-
SOFTCAT PLC
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.
-
BYTES SOFTWARE SERVICES LIMITED
Use any or all of Splunk’s Security products and services together to provide a unified security operations solution. On top of Splunk Enterprise or Splunk Cloud, combine Enterprise Security (SIEM), Mission Control, Splunk Attack Analyser (SAA), Splunk Threat Intelligence Management (TIM), Splunk SOAR, and Splunk UBA. bssgc
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
INTEGRITY360 LIMITED
Falcon EDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CDW LIMITED
Full-Stack Observability by Cisco moves beyond domain monitoring into full-stack visibility, insights, and actions, transforming siloed data into actionable insights that provide shared context for your IT teams, giving you the power to prioritise your actions so you can deliver flawless customer experiences that drive revenue while accelerating digital transformation.
-
INTEGRITY360 LIMITED
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
CHESS ICT LIMITED
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
Advania
Advania UK is a Direct Microsoft Cloud Solution Provider (CSP). Through the CSP licensing programme, we can provide subscription licensing for the Microsoft 365 and Office 365 platforms and associated software components. As a Microsoft Cloud Solution Provider we provide flexible plans and pricing with monthly, yearly and triennial billing
-
MICRO FOCUS
ArcSight SIEM-as-a-Service with Real-Time Threat Detection (Detect) is a real-time correlation and
threat alerting system that increases SOC analyst awareness of critical security incidents in their
environment. Detect enables SOC analysts to create correlation rules that generate alerts when
specific conditions occur within their event logs.
-
INTEGRITY360 LIMITED
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
-
BOXXE LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support performance.
It's comprised of:
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory
-
VINDO TECHNOLOGY LIMITED
Anjuna Seaglass™ isolates workloads in a hardware-assisted environment that intrinsically secures data in every state to create a zero trust environment for code and data.
-
BYTES SOFTWARE SERVICES LIMITED
Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behavior as they interact, and automates the mitigation of actual and potential risks to protect your company’s data.
bssgc
-
CDW LIMITED
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
Cyberlab
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
BYTES SOFTWARE SERVICES LIMITED
BeyondTrust Privileged Management stops attacks by removing excessive privileges on Windows, Mac, Unix, Linux and Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access. bssgc
-
INTEGRITY360 LIMITED
Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)
-
Kick ICT
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
SYNAPSE CONSULTANTS LIMITED
Azure - Dell APEX - Broadcom VMWare - Microsoft Dynamics 365 & Office 365. Druva
-
XPERTEX LTD
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
TMC3 LIMITED
tmc3 Vulnerability Assessment leverages Tenable's powerful suite of security tools to provide comprehensive vulnerability scanning and vulnerability management for your IT infrastructure. Designed to detect, prioritise, and remediate vulnerabilities, this vulnerability management service helps safeguard your networks, applications, and data from potential threats, ensuring compliance with industry standards and regulations.
-
SOFTCAT PLC
Security Awareness Training and Simulated Phishing Platform
-
iProov Limited
iProov Physical Access is a high-throughput, anti-spoofing access control solution that employs face, fingerprint, and palm biometrics. Designed to excel in real-world environments, the solution is compatible with non-specialised hardware. Trusted for accessing government facilities, securing public areas, and managing border crossings, it delivers robust protection, efficiency, and unmatched service.
-
BOXXE LIMITED
Calculate, communicate and compare your cyber risk.
-
CDW LIMITED
Immutable, Air-Gapped Cloud to Cloud Backups for Microsoft 365, Dynamics 365, Microsoft Azure, Salesforce and Google Workspace
-
COALESCENT LIMITED
Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can screen, complete, signoff, store, share and collaborate on Subject Access Requests (SARs), Freedom of Information requests (FOI), and Environmental Impact Assessments (EIA).
-
Oyster Information Management Solutions Limited
OneTrust Privacy and Data Governance Suite facilitates privacy and data governance automation helping organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. The suite consists of:
Privacy Management,
Data Discovery & Security,
Consent & Preferences,
Responsible AI.
-
Wanstor Ltd
As part of an effective Cyber Security strategy, it is important to continually collect and analyse security events to determine if your organisation is under attack. Wanstor's Security Information and Event Management (SIEM) services (Sentinel / Log360) helps your organisation to log, analyse and alert on common cyber security attacks.
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with Microsoft's Security suite. Harnessing advanced threat detection algorithms and real-time monitoring, Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your security posture and enhance your defence against emerging threats.
-
DBAAS LTD
We use the latest cloud technologies and offer reliable, user-friendly data to assist your business towards your desired goal. We have an experienced team of data engineers, data warehousing experts and advanced analytics experts. We believe that sharing valuable data across your organization securely shouldn’t be difficult.