLUEFORT SECURITY LIMITED
On-Premise cyber security validation platform allowing for Vulnerability scanning, Control Validation, 100% Automation, Agentless Setup with the real-world, Controlled Exploitations (no simulation), Risk based remediation and prioritisation and All Attacks Surface Management
-
BYTES SOFTWARE SERVICES LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visibility across other 3rd party security vendors. bssgc
-
CYBEXER TECHNOLOGIES
The Digital Twin Management Platform (SaaS) provides a cloud-based, scalable solution for global digital twin technology, enhancing cybersecurity and technology testing, R&D, and training. The platform enables flexible technology testing across various configurations, fostering innovation and supports real-world applications in a globally accessible, scalable environment.