-
INTEGRITY360 LIMITED
Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised
-
BIT ZESTY LIMITED
EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity
-
CM Security Ltd
Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.
-
QUADRIS LIMITED
FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
-
Cyberlab
Sophos ZTNA is a lightweight agent that is better than remote access VPN in some circumstances, wherein it can validate users, validate devices, more secure, provide granular access with device health checks and scalable.
ZTNA allows users to securely access network resources.
It is also transparent to end users.
-
SOFTCAT PLC
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
Barrier Networks
Claroty xDome spans the entire cybersecurity journey, from empowering organisations with comprehensive OT (operational techncology) / ICS (Industrial Control Systems) asset visibility, identifying, measuring, and prioritising risk, to deploying Zero Trust-based protective controls, to optimising threat detection through a vast network of integrations. xDome is a modular SaaS platform.
-
PRIMESYS LTD
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving
-
CHESS ICT LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
MONDAS CONSULTING LTD
Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.
-
ZIVVER
Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.
-
COGWORX LIMITED
Understanding the drivers, emotions and challenges of your audience through to the practicalities of bringing a product or service to market.
-
PHOENIX SOFTWARE LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
IBM UNITED KINGDOM LIMITED
Develop and deploy analytics applications using open source Apache Spark and Apache Hadoop. Customize the cluster using your own analytics libraries and open source packages. Integrate with IBM Watson Studio or third-party applications to submit jobs to the cluster.
-
CHESS ICT LIMITED
InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.
-
LRQA
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
THALES UK LIMITED
Thales Luna Cloud HSM is a cloud-based platform that provides a range of Cloud HSM and key management services through a simple online marketplace. With Cloud HSM security is made simpler, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.
-
SOFTCAT PLC
Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, incident containment and Orchestrated Application Recovery all within a single management plane.
-
CDW LIMITED
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
Prolinx Ltd
Prolinx Above Official Sensitive Collaborative Working Environment (CWE) is an assured, fully managed service including remote access, MS Office and collaboration tooling. This includes core Microsoft applications such as MS Outlook, Word, Excel, PowerPoint, OneNote, SharePoint/File Storage and a unified communications option.
-
BT PLC
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
Internet Investigation Solutions Ltd
SocialNet® captures digital tracks, maps against their aliases, and explores connections in near real time to expedite your investigations and threat analysis.
Horizon & SocialNet together has access to over 220 different open data sources throughout the internet. These include social networks, communication networks and other sites of common interest.
-
CDW LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
POSTREMO IT LIMITED
Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators
-
Charterhouse Voice & Data
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
BYTES SOFTWARE SERVICES LIMITED
Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality. bssgc
-
iProov Limited
Dynamic Liveness delivers a multi-frame face liveness with a patented, secure, passive challenge-response for industry-leading Presentation Attack Detection (PAD), Injection Attack Detection (IAD), and mitigation of advanced threats from deepfakes and generative AI.
For lower-risk scenarios, Express Liveness delivers a near-instant multi-frame face capture with presentation and injection attack detection.
-
BYTES SOFTWARE SERVICES LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices. bssgc
-
RAZOR THORN SECURITY LTD
OneTrust offers a comprehensive suite of solutions for trust and compliance, including privacy, security, data governance, and more. With over 12,000 clients worldwide, OneTrust helps organisations operationalise trust, simplify compliance with regulations such as GDPR, and streamline workflows through automation, ensuring data protection and risk management.
-
Gradian Systems Ltd
Email Threat Detection and Response is an add-on to Symantec™ Email Security.cloud. Customers are protected from advanced malware and targeted attacks by leveraging the Global Intelligence Network, Heuristic technology, Attachment Sandboxing and protection against the weaponisation of URLs after delivery. ETDR delivers greater detail and context about the threats stopped.