-
EXPONENTIAL-E LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
ARISSIAN LTD
Provide customers with confidence that your employees are who they claim to be and the role they perform. Luciditi Digital Credentials - provides secure digital identity cards that can be checked by eye and validated electronically in real time to provide the latest in ID verification.
-
SAPPHIRE TECHNOLOGIES LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.
-
BYTES SOFTWARE SERVICES LIMITED
Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, Windows Defender Antivirus. Can be used with either Windows 10 or Windows 11
bssgc
-
Barrier Networks
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
HANDD Business Solutions
MOVEit Cloud is a secure, cloud-based managed file transfer service by Progress Software. It facilitates safe data exchange, ensuring compliance with regulations. Offering encryption, advanced authentication, and centralised management, it streamlines file transfer with heightened security and scalability. UK hosting is available.
-
INTEGRITY360 LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent attacks and communicate cyber risk to support optimal business performance.
Tenable One Standard is comprised of:
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin &Exposure View &Asset Inventory
-
MILLERSOFT LIMITED
Keycloak is an open-source identity and access management solution. It provides authentication, authorization, and single sign-on capabilities for web and mobile applications. Keycloak allows centralized user management, role-based access control, and integration with various authentication protocols like OAuth 2.0 and OpenID Connect and SAML.
-
MISCO TECHNOLOGIES LIMITED
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance
-
INTEGRITY360 LIMITED
Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.
-
CHESS ICT LIMITED
Mimecast Awareness Training is a security awareness
training and cyber risk management platform that
helps you combat information security breaches
caused by employee mistakes.
-
S3 Ltd
Boxphish provide interactive training courses and real-world phishing simulations to educate and protect our users
-
Cyberlab
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
CDW LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
Computacenter (UK) Ltd
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
PHOENIX SOFTWARE LIMITED
Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.
-
SALUS DIGITAL SECURITY LIMITED
Assurance testing of cloud services against HMG approved standards and/or industry best practice.
-
SOFTCAT PLC
Kemp LoadMaster By Progress provides geographical, cloud and application load balancing with integrated WAF, Reverse proxy, Kubernetes Ingress Controller and Network Telemetry
-
SOFTCAT PLC
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
INTEGRITY360 LIMITED
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
Cyberlab
LogPoint's modern Security Incident and Event Management (SIEM) solution provides monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure and enables enterprise security professionals to view activities within their environment.
-
ICYBERDEFENCE LIMITED
The solution will provide security assessment of the IT environment using a centralised cloud-based cybersecurity assessment tool. Target assets include the following but ‘not limited to’ End User Compute (EUC)devices, network, security, servers and applications.
-
SOMERFORD ASSOCIATES LIMITED
As a Splunk Elite Partner we provide Splunk Enterprise which monitors and analyses machine data from any source to deliver operational intelligence that optimises your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, it is a leading enterprise-wide analytics platform.
-
DASSAULT SYSTEMES UK LIMITED
DS provides Software as a Service for Product Life cycle Management for 11 industries covering Governance, Engineering, Manufacturing, Data Science for an entire organization in order to create digital twins in a virtual world.
-
BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde
Secure Schools (part of Wonde Ltd) Online Cyber Security Auditing and Testing Platform enables schools and academy trusts to perform an independent review and assurance of their cyber risk.
-
CHESS ICT LIMITED
Network Security Automation & Control delivers real-time and continuous visibility across all asset types and enables secure and compliant connectivity between all asset types within the network. Organizations can automate compliance and policy control and enable quick incident recovery while integrating and automating workflows for improved cybersecurity response.
-
HANDD Business Solutions
Fortra Data Classification Suite (Formerly Titus) allows you to organise and label data according to its sensitivity and importance. Protect sensitive information by assigning rich content labels and persistent metadata. Fortra DCS aids enforcement of data security policies and ensures compliance with regulations of data on-premise and in the cloud.
-
Garrison Technology Ltd
Garrison ULTRA is a highly performant, full browser isolation cloud service. Garrison ULTRA leverages Garrison’s unique hardware enforced browser isolation technology, trusted by governments around the world, enabling users to safely visit ‘risky’ websites and providing a scalable service that protects from all web-based attacks, including phishing and malware threats.
-
SOFTCAT PLC
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.