-
Henderson Scott
DevOps, CloudOps and WebOps services for Cloud users, ensuring applications are managed efficiently across the development lifecycle. Platforms: Windows, AWS, Azure, OpenStack, Linux. Tools: Splunk, Elastic Search, Chef, Puppet, Hiera, Xcat, Jenkins, Ansible, SaltStack, Git, Gradle, Travis, Mesos, Docker, Kubernetes, CoreOS, Rocket, Bamboo, VMWare, Vagrant
-
SAPPHIRE TECHNOLOGIES LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
SOFTCAT PLC
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
APPLIED NETWORK SOLUTIONS LIMITED
247lib.com is a complete web library asset and online resource management system. 247lib.com is a health library management system. 247lib.com provides discovery portals, research portals, comprehensive search and easy management of resources on all devices. All applications are backed by full training, migration, implementation and support services.
-
CYBANETIX LIMITED
Exabeam SaaS Cloud keeps security management in the cloud, providing the full breadth of Exabeam’s SIEM collection, detection, investigation and response capabilities as a cloud-based service. Exabeam SaaS includes the following product offerings:
Fusion Core,
Fusion XDR,
Fusion SIEM,
Fusion Enterprise.
-
TMC3 LIMITED
tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.
-
INTEGRITY360 LIMITED
Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised
-
BIT ZESTY LIMITED
EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity
-
CM Security Ltd
Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.
-
QUADRIS LIMITED
FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
-
Cyberlab
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
SOFTCAT PLC
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
Barrier Networks
Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.
-
PRIMESYS LTD
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving
-
CHESS ICT LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
MONDAS CONSULTING LTD
Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.
-
ZIVVER
Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.
-
COGWORX LIMITED
Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.
-
PHOENIX SOFTWARE LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
IBM UNITED KINGDOM LIMITED
Develop and deploy analytics applications using open source Apache Spark and Apache Hadoop. Customize the cluster using your own analytics libraries and open source packages. Integrate with IBM Watson Studio or third-party applications to submit jobs to the cluster.
-
CHESS ICT LIMITED
InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.
-
LRQA
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
THALES UK LIMITED
Thales Luna Cloud HSM is a cloud-based platform that provides a range of Cloud HSM and key management services through a simple online marketplace. With Cloud HSM security is made simpler, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.
-
SOFTCAT PLC
Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, incident containment and Orchestrated Application Recovery all within a single management plane.
-
CDW LIMITED
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
Prolinx Ltd
Prolinx Above Official Sensitive Collaborative Working Environment (CWE) is an assured, fully managed service including remote access, MS Office and collaboration tooling. This includes core Microsoft applications such as MS Outlook, Word, Excel, PowerPoint, OneNote, SharePoint/File Storage and a unified communications option.
-
BT PLC
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
Internet Investigation Solutions Ltd
SocialNet® captures digital tracks, maps against their aliases, and explores connections in near real time to expedite your investigations and threat analysis.
Horizon & SocialNet together has access to over 220 different open data sources throughout the internet. These include social networks, communication networks and other sites of common interest.
-
CDW LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
POSTREMO IT LIMITED
Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators