-
ITGL Limited
Services to cover all Cisco Meraki Software including Switches, Access Points, Firewalls, SD-WAN, IoT sensors, Cameras, Cellular gateways and Secure Access Services Edge (SASE). The Meraki dashboard is a key enabler of this service.
-
Network 2 Supplies Ltd
N2S are specialists in large scale multi-site De-installations and decommissioning of IT equipment including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.
-
Proact IT UK Limited
Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support.
-
LEFKE IT LIMITED
At LefkeIT, our SAP HANA Services are designed to empower Government Departments with advanced analytics, real-time insights, and enhanced performance. We specialize in implementing, optimizing, and managing SAP HANA environments, unlocking the full potential of in-memory computing for your organization.
-
I-NET SOFTWARE SOLUTIONS LTD
data science cloud services bring together the components and data science expertise required to unlock the benefits of migration to the Cloud. We provide the discovery, understanding of business outcomes, advanced analytical techniques, and data 'squads' with expertise in Cloud-based data tools, algorithms and statistical packages.
-
CYBANETIX LIMITED
SentinelOne Endpoint Protection unifies prevention, detection, and response in a single purpose-built agent powered by machine learning and automation. It provides prevention and detection of attacks across all major vectors, rapid elimination of threats with automated, policy-driven response capabilities, and complete visibility into the endpoint environment with full-context, real-time forensics.
-
KTSL Limited
BMC Helix ITSM is a powerful, industry leading service management platform and fueling your IT transformation with intelligent, people-centric user experiences that helps you work smarter. BMC Helix ITSM is delivered in the cloud, or as a hybrid or on-premises solution.
-
Wavenet
The Wildix cloud communication system is one of the most complete Unified Communications solutions, introducing video conference, chat, and user presence together with a complete range of hardware products. Wildix is the first European cloud solution to be included in the Gartner Magic quadrant.
-
Infosec Ventures
EmailAuthentication-as-a-Service platform enables Brand Protection, Anti-Spoofing, Anti-Phishing, enhances email deliverability and provides full visibility of email as a channel. It uses SPF, DKIM, BIMI and DMARC. DMARC is part of the Active Cyber Defence Program.
We provide Security Awareness & Training alongwith EmailRemediation to mitigate risk at the Human Layer.
-
CDW LIMITED
Online versions of Office with email, instant messaging, video conferencing and co-authoring. Anti-virus and anti-spam, 50Gb mailbox, 1TB file storage, HD video conferencing, Office Online, Team Sites and Enterprise Social Networking.
-
CDW LIMITED
Cloud solution for project planning and control, project portfolio management (PPM). Microsoft Project Plan 3 includes Project for the web, creation of Roadmaps and Project Online Professional, and can be used by administrators, portfolio managers, portfolio viewers, project managers, resource managers, team leads, and team members.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd offers specialized Workday Project and Work Management services for government agencies. Our solutions streamline project planning, resource allocation, and task tracking, ensuring efficient project execution and optimal resource utilization. With our expertise, agencies can enhance project visibility, collaboration, and delivery success effectively.
-
ICYBERDEFENCE LIMITED
The solution will provide a Cyber Security Operational Centre (SOC) capability using a centralised Security Information and Event Management (SIEM) tool that aggregates log data from various data sources. Datasources include the following but ‘not limited to’ End User Compute (EUC) devices, network, security,servers and applications.
-
LRQA
CloudGuard Code Security, provides automated tools that integrate with developers’ tools to detect code-vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends. With CloudGuard Code Security, organizations can prevent exposing API keys, tokens and credentials, in addition to remediating security misconfigurations.
-
ULTIMA BUSINESS SOLUTIONS LTD.
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
SVL Business Solutions Ltd
Calabrio Analytics transforms your contact center into a powerhouse of customer intelligence by unlocking the goldmine of raw feedback and converting it into actionable insights. Anticipate customers needs, boost agent engagement, and enhance experiences across channels. Harness AI-driven analytics to refine strategies, accelerate sales, and stay ahead of evolving demands.
-
Snap Surveys Ltd
Experience Measurement Platform software providing professional data collection and reporting for surveys, assessments and audits. Optimise engagement and transform data into knowledge.
System is accessed entirely online through a browser, with downloadable desktop app for power users and mobile app for offline interviewing. Multi-language capability for online, mobile and paper.
-
PHONEHUB IO LTD
Analyse audio and video content from telephone calls and video calls in bulk. Receive transcriptions, keyword detection alerts, and sentiment analysis reports. Connects to external systems via a secure API. Ideal for enhancing security in prison communications.
-
Cyberlab
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
Computacenter (UK) Ltd
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
LEIDOS INNOVATIONS UK LTD
Leidos provides simulated phishing attacks to provide security awareness training and a greater understanding of how an organisation’s users respond to different types of suspicious mails/webpages/SMS/phone calls. We also provide an independent benchmark of the effectiveness of your security awareness campaigns, defences and prioritised remediation recommendations.
-
OpenText Corporation
Document Accessibility facilitates the manual remediation of documents into accessible PDF/UA documents used by persons with disabilities using assistive technologies. Features an intuitive user interface and AI capabilities, helping organizations comply with accessibility standards and regulations like EAA, Equality Act. Ensuring creation of content that is accessible to all audiences.
-
TRUSTCO PLC.
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
WM Promus
Micro Focus Universal Discovery (UD) and Universal Configuration Management Database (UCMDB) automatically collect (by discovery or integration), reconcile, manage, and present data for
hardware, software, applications, services and their interdependencies in Hybrid IT environments. Enables management of hybrid IT and multi-cloud environments.
-
BYTES SOFTWARE SERVICES LIMITED
Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11
bssgc
-
Phonio UK Ltd (Telio)
Reduce operational costs and increase safety by deploying an intelligent smart algorithm built into your existing CCTV system. Automatic focussing and alerting helps to quickly and accurately detect violent incidents and suspicious activity within and around your prison facility therefore enhancing the security function.
-
BOXXE LIMITED
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides expert ServiceNow Asset Management services for government agencies. Our solutions streamline asset tracking, optimize inventory management, and ensure compliance with regulatory requirements. With our expertise, agencies can enhance visibility into their asset landscape, improve resource utilization, and reduce operational costs efficiently.
-
Glemnet Ltd
Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources
-
PEOPLE PLACES LIVES LIMITED
Online information, advice and guidance portals for childrens and young peoples (CYP) and LAC placement services, including engaging and intuitive SEND Local Offer sites, FIS Family Information Services directories powered by OFSTED, Education Health and Care (EHC) planning tools and childrens placements.