-
SOFTCAT PLC
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
CENTERPRISE INTERNATIONAL LIMITED
WebTitan is a cloud based web filtering service which allows you to monitor, control, protect and report on your business and users from online threats.
You can create a granular policy for your users to control internet access and block malware in your organisation.
-
SOFTCAT PLC
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
INTEGRITY360 LIMITED
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.
-
CDW LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
KHIPU NETWORKS LIMITED
Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.
-
INTEGRITY360 LIMITED
Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.
-
BOXXE LIMITED
See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.
-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.
-
BYTES SOFTWARE SERVICES LIMITED
Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc
-
ISHELP.CO.UK LIMITED
ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.
-
QUADRIS LIMITED
Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.
-
MTI TECHNOLOGY LIMITED
Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk.
Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR
-
LRQA
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Grove Information Systems
Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.
-
INTEGRITY360 LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.
-
JBi Digital
JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective.
Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.
-
FCS SOFTWARE SOLUTIONS LIMITED
ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.
-
VE3 GLOBAL LTD
The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.
-
INTEGRITY360 LIMITED
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.
-
SOCIAL CARE NETWORK SOLUTIONS LIMITED
Children: front-door referral service, child protection, family hubs, care orders, Regional Adoption Agencies, prospective adopter assessment, adoption support, letterbox, fostering, foster carer recruitment, assessment, panel, payments, residential care, semi-independence, care leavers, supported living,
Adults: shared lives, residential care, supported employment, Connect To Work, IPS, day care and domiciliary care.
-
SPINDOGS LTD
Hosting of mobile optimised, accessible Wordpress content management system websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.
-
GET SWARMS LIMITED
Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.
-
SALUS DIGITAL SECURITY LIMITED
Red Teaming is the process of using Tactics, Techniques, and Procedures
(TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.
-
SYNERGI SOFTWARE LIMITED
Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.
-
BYTES SOFTWARE SERVICES LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc
-
CDW LIMITED
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
COMPUTACENTER (UK) LIMITED
IBM Cloud Pak for Data is a fully-integrated data and AI platform that modernizes how businesses collect, organize and analyze data to infuse AI throughout their organizations. It runs as a self-managed or fully-managed public cloud service on IBM Cloud with services and runtimes deployable to other cloud vendors.
-
SOMERFORD ASSOCIATES LIMITED
Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.