-
CYBANETIX LIMITED
SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.
-
INTEGRITY360 LIMITED
Combining the most comprehensive library of engaging, localised content, AI-driven simulated phishing, training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.
KnowBe4’s Kevin Mitnick Security Awareness Training platform reduces an organisation’s Phish-prone Percentage from over 30% initially to under 5% after 12 months.
-
Cyberlab
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
VE3 GLOBAL LTD
Exchange Online Protection safeguards your cloud-based or on-premises email with anti-spam and anti-malware protection. It offers financially backed SLAs and guarantees 99.999% network uptime, effectively shielding against 100% of known viruses and 99% of spam. Additionally, it provides reporting and message trace capabilities along with policy-based filtering.
-
Infosec Ventures
EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program.
We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.
-
CDW LIMITED
Online versions of Office with email, instant messaging, video conferencing and co-authoring. Anti-virus and anti-spam, 50Gb mailbox, 1TB file storage, HD video conferencing, Office Online, Team Sites and Enterprise Social Networking.
-
CDW LIMITED
Cloud solution for project planning and control, project portfolio management (PPM). Microsoft Project Plan 3 includes Project for the web, creation of Roadmaps and Project Online Professional, and can be used by administrators, portfolio managers, portfolio viewers, project managers, resource managers, team leads, and team members.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd offers specialized Workday Project and Work Management services for government agencies. Our solutions streamline project planning, resource allocation, and task tracking, ensuring efficient project execution and optimal resource utilization. With our expertise, agencies can enhance project visibility, collaboration, and delivery success effectively.
-
ICYBERDEFENCE LIMITED
The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.
-
LRQA
CloudGuard Code Security, provides automated tools that integrate with developers’ tools to detect code-vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations.
-
ULTIMA BUSINESS SOLUTIONS LTD.
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
Cyberlab
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
Computacenter (UK) Ltd
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
LEIDOS INNOVATIONS UK LTD
Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.
-
PHOENIX SOFTWARE LIMITED
Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.
-
WM Promus
Micro Focus Universal Discovery (UD) and Universal Configuration Management Database (UCMDB) automatically collect (by discovery or integration), reconcile, manage, and present data for
hardware, software, applications, services and their interdependencies in Hybrid IT environments. Enables management of hybrid IT and multi-cloud environments.
-
BYTES SOFTWARE SERVICES LIMITED
Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11
bssgc
-
Phonio UK Ltd (Telio)
Reduce operational costs and increase safety by deploying an intelligent smart algorithm built into your existing CCTV system. Automatic focussing and alerting helps to quickly and accurately detect violent incidents and suspicious activity within and around your prison facility therefore enhancing the security function.
-
BOXXE LIMITED
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
CDW LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides expert ServiceNow Asset Management services for government agencies. Our solutions streamline asset tracking, optimize inventory management, and ensure compliance with regulatory requirements. With our expertise, agencies can enhance visibility into their asset landscape, improve resource utilization, and reduce operational costs efficiently.
-
INTEGRITY360 LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
PHOENIX SOFTWARE LIMITED
SophosManaged Risk is a vulnerability and external attack surface management service powered
by Tenable technology and delivered by Sophos threat exposure and remediation
experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity
-
Glemnet Ltd
Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources
-
COMMUNICATE TECHNOLOGY LIMITED
We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.
-
SOFTCAT PLC
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
PHOENIX SOFTWARE LIMITED
Protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously/negligently/unknowingly. We correlate user activity and data movement to protect you from insider-led data breaches. Detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
SOFTCAT PLC
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CHESS ICT LIMITED
InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach.
Strengths include:
- Multi-Cloud security & compliance
- Container & Kubernetes security
- Cloud Vulnerability Management
-
CHESS ICT LIMITED
Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.