-
XPERTEX LTD
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.
-
Digidentity B.V.
Digidentity's Digital Wallets service empowers organisations to issue and host verifiable credentials (VCs) based on Self-Sovereign Identity (SSI) principles. Using decentralised technologies, our platform ensures the integrity, authenticity, and privacy of digital credentials while giving users full control over their data. Digital Wallets enable secure data sharing and access management.
-
RPOST UK LIMITED
RDocs™ is the most innovative solution for secure document sharing, offering advanced monitoring and remote-control features. Track who reads your documents, including where, when, and how often. Restrict access by geolocation, IP address, or domain, and protect against unauthorized sharing with steganographic technology. Share securely without centralized storage risks.
-
VE3 GLOBAL LTD
Implementation of Infor ERP and comprehensive work ticket and escalation protocol. Documentation of all support tasks. Clarification of business procedures/transactions within M3. Serving as a remote extension for client key users. Troubleshooting and resolving configuration issues. Addressing general table maintenance and bug fixes. Establishing or modifying business processes.
-
OUTSYSTEMS LIMITED
OutSystems provides the only open, high-productivity application platform (PaaS) that makes it easy to create, deploy and manage enterprise mobile and web applications. OutSystems platform enables rapid delivery of Mobile and Web applications for all devices utilizing responsive web design.
-
GET SWARMS LIMITED
Safeguard Your Data with Get Swarm's Key Management Solution, designed to safeguard sensitive data and streamline access control. Our service ensures the secure storage, encryption, and centralized management of cryptographic keys.Able to manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.
-
ROC TECHNOLOGIES LIMITED
Roc’s Microsoft 365 based service provides a combination of professional and managed services to migrate to and manage customer's Microsoft M365 Modern Work platform, rollout security, unified communications content and collaboration, device management, and provide health checks and best practice advice to maintain and support your cloud enabled productivity.
-
ASCENDANT SOLUTIONS LTD
Single person discount data works for any Local Authority looking for an easy and efficient way to confidently identify persons who do not qualify for Single Person Discount.
-
ULTIMA BUSINESS SOLUTIONS LTD.
Automate the provisioning, management and lifecycle of content in Office 365 with user-self-service. Manage permissions with scheduled re-certification and dispose of content when no longer needed.
-
CDW LIMITED
Empower business users by providing an easy to use solution to create and manage virtual agents/bots without having to write code. Microsoft Copilot Studio leverages the flexibility/scalability of the Power Platform with the power of AI to provide an extensible and customisable solution suitable for any customer service scenario.
-
VERINT SYSTEMS UK LIMITED
An add-on to Engagement Data Management (EDM – listed separately), the PII Redaction Bot provides redaction of Personally Identifiable Information (PII) from recordings.
-
PEGASYSTEMS LIMITED
Pega is a low-code platform for AI-powered decisioning and workflow automation. We enable organisations to get work done using apps that are secure, scalable, governed, and maintainable. We offer solutions for business process management, digital process automation, and customer/citizen engagement. Programme Intake/Client Registration is a central use case of Pega.
-
CDW LIMITED
Gain visibility into and control internal data access, identify and manage corporate policy violations (harassment, code-of-conduct, fraud) and data leakages (e.g., IP theft, confidential data, etc.) by insiders
-
BOOMERANG I-COMMS LTD
Boomcast delivers Broadcast conversational messaging, 2-way SMS, voice, and email bulk communications. Our multi-channel messaging can automatically match responses and deliver them to your email. Schedule automated messaging campaigns across individuals or dynamic groups and create inbound SMS, email, and voice campaigns. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
Rigr AI Limited
We've built an accurate AI model for Facial Age Estimation trained on a proprietary dataset. This system accurately determines the age of minors from images and is designed for law enforcement, immigration, and trust and safety measures to protect children both online and offline.
-
VouchSafe
Vouchsafe is a next-generation identity verification and fraud prevention platform.
Among other capabilities, it allows users to provide a trusted referee to vouch for their identity, in a manner certified to medium confidence under GPG45 and the Digital Identity and Attributes Trust Framework.
-
INFLUENTIAL SOFTWARE SERVICES LIMITED
Boomi is a cloud native, fully on-demand, multi-tenant, unified platform for the Connected Business. It allows customers to connect everything together: people, processes, applications, data, and devices to enable integrated engagement everywhere, across any channel, device or platform.
-
AVEPOINT UK, LTD.
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head.
Build a modern IT operation that can pivot as your digital workspace expands. Oversee Microsoft 365, Teams Phone, Power Platform, self-hosted data, and Microsoft 365 Groups all in one place.
-
Digidentity B.V.
Digidentity's KYC and AML Identity Verification service ensures that a person is who they say they are. It is designed to meet the identity verification standard for organisations that need to demonstrate AMLD compliance, or for any use case where the identity of the individual needs to be established.
-
ITogether
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Mutual Exchange Solutions facilitate seamless swaps between tenants within housing communities. Our platform streamlines the exchange process, from initial application to final approval, ensuring compliance with regulations and fostering positive outcomes for tenants seeking to relocate.
-
IMPERF CONSULTING LIMITED
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Parking Permit Management Solutions streamline the process of issuing and managing parking permits for tenants. Our platform offers efficient permit application, approval, and tracking features, ensuring seamless parking management for property managers and convenient access for tenants.
-
ROCKTIME LIMITED
Rocktime's Route Planning and Optimisation service integrates with verso™ managing vehicles and drivers to support route building to provide on-time services. Providing real-time planning of routes to manage challenges with delivery and scheduling.
-
BOOMERANG I-COMMS LTD
Boomerang’s Dynamics 365 plug-in and custome Connector provides seamless integration to Microsoft apps and Power Platform, overcoming broadcast limitations by matching activities with responses. This fosters conversational engagements, recorded in contacts’ timelines for seamless automation and stakeholder interactions. ISO-27001, CyberEssentials,Cyber Essentials Plus certifications ensure data security.
-
COMPUTACENTER (UK) LIMITED
CrowdStrike Falcon® Exposure Management is a powerful ground breaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
BARRIER NETWORKS LIMITED
Managed Security Service Edge from Barrier helps organizations provide secure connectivity for hybrid workforces, protecting corporate resources from cyberattacks and data-loss. Cisco Powered Service.
-
CDW LIMITED
M365 is an essential productivity solution millions of people use every day. With that use comes significant challenges in how you can scale your management and security of the platform.
Implement an extensible governance framework that empowers users, is easy to maintain, and scales with your organization.
-
ROCKTIME LIMITED
Rocktime's verso™ Housing Enforcement and Case Management software can be used as a stand-alone cloud platform or fully integrated, verso can be tailored to mirror and improve your internal workflows and processes across Local Authority licensing schemes.
-
SOFTCAT PLC
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.