-
MTI TECHNOLOGY LIMITED
(Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls).
Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.
-
INTEGRITY360 LIMITED
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
MICRO FOCUS
OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides:
• Identity Governance
• Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework
• Password Management
• Identity Intelligence Basic
-
ARMADILLO SEC LTD
Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.
-
CDW LIMITED
As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365.
AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.
-
S3 Ltd
Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.
-
Lloyds Ventures
HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.
-
Armour Comms
Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.
-
PHOENIX SOFTWARE LIMITED
Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process
-
SOFTCAT PLC
Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)
-
IBM UNITED KINGDOM LIMITED
IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.
-
Khipu Networks Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
HOWELL TECHNOLOGY GROUP LIMITED
Office 365 and Microsoft 365 Apps enables you to create, share, and collaborate from anywhere on any device with a cloud-based suite of productivity apps and services. Licensing available from Microsoft 365 Apps for enterprise, O/M365 E1, O/M365 E3 and O/M365 E5.
-
Proact IT UK Limited
Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:
-
MAXINITY SOFTWARE LIMITED
Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.
-
CDW LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
Barrier Networks
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.
-
NOC365 LTD
Cisco Umbrella is used as the first layer defense for security against threats before they happen. Our Managed Cisco Umbrella service works at the DNS layer to protect all devices connected to a network, both on and off the corporate network.
-
INTEGRITY360 LIMITED
Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.
-
SPECIALIST COMPUTER CENTRES PLC
SCC has a growing track record of delivering IMPACT to existing ServiceNow (ITSM/ITOM/CSM) customers via our tried and tested Fitness Check solution. Over customised environment? Not getting the benefit from ServiceNow’s family releases? Struggling to deliver ROI? Allow SCC to health check your Service Desk environment solving your issues
-
Computacenter (UK) Ltd
Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.
-
VE3 GLOBAL LTD
Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads.
-
CENTERPRISE INTERNATIONAL LIMITED
SpamTitan Cloud is a full-service, cloud based email security solution which protects your business, your employees and your clients. The cloud solution is simple to set up and manage, requires no software installation and provides 99.7% spam detection, virus and malware blocking, authentication control, outbound scanning and robust reporting structures.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns.
-
Computacenter (UK) Ltd
Harness Software Delivery-Platform modernizes DevOps, enhances Developer Experience, secures Software Delivery, and optimizes Cloud Costs. Our suite includes Code Repository, CI/CD, GitOps, Feature Flags, Infrastructure as Code, Chaos Engineering, Service Reliability, Developer Portal, Engineering Insights, Supply Chain Assurance, Security Testing, and Cloud Cost Management, enabling end-to-end Software Delivery Lifecycle transformation.
-
BOXXE LIMITED
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
BT PLC
CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
MONDAS CONSULTING LTD
Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.
-
INTEGRITY360 LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.