-
PHOENIX SOFTWARE LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
ITogether
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
VE3 GLOBAL LTD
CloudHealth Secure State is a sophisticated security and compliance monitoring platform designed for multi-cloud environments. It aids organizations in minimizing risk and safeguarding millions of cloud resources. By quickly identifying and rectifying security violations and promoting best practices, CloudHealth Secure State ensures that your cloud infrastructure remains secure and compliant
-
BYTES SOFTWARE SERVICES LIMITED
Backup, archival, and compliance for Endpoint devices and cloud workloads. Simplify data protection, ensure regulatory compliance, eDiscovery and improve data visibility for your critical online data. bssgc
-
LRQA
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.
-
COMPUTACENTER (UK) LIMITED
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
Lloyds Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
COMPUTACENTER (UK) LIMITED
IBM Db2 Warehouse on Cloud is A fully managed, elastic, cloud data warehouse built for high-performance analytics and machine learning available on IBM Cloud and AWS. It is part of Common SQL engine across all deployment options. IBM delivers an environment designed , managed and sized to meet those needs.
-
CDW LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
COMPUTACENTER (UK) LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
FORDWAY SOLUTIONS LIMITED
Fordway offer a comprehensive range of services ensuring best use of Microsoft 365 Enterprise Subscriptions, specifically E3, E5 and F1/F3, aligned to NCSC Blueprint, we can then maintain operational management and security for the environment.
-
HENDERSON SCOTT LIMITED
DevOps, CloudOps and WebOps services for Cloud users, ensuring applications are managed efficiently across the development lifecycle. Platforms: Windows, AWS, Azure, OpenStack, Linux. Tools: Splunk, Elastic Search, Chef, Puppet, Hiera, Xcat, Jenkins, Ansible, SaltStack, Git, Gradle, Travis, Mesos, Docker, Kubernetes, CoreOS, Rocket, Bamboo, VMWare, Vagrant
-
SAPPHIRE TECHNOLOGIES LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
SOFTCAT PLC
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
APPLIED NETWORK SOLUTIONS LIMITED
247lib.com is a complete web library asset and online resource management system. 247lib.com is a health library management system. 247lib.com provides discovery portals, research portals, comprehensive search and easy management of resources on all devices. All applications are backed by full training, migration, implementation and support services.
-
CYBANETIX LIMITED
Exabeam SaaS Cloud keeps security management in the cloud, providing the full breadth of Exabeam’s SIEM collection, detection, investigation and response capabilities as a cloud-based service. Exabeam SaaS includes the following product offerings:
Fusion Core,
Fusion XDR,
Fusion SIEM,
Fusion Enterprise.
-
TMC3 LIMITED
tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.
-
INTEGRITY360 LIMITED
Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised
-
BIT ZESTY LIMITED
EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity
-
CM SECURITY LTD
Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.
-
QUADRIS LIMITED
FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
-
Chess CyberSecurity Ltd t/a CyberLab
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
SOFTCAT PLC
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BARRIER NETWORKS LIMITED
Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.
-
PRIMESYS LTD
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving
-
CHESS ICT LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
MONDAS CONSULTING LTD
Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.
-
ZIVVER LIMITED
Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.
-
COGWORX LIMITED
Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.
-
PHOENIX SOFTWARE LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.