-
CDW LIMITED
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN."
-
Halo Solutions Ltd
Incident & Emergency Management. Health and safety, risk assessment and security / counter-terrorism assessments. Its a universal safety platform for all manner of uses.
-
AVCO SYSTEMS LIMITED
Secure identity management and single-sign-on solution that helps organisations meet their complex security & compliance policies, and consolidate their user/application management efforts.
-
CYBERLAB CONSULTING LTD
Threat Command is an advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization, employees, and customers, Threat Command enables you to make informed decisions and rapidly respond to protect your business. In addition, Threat Command enables advanced automated response to many threat alerts.
-
Silver Lining Convergence Limited
PCI compliance for your voice transactions to protect your business from fraud; no card information is ever revealed by the call recipient. No interruption to the conversation without need to pause, suppress or manipulate recordings. This delivers savings by reducing the number of PCI controls required simplifying auditing and management.
-
Network Utilities (Systems) Ltd
World-class, user-friendly, new-school Security Awareness Training, KnowBe4 gives you self-service enrollment and both pre-and post-training phishing security tests that show you the percentage of end-users that are Phish-prone. KnowBe4’s highly effective, frequent, "double-random" Phishing Security Tests provide several remedial options in case an employee falls for a simulated phishing attack.
-
IP Performance Limited
The Cyber Breach Response workshop is designed to equip organisations with the essential knowledge and skills to effectively respond to cyber security incidents. In an age where cyber threats are prevalent, being prepared for a breach is a necessity
-
SOMERFORD ASSOCIATES LIMITED
Kafka’s founders Confluent sets Organisations’ data in motion
Real-time/Digital Transformation/Edge/Citizen Data 360 View/Personalisation/Self-Service/Continuity/Data connectivity
Streamlining Defence/Central Agencies' Operational decisions
Cross-Departmental Data sharing
Smart Supply Chain/Logistics
Event-driven microservices, modernising legacy & connecting hybrid cloud systems
Delivering real-time usage/analytics, streaming ETL.
Flink/Stream processing
Available on AWS Marketplace
-
MTI TECHNOLOGY LIMITED
MTI provide market leading CyberArk Privileged Access Security Licensing, Integration and Management Services. We can fully secure privileged accounts across your organisation including password control and full auditing of administrator actions via recorded sessions. The service is supported by our UK based 24x7x365 Security Operations Centre (SOC).
-
SOFTCAT PLC
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
AMS
AMS File Transfer is a secure encrypted file transfer and file sharing solution used for digital delivery of large and/or confidential files internally and externally. Highly secure, trusted by the NHS and government bodies across the UK, AMS File Transfer will provide a full audit trail, traceability and compliance.
-
SOFTCAT PLC
Harmony SaaS provides continuous security for your hyperconnected SaaS ecosystem as fast as it evolves. Our unique platform understands the contextual security settings of third-party SaaS services, monitors their behaviour as they interact with each other, and automates the mitigation of actual and potential risks to protect your company’s data.
-
SOMERFORD ASSOCIATES LIMITED
Splunk Edge Hub is a fully integrated solution with in built sensors and all necessary connectivity libraries already integrated into it. Providing a quick and easy to use solution of getting data from their environmental sensors, IoT devices and industrial equipment into their Splunk environment.
-
Grove Information Systems
Powered by Cyber Risk Context Technology, the platform leverages data science to accurately track, measure and predict real-world exploit activity across the enterprises’ global attack surface. With Kenna, security and IT Operations teams can finally align to proactively manage the vulnerabilities that matter most.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point XDR/XPR delivers comprehensive threat prevention by integrating network, endpoint, and cloud data. It employs advanced analytics to detect and mitigate sophisticated cyber threats, ensuring real-time protection across all IT environments. This solution bolsters cyber security resilience and streamlines incident response operations.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Extends our human-centric security from Email to cloud apps. Protects users from cloud threats, safeguards sensitive data and helps you stay compliant with cloud app governance.
-
FULLPROXY LIMITED
FullProxy can provide AWS/ Azure for F5 products/services which are already available on AWS Marketplace. These offers can give customers access to discounted prices on the list prices for these services. FullProxy can ensure maximum ROI by additionally providing consultancy to design, configure and maintain these new customer services.
-
MLL Telecom Ltd.
Sophos MDR is a flexible, fully managed, 24x7x365 cyber security threat protection, detection, and response service. It provides SOC analyst-led threat hunting and investigation, combining human expertise with protection technologies and advanced machine learning. MDR can detect, investigate, and neutralize advanced human-led attacks, preventing data breaches, exfiltration, and ransomware attacks.
-
Blacklight Software
Blacklight work with Microsoft 365 to allow public sector organisations such as central and local government bodies, education, healthcare and social housing providers to improve collaboration and working processes.
Microsoft Azure offers a wide platform of specialist services from identity to AI.
Integrations with other systems allow for automated processes.
-
SAP UK Ltd
SAP Customer Data Cloud builds trust with businesses, partners, and customers through seamless engagements and personalised digital experiences, turning anonymous visitors into loyal customers.
-
CYBERIAM HOLDINGS LIMITED
CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection
-
PHOENIX SOFTWARE LIMITED
Mobile device management, mobile application management, and PC management capabilities from the cloud.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides expert ServiceNow Security Operations services tailored for government agencies. Our solutions optimize threat detection, incident response, and vulnerability management, ensuring robust cybersecurity posture. With our expertise, agencies can enhance security resilience, mitigate risks, and safeguard critical assets effectively.
-
NG Bailey IT Services Limited
NG Baileys Network Management service delivers network management tools from configuration and traffic profiling to performance monitoring and network topology mapping
An integrated, multi-vendor approach that’s easy to use, extend, and scale to keep the network optimised
Working with providers such as: Solarwinds
-
Cyberlab
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
TRUSTMARQUE SOLUTIONS LIMITED
As a Microsoft Partner (x7 Designations), our M365 Enterprise Agreement Managed Support Service helps you select the most advantageous Enterprise Agreement, enabling you to derive business benefits and technical fit at the prime price point. Depending on the services purchased, it can incorporate requirements definition and scenario demonstrations.
-
RAZOR THORN SECURITY LTD
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
HYPER TALENT SOLUTIONS LTD
At Hyper Talent Solutions Ltd, our SAP Business Process Management services are designed for Government Departments. We specialize in analyzing, optimizing, and automating business processes within SAP systems. Leverage our expertise to streamline operations, improve efficiency, and drive innovation.Trust us to enhance your SAP environment for maximum effectiveness and productivity.
-
PHOENIX SOFTWARE LIMITED
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
SOFTCAT PLC
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.