-
Tadaweb S.A.
Tadaweb's operating system for OSINT streamlines open-source investigations. Optimising data collection, analysis and internet investigations. Features include efficient information gathering, persistent monitoring, protection of data, secure working environment and adherence to policy. The platform supports collaborative work, access to publicly and commercially available information and the generation of actionable insights.
-
NETWORKOLOGY LTD
Splunk monitors and analyses data from any sources to optimise your IT, security and business performance through operational intelligence and insights. This offering includes Enterprise, Clouds, Enterprise Security (SIEM), SOAR (Orchestration), IT Service Intelligence (ITSI), Observability (APM), and Splunk's Edge Hub solution.
-
SOFTCAT PLC
CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Falcon Exposure Management licences to utilise the power of the Crowdstrike Falcon Exposure Management AI- powered platform for vulnerability management. Crowdstrike Falcon Exposure Management helps security teams complete vulnerability management programs through the entire lifecycle.
-
Grove Information Systems
Mimecast Unified Email Management and Cyber Resilience platform is an always-on, cloud-based service that offers organisations the unique benefits of fully integrated email security, business and operations-critical cyber continuity; and archiving solutions.
-
HANDD BUSINESS SOLUTIONS LIMITED
Scalable, unified Mobile Endpoint Detection and Response platform to protect managed or unmanaged IOS, Android and Chrome OS devices. The platform is powered by telemerty from hundreds of millions of mobile application, devices and web items to detect mobile compromise and phishing attacks.
-
CDW LIMITED
Amazon WorkSpaces offers you an easy way to provide a secure, managed, cloud-based virtual desktop experience to your end-users. Amazon WorkSpaces provides a fully managed service. With Amazon WorkSpaces, you can deliver a high-quality portable desktop, and applications, to your users on the device of their choice.
-
INTEGRITY360 LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
BYTES SOFTWARE SERVICES LIMITED
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head.
AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what IT model makes sense in that moment.
bssgc
-
ITHQ LTD
DNSFilter provides protective DNS and content filtering services, blocking malicious sites and inappropriate content at the DNS level. It features easy policy creation, roaming client support, and flexible deployment options, suitable for diverse environments including remote work settings.
-
CHESS ICT LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
SOFTCAT PLC
Tenable One Enterprise is comprised of all features in Tenable One Standard plus:
Attack Path Analysis for breach & attack mitigation and External Attack Surface Management for insight into the external attack surface, allowing organizations to identify and reduce risks from the attacker’s perspective.
-
PROSPERON NETWORKS LTD
SolarWinds® Access Rights Manager (ARM) is designed to assist IT and Security Administrators to quickly and easily provision, de-provision, manage and audit user access rights to systems, data, and files. ARM helps to protect organisations from the potential risks of data breaches, and demonstrate regulatory compliance.
-
Chess CyberSecurity Ltd t/a CyberLab
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
MTC MEDIA LIMITED
mtc provides a full service digital design and development service agency providing a range of specialist services. Our kiosk user interface design and development service is aimed at independent theatre, cinema, and visitor attractions, using Spektrix as their ticket fulfilment and CRM software provider.
-
IBM UNITED KINGDOM LIMITED
IBM Db2 Warehouse on Cloud is A fully managed, elastic, cloud data warehouse built for high-performance analytics and machine learning available on IBM Cloud and AWS. It is part of Common SQL engine across all deployment options. IBM delivers an environment designed , managed and sized to meet those needs.
-
INTEGRITY360 LIMITED
Cynet 360 is the world’s first autonomous breach protection platform that consolidates and automates Monitoring & Control, Attack Prevention & Detection and Response Orchestration a Cynet 360 delivers these capabilities by use of Cynet Sensor Fusion™ to collect and analyze all endpoint, user, file, network activities across the environment.
-
VE3 GLOBAL LTD
VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.
-
LRQA
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.
-
ITogether
Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.
-
CDW LIMITED
Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.
-
LEXISNEXIS RISK SOLUTIONS UK LIMITED
ThreatMetrix provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.
-
COMPUTACENTER (UK) LIMITED
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
MTI TECHNOLOGY LIMITED
MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times.
The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.
-
KHIPU NETWORKS LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Enterprise option include tools for breach & attack mitigation and insight into the external attack surface.
Includes other Tenable point products.
-
BYTES SOFTWARE SERVICES LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc
-
BECRYPT LIMITED
Becrypt's Sovereign CWE service is designed for organisations looking to collaborate with HM Government and Industry partners, within the UK and Internationally.
-
PHOENIX SOFTWARE LIMITED
Centralize local and remote data protection, single controls plane to manage data center backup and disaster recovery.
Scalable, all-in-one backup, disaster recovery, archival and analytics. Simplifies data protection, reducing costs, and improving visibility.
File Servers (Windows/Linux)
Virtual Environments (Hyper-V,VMware,Nutanix)
Databases (MS SQL,Oracle,SAP HANA)
NAS/Shares
AWS EC2
Azure VM and Discs
-
APPYHIVE LTD.
Cloud-based service platform delivering secure, scalable, native mobile apps for educational institutions. Custom-branded, modular and fully tailored to your school’s identity, needs, and growth over time, reflecting the culture, branding, and unique operational needs. Apps are published on your behalf on both Apple App Store and Google Play as standard.
-
Stone Technologies Limited Trading as Converge Technology Solutions
Stone utilises Cisco Duo to provide Two Factor Authentication.
Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known
vulnerabilities and/or exploits.