-
Computacenter (UK) Ltd
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
CYBEXER TECHNOLOGIES
The platform delivers a private or hybrid cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.
-
UNSUNG LIMITED
Manage & automate digital/TLS certificates in
cloud, on-premise & hybrid environments with CA
agnostic Keyfactor Command. Discover all of
your certificates, public & private, across your
enterprise & achieve single screen visibility &
control.
-
BONDAP LTD
B-SAFE Secure data transfer is a web-based system to upload, send and share any files and messages securely and rapidly, including large files and data sets.
Secure, Auditable, Automated, and Compliant File, Email and Data Transfer and Sharing.
Scalable, and secure with encryption as standard for OFFICIAL and OFFICIAL-SENSITIVE.
-
PHOENIX SOFTWARE LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
SOFTCAT PLC
Confide for Microsoft 365 When you’re working on high-stakes projects, normal data protections are not enough. So how can you enable internal and external teams to collaborate securely? When everything is on the line, trust in Confide
-
MTI TECHNOLOGY LIMITED
MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected.
Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.
-
BYTES SOFTWARE SERVICES LIMITED
A secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard. bssgc
-
SOFTCAT PLC
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
SEP2 LIMITED
SEP2.security EDR is a managed Endpoint Detection & Response service powered by the Crowdstrike Falcon suite.
Delivered by our "eyes on" 24/7/365 SOC team based in Leeds, West Yorkshire, SEP2.security EDR provides the technology and service to deliver the best Endpoint security.
-
NEXUS OPEN SYSTEMS LIMITED
Digital credentials including usernames and passwords connect your employees to critical business systems and applications, along with other online services. Compromised credentials are amongst the most valuable assets found on the Dark Web. Nexus Dark Web Monitoring and Reporting delivers real-time awareness of compromised credentials and remedial correction.
-
ULTIMA BUSINESS SOLUTIONS LTD.
Track Teams, Sites, Groups and Communities in Microsoft Office 365? We get it. Time spent searching means less time being productive.
Meet MyHub, your one-stop-shop for managing existing Microsoft 365 workspaces and creating new ones—all from Microsoft Teams or our handy web app! Organize, understand, and centrally access your assets.
-
XTRAVIRT LIMITED
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
-
SOFTCAT PLC
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
CENTERPRISE INTERNATIONAL LIMITED
WebTitan is a cloud based web filtering service which allows you to monitor, control, protect and report on your business and users from online threats.
You can create a granular policy for your users to control internet access and block malware in your organisation.
-
THELOGICALLY LTD
A threat intelligence platform that brings together Logically’s capabilities in at-scale analysis, classification and detection to help governments and organisations monitor the online media landscape for the spread of damaging activity and narratives. This includes Crisis Response, Election Integrity, Misinformation, Disinformation, On-line Harms and Influence Operations.
-
SOFTCAT PLC
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
INTEGRITY360 LIMITED
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.
-
CDW LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
Khipu Networks Limited
Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.
-
INTEGRITY360 LIMITED
Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.
-
BOXXE LIMITED
See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.
-
AUTODATA PRODUCTS LIMITED
Cloudlake Backup for Google Workspace (G Suite) protects your data from undetected deletions, corruption, and both internal and external threats. Our unique model allows you to protect, Gmail, Drive, Contacts, Calendar and Shared Drives against any event, whilst ensuring you only purchase exactly what you require with no wasted expense.
-
BYTES SOFTWARE SERVICES LIMITED
Tenable PCI ASV allows you to take an unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. bssgc
-
ishelp.co.uk Ltd
ISHelp provides a secure Internet of Things (IoT) Cloud/ICT system service via a secure digital system for the management, tracking and conditional monitoring of assets and equipment. The secure digital system delivered via a common operating picture approach provides operational understanding to enable effective decision making.
-
QUADRIS LIMITED
Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.
-
MTI TECHNOLOGY LIMITED
Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk.
Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR
-
LRQA
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Grove Information Systems
Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.
-
INTEGRITY360 LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.