-
CYBERIAM HOLDINGS LIMITED
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity. bssgc
-
S8080 LIMITED
ISO27001 open-source CMS - a digital platform for Local Authority / Councils. S8080’s icon-driven council self-service portals securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, yet powerful content management systems. Mobile and accessible, designed around Local Authority / Council user’s needs.
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
PEGASYSTEMS LIMITED
Pega is a low-code platform for AI-powered decisioning and workflow automation. We enable organisations to get work done using apps that are secure, scalable, governed, and maintainable. We offer solutions for business process management, digital process automation, and customer/citizen engagement. Business Rules Engine is at the core of the platform.
-
ILLUMINET SOLUTIONS LIMITED
Risk Radar is a highly effective Risk Identification and management solution, which supports Illuminet's rapid Risk Management methodology. The solution provides a rich analytical view of your risk posture and the methodology allows you to reduce your exposure rapidly.
-
Blue Lights Digital
Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.
-
BYTES SOFTWARE SERVICES LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware. bssgc
-
HCL TECHNOLOGIES UK LIMITED
Rapid Application Development IDE
Rapid App Development (RAD) platform with power of custom coding, help enterprises build and launch applications faster.
Application development platform for building unified digital experiences across all channels.
Create mobile and desktop applications in a low code environment.
Mobile Application Development.
Multi-experience Development Platform.
-
NIGHTBALL TECHNOLOGIES LIMITED
Pre-integrated secure environment, encompassing Cyber Resilient Desktop as a Service.
-
Interact
Interact is enterprise-grade intranet software designed to help internal communication teams connect with every employee regardless of role, device, or location.
We are a global enterprise software company that today serves intranet software to over 5+ million users across more than 1,000 customers.
-
BLANKBOX TECHNOLOGIES LTD
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
BEMROSE BOOTH PARAGON LIMITED
Paragon ID is a leader in identification solutions, in the e-ID, transport, smart cities, traceability & brand protection sectors. Using the latest technologies such as RFID and NFC, it provides smart cards, tickets, labels and tags to worldwide clients in diverse markets including public transport, manufacturing, logistics, gaming and retail.
-
Aridhia Informatics Ltd
FAIR Data Services gives researchers the ability to find, access, curate, analyse and publish data via online portals/APIs. Accredited users can operate within a compliant environment designed with security and privacy in mind, prevents unauthorised access/use of data, adheres to information governance standards and where applicable, preserves patient confidentiality.
-
SAPPHIRE TECHNOLOGIES LIMITED
SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence.
With SentinelOne, organisations can detect malicious behaviour across multiple vectors, rapidly eliminate threats with a fully automated integrated response and adapt their defences against the most advanced cyber attacks.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Temporary Housing Regular Visit solution optimises the management of temporary housing units by facilitating routine inspections. Utilising our robust case management system, the solution streamlines scheduling, data collection, and reporting processes, ensuring efficient and effective management of temporary housing facilities.
-
ACCESS UK LTD
Modern, intuitive, cloud based HR software designed specifically for schools, academies and Multi Academy Trusts. Access Education People combines the latest technology with HR best practice using a secure, flexible and scalable platform for your People data and processes with the option of an efficient UK based managed payroll services.
-
S8080 LIMITED
ISO27001 open-source CMS - a digital platform for Local Authority / Councils. S8080’s icon-driven council self-service portals securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, yet powerful content management systems. Mobile and accessible, designed around Local Authority / Council user’s needs.
-
EcoOnline
EcoOnline Sypol's COSHH and Chemical Management Software gives you all the tools you need to stay compliant with COSHH regulations. With access to over 750,000 COSHH risk assessments and support from our in-house technical experts, our COSHH management software inspires confidence in your COSHH compliance
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
QUADRIS LIMITED
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft-365. The solution delivers best in class email security and filtering against spam, zero-day malware as well as more sophisticated phishing attacks while also giving ability to protect data from accidental deletion and compliance via email-archiving
-
Commify UK Limited trading as VOODOO and Esendex
Send messages through our SMS and WhatsApp channels and have two-way SMS and WhatsApp conversations. Through SMS and WhatsApp, you can keep customers informed of changes to terms, new products and general customer information. Control conversations through the easy to use Esendex SMS portal or via your CRM using API.
-
BECRYPT LIMITED
Becrypt's Everything 365 service is designed businesses who are looking to get all of their IT under control. Aimed at Public Sector departments and organisations, and commercial companies that support public sector, who need a fast, easy deployable and assured solution that meets the required HMG security standards.
-
SPINDOGS LTD
Open source Laravel php framework. Spindogs' open source laravel framework provides bespoke templates for content editors. GDPR compliant laravel framework has an easy to use admin interface and flexible content editing features. The framework system is user friendly, and fully customisable.
-
Network Utilities (Systems) Ltd
Build truly in depth automated defences with the only solution with PAM, zero-trust execution and automatic de-escalation of user rights on threat detection. Move beyond outdated rights management tools and finally put a stop to insider threat.
Including application management for whitelisting and blocking of running applications.
-
DEFENCE DATASEC LTD
Defence DataSec provides cutting-edge Google Cloud Storage Solutions tailored to your business needs. Leveraging Google Cloud's scalable and secure infrastructure, we offer efficient storage solutions for data of any size. Trust us to optimize your storage environment, ensuring reliability, accessibility, and cost-effectiveness for your organization's data management needs.
-
INTEGRITY360 LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
KICK ICT GROUP LIMITED
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
VE3 GLOBAL LTD
Utilize test automation for mobile applications, employing cloud-based test automation software and devices. Install applications, create automated test cases, execute scripts, and generate test reports for efficient defect identification.
-
Cyberlab
SophosManaged Risk is a vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With SophosManaged Risk, experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent attacksbefore business disruption.