-
I-NET SOFTWARE SOLUTIONS LTD
This 2 day training for product owners and stake holders help in understand agile software development and importance of their value to the project. This training also covers the GDS standards and importance of it so that they will ensure the development team is adhere them
-
TECHNOLOGY SERVICES GROUP
TSG and Datto provides an industry-leading hybrid on-premise & cloud backup & DR solution. This technology provides localised granular data backup and recovery, with a secondary cloud backup.
This allows you to locally recover servers on the appliance or to recover your servers in the Datto cloud in a disaster.
-
GET SWARMS LIMITED
Penetration Testing Solution offered by Get Swarms provides comprehensive assessments to bolster organisation security. By simulating real-world cyber-attacks, we uncover vulnerabilities in networks and applications, enabling proactive defense measures. Detailed reports are produced together with proposed remediations to support ongoing cyber defence strategy.
-
Gradian Systems Ltd
Quickly gain full visibility and context for your data, whether in motion or at rest, across on-premises and cloud environments. Enhanced by the power of our customisable, accurate, and explainable AI Mesh, this is a game-changer for security in Generative AI usage and governance.
-
ZENZERO SOLUTIONS LIMITED
Comprehensive vulnerability scanning including internal, external, network, application, compliance and agent-based scanning. Powered by Qualys, our scanning provides continuous assurance, identifies potential security weaknesses and threats across assets and provide actionable remediation advice.
-
Planet IT
Expert-Led Threat Response
Sophos Managed Threat Response (MTR) provides 24/7 threat hunting,
detection, and response capabilities delivered by an expert team as a
fully-managed service.
-
CDW LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
LEFKE IT LIMITED
LefkeIT specializes in Agile Tooling Assessment and Implementation for Government Departments. Our expert consultants assess needs and recommend and deploy the most suitable Agile tools like Jira or Trello. With tailored setups, we enhance collaboration and efficiency. Trust us for reliable Agile Tooling solutions that optimize project management.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house. bssgc
-
Glemnet Ltd
Office 365 Security Monitoring is a managed security product
that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance. bssgc
-
PHOENIX SOFTWARE LIMITED
XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
SVL Business Solutions Ltd
Adepsi is a legacy data solution that imports and stores audio and meta-data from various different voice recording platforms, providing replay functionality on a simplified, supportable platform running on a highly resilient AWS infrastructure. Once imported, the source legacy platform can be decommissioned and all data is safe and searchable.
-
LEFKE IT LIMITED
LefkeIT specializes in Change Management and Impact Assessment. Our expert team evaluates proposed changes thoroughly, identifying potential impacts on processes, systems, and stakeholders. Through strategic planning and stakeholder engagement, we minimize disruptions and ensure smooth transitions, maximizing the success of change initiatives. Trust us to navigate change effectively.
-
DIEGESIS LIMITED
Guardium Insights DSPM allows you uncover hidden data, analyse data flows and identify data security vulnerabilities. Get a 360 degree view of all your sensitive data in cloud by discovering shadow data, analysing flow of data and uncovering posture vulnerabilities.
-
SOFTCAT PLC
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
BOXXE LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
Xalient Holdings Limited
By providing secure access to the internet, cloud services, and private apps regardless of the user's location, SSE is a single-vendor, cloud-centric integrated solution that speeds up digital transformation. Threat detection and response, platform support, and setup are all included in the service. Xalient utilises: Netscope, HPE Aruba, and Zscaler.
-
BYTES SOFTWARE SERVICES LIMITED
World-leading cyber-threat detection and real-time visibility in the Cloud. Compatible with all major Cloud providers (including AWS, Google Cloud and Microsoft Azure). The service uses self-learning technology to detect threats and anomalous behaviours. Fully configurable, it allows organisations to monitor all or selected Cloud traffic, with minimal performance impact. bssgc
-
CM Security Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our
cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and
detects advanced threats with AI-powered automation.
-
Infosec Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
PHOENIX SOFTWARE LIMITED
VMware Workspace ONE Assist is a real-time
remote support solution that enables IT and help
desk staff to quickly assist employees with mobile
and laptop device tasks or issues, decreasing
downtime, maximizing productivity, and improving
the overall employee experience.
-
OpenSky Data Systems
OpenSky's "Data Governance & Security as a Service" leverages Microsoft Purview to provide comprehensive data protection, governance, and compliance across your multicloud and hybrid data estate. Our experts help you discover, understand, and secure your data, mitigate risks, and simplify compliance through a unified, AI-powered platform.
-
MTI TECHNOLOGY LIMITED
MTI Managed SIEM (Security Information and Event Management) provides a centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, with SC Cleared analysts, is fully integrated with Alien Vault's market leading technology and offers 24*7*365 assurance to your business.
-
GAMMA NETWORK SOLUTIONS LIMITED
Identify and prioritise vulnerabilities based on risk to your business. Managed in the cloud.
-
BYTES SOFTWARE SERVICES LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Tenable Vulnerability Management, Tenable Web App Scanning, Tenable Cloud Security, Tenable Identity Exposure, Tenable Lumin & Exposure View & Asset Inventory bssgc
-
CIVICO LIMITED
Civico is a unified hybrid committee meeting and decision management plugin framework, that links and integrates a comprehensive suite of cloud software meeting management applications. Your Cloud services, meeting management software, and on-premises installed audiovisual systems, are seamlessly networked together so you have a single compete committee meeting system.
-
CDW LIMITED
Microsoft Copilot for Service is an AI-powered productivity tool that integrates with existing CRM solutions. Using AI to enhance customer experiences and boost productivity. By seamlessly working alongside popular Microsoft 365 apps like Word, Excel, PowerPoint, Outlook, and Teams, to provide real-time intelligent assistance to enhance creativity and productivity.
-
TRUSTMARQUE SOLUTIONS LIMITED
A range of cloud-based security service products that deliver secure access to cloud applications and resources, simplifying security management and protecting user against advanced threats.
-
SOFTCAT PLC
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.