-
AVELLA SECURITY LIMITED
The Guardicore Centra Security Platform allows you automatically visualise your entire data centre environment, map application dependencies and flows to identify security gaps, and create policies based on asset classification, including AI-powered templates, reducing your attack surface and minimising the risk of Ransomware
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.
-
INTEGRITY360 LIMITED
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
Barrier Networks
Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.
-
MICRO FOCUS
OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides:
• Identity Governance
• Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework
• Password Management
• Identity Intelligence Basic
-
ARMADILLO SEC LTD
Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.
-
CENTERPRISE INTERNATIONAL LIMITED
Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit
-
e2e-assure Ltd
Find vulnerabilities in your external-facing services - before attackers do.
Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.
-
CDW LIMITED
As appetites continue to grow to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft365.
AvePoint EnPower equips IT teams to pivot as needs and requirements change without worrying about what model makes sense in that moment.
-
S3 Ltd
Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.
-
ZAIZI LTD
Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions.
We provide skills and advice guiding you from discovery through to implementation.
-
Lloyds Ventures
HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.
-
AIIMI LIMITED
Insight Engine provides extensive automation to support your migration activities, whether these are simple cloud migrations or more complex content management migrations between systems such as File Shares, Cloud Storage, SharePoint, Cloud Storage or OpenText Content Server. Rules based migrations can take advantage of the extensive metadata extraction routines provided.
-
GET SWARMS LIMITED
Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.
-
PHOENIX SOFTWARE LIMITED
Unlimited comprehensive scans identify and address vulnerabilities, ensuring PCI DSS compliance. The Tenable PCI ASV process follows strict guidelines, preventing vulnerabilities on payment card transaction networks for more than 90 days. This user guide assists with navigating the entire Tenable PCI ASV process
-
SOFTCAT PLC
Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)
-
IBM UNITED KINGDOM LIMITED
IBM Watson Query allows you to query data across many systems without having to copy and replicate it, saving time and reducing costs. Watson Query queries data from its source, simplifying your analytics by providing the latest and most accurate data.
-
DO Business Services Limited
Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.
-
PHOENIX SOFTWARE LIMITED
A software-defined, immutable data protection and cyber recovery solution from Dell's PowerProtect DD series, also known as Dell Data Domain Virtual Edition - DDVE. Allows fast and flexible deployments for backup and disaster recovery solutions in cloud and hybrid environments.
-
Khipu Networks Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
2T SECURITY LTD
RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.
-
CDW LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
Prosperon Networks Ltd
SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.
-
e2e-assure Ltd
SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography
-
VIABLE DATA LTD
Experts in biometrics and security controls, Viable Data offer a range of Identity Assurance Services, covering strategy, design, development, operational support and implementation services. With digital identity industry expertise, we provide services ranging from securing digital channels to performing biographical and biometric checks, ensuring the accuracy of an identity claim.
-
Atlantic Data
Atlantic Data's Disclosures service offers organizations an online platform for processing, administering, and managing criminal record checks for staff and volunteers. This service connects directly to the DBS through its efficient eBulk service. Disclosures includes a suite of management information to support organizations in managing and overseeing these checks.
-
Barrier Networks
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.
-
INTEGRITY360 LIMITED
Proofpoint Insider Threat Management(ITM) takes a people-centric approach to protect against data loss, malicious acts and brand damage involving insiders. We defend against authorised-users acting maliciously, negligently, unknowingly. We correlate user-activity and data-movement to protect you from insider-led data-breaches. We detect risky behaviour in real-time to give evidence of wrongdoing.
-
CHESS ICT LIMITED
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
Cyberlab
SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.