-
HOWELL TECHNOLOGY GROUP LIMITED
Office 365 and Microsoft 365 Apps enables you to create, share, and collaborate from anywhere on any device with a cloud-based suite of productivity apps and services. Licensing available from Microsoft 365 Apps for enterprise, O/M365 E1, O/M365 E3 and O/M365 E5.
-
PROACT IT UK LIMITED
Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:
-
Maxinity
Maxcourse is a complete course booking and management system which both simplifies your course administration and makes it more effective. Set up, manage and publish healthcare (CPD) courses in one place. This includes secure online booking for delegates, post-course evaluation and downloading of certificates.
-
CDW LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
BARRIER NETWORKS LIMITED
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.
-
NOC365 LTD
Cisco Umbrella is used as the first layer defense for security against threats before they happen. Our Managed Cisco Umbrella service works at the DNS layer to protect all devices connected to a network, both on and off the corporate network.
-
INTEGRITY360 LIMITED
Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.
-
SPECIALIST COMPUTER CENTRES PLC
SCC has a growing track record of delivering IMPACT to existing ServiceNow (ITSM/ITOM/CSM) customers via our tried and tested Fitness Check solution. Over customised environment? Not getting the benefit from ServiceNow’s family releases? Struggling to deliver ROI? Allow SCC to health check your Service Desk environment solving your issues
-
COMPUTACENTER (UK) LIMITED
Trend Micro One is a collection of technologies that use the unified cybersecurity platform called Vision One to protect your endpoints, cloud, email, network, web, and more. We do this by applying layered protection sensors across your organisation to defend your systems regardless of device, application, network, or location.
-
VE3 GLOBAL LTD
Our DevOps consulting services help organizations integrate their development and operations teams through the adoption of cloud-native technologies that streamline and automate their workloads. The result is a fast, secure and flexible enterprise that can adapt to changing market by leveraging efficient and continuous delivery, reduced complexity and reusable workloads.
-
CENTERPRISE INTERNATIONAL LIMITED
SpamTitan Cloud is a full-service, cloud based email security solution which protects your business, your employees and your clients. The cloud solution is simple to set up and manage, requires no software installation and provides 99.7% spam detection, virus and malware blocking, authentication control, outbound scanning and robust reporting structures.
-
ITogether
PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities by flipping them into simulated phishing campaigns.
-
COMPUTACENTER (UK) LIMITED
Harness Software Delivery-Platform modernizes DevOps, enhances Developer Experience, secures Software Delivery, and optimizes Cloud Costs. Our suite includes Code Repository, CI/CD, GitOps, Feature Flags, Infrastructure as Code, Chaos Engineering, Service Reliability, Developer Portal, Engineering Insights, Supply Chain Assurance, Security Testing, and Cloud Cost Management, enabling end-to-end Software Delivery Lifecycle transformation.
-
BOXXE LIMITED
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
CrowdStrike Falcon Next-Gen SIEM revolutionises threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
MONDAS CONSULTING LTD
Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.
-
INTEGRITY360 LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.
-
COMPUTACENTER (UK) LIMITED
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
CYBEXER (UK) LTD
The platform delivers a private or hybrid cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.
-
UNSUNG LIMITED
Manage & automate digital/TLS certificates in
cloud, on-premise & hybrid environments with CA
agnostic Keyfactor Command. Discover all of
your certificates, public & private, across your
enterprise & achieve single screen visibility &
control.
-
BONDAP LTD
B-SAFE Secure data transfer is a web-based system to upload, send and share any files and messages securely and rapidly, including large files and data sets.
Secure, Auditable, Automated, and Compliant File, Email and Data Transfer and Sharing.
Scalable, and secure with encryption as standard for OFFICIAL and OFFICIAL-SENSITIVE.
-
PHOENIX SOFTWARE LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
SOFTCAT PLC
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide
-
MTI TECHNOLOGY LIMITED
MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected.
Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.
-
BYTES SOFTWARE SERVICES LIMITED
A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc
-
SOFTCAT PLC
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
SEP2 LIMITED
SEP2.security EDR is a managed Endpoint Detection & Response service powered by the Crowdstrike Falcon suite.
Delivered by our "eyes on" 24/7/365 SOC team based in Leeds, West Yorkshire, SEP2.security EDR provides the technology and service to deliver the best Endpoint security.
-
NEXUS OPEN SYSTEMS LIMITED
Digital credentials including usernames and passwords connect your employees to critical business systems and applications, along with other online services. Compromised credentials are amongst the most valuable assets found on the Dark Web. Nexus Dark Web Monitoring and Reporting delivers real-time awareness of compromised credentials and remedial correction.
-
ULTIMA BUSINESS SOLUTIONS LTD.
Track Teams, Sites, Groups and Communities in Microsoft Office 365? We get it. Time spent searching means less time being productive.
Meet MyHub, your one-stop-shop for managing existing Microsoft 365 workspaces and creating new ones—all from Microsoft Teams or our handy web app! Organize, understand, and centrally access your assets.
-
XTRAVIRT LIMITED
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.