-
BOXXE LIMITED
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
NTT DATA Business Solutions (UK) Limited
UI data protection provides configurable options to increase data security through comprehensive and consistent logging of all data displayed to and entered by users in SAP S/4HANA. Data protection masking provides configurable options to increase data security in the platform-specific environments of SAP software, masking sensitive values in screen fields.
-
MONDAS CONSULTING LTD
Purchase Cybereason EDR licences to utilise the power of the Cybereason Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Cybereason EDR for signs of malicious activity on your network.
-
Computacenter (UK) Ltd
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
Barrier Networks
Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.
-
CYBERIAM HOLDINGS LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.
-
CYBEXER TECHNOLOGIES
The platform delivers a private or hybrid cloud-based, scalable cyber warfare simulations, enabling organizations to train in realistic cyber threat environments. This platform offers accessible, cost-effective training solutions that are ideal for enhancing cyber readiness across various sectors through a user-friendly, adaptable training environment.
-
Basis Technologies International Limited
ActiveControl lets companies deliver SAP change with less effort and risk, in a fraction of the normal time, so that SAP systems can more effectively provide what the business needs. It transforms management of even the most traditional SAP systems, dramatically reducing expensive outages and downtime.
-
BASEEL PARTNERS LLP
Baseel Partners LLP can offer various products in the areas of risk management, security, IT Management, business process, IT governance, and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS.
-
SOFTCAT PLC
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
-
Barrier Networks
VM or SaaS based, FortiMail platform offers a security solution for onpremise and hosted email such as Office365. The Standard solution offers Antispam, Malware and zero-day protection, Virus Outbreak Protection, DLP, Identity Based Encryption, Archiving. The Advanced solution includes Sandbox, CDR, URL Click and Business Email Compromise protection.
-
MetaCompliance Ltd
MetaCompliance Security Awareness Premium Plus Multi Language helps raise awareness of cyber threats, reduce the risks associated with attacks, and embed a culture of security compliance. Organisations can automate their annual security awareness program and deliver 12 months of awareness activities that engage employees to uphold best practice behaviours.
-
PHOENIX SOFTWARE LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
REGRISK TECHNOLOGY LIMITED
To provide an online platform to build, maintain, manage and share risk assessment matrices for health & safety, educational, financial, cybersecurity and many other business verticals.
-
ITHQ LTD
The cloud SIEM for faster detection and response of incidents.
InsightIDR provides immediate and accurate detection and reduces the time to respond to attacks by combining behavioural analytics, threat intelligence, and automation in a scalable, easy to love solution that boasts the fastest deployment times in the industry.
-
MTI TECHNOLOGY LIMITED
MTI understand the pace at which data and information is growing, and are able to provide the critical, flexible infrastructure information services required to manage the data collected.
Our expertise can help organisations within the information service industry to adapt their strategy to meet the market demand they currently face.
-
SOFTCAT PLC
It enables user to subscribe and use the service as SaaS application. This will help users to analyze permissions on SharePoint Online server objects.
-
IDEAGEN TECHNOLOGY LIMITED
Ideagen Risk Management is a modern, SaaS system for managing risk and performance. Because it maps to your organizational structure, data from across all units is connected in an intelligent way. Users enjoy instant access to live data, with visual and engaging reporting tools for all stakeholder groups.
-
SOFTCAT PLC
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
NEXUS OPEN SYSTEMS LIMITED
Digital credentials including usernames and passwords connect your employees to critical business systems and applications, along with other online services. Compromised credentials are amongst the most valuable assets found on the Dark Web. Nexus Dark Web Monitoring and Reporting delivers real-time awareness of compromised credentials and remedial correction.
-
XTRAVIRT LIMITED
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
-
CENTERPRISE INTERNATIONAL LIMITED
WebTitan is a cloud based web filtering service which allows you to monitor, control, protect and report on your business and users from online threats.
You can create a granular policy for your users to control internet access and block malware in your organisation.
-
THELOGICALLY LTD
A threat intelligence platform that brings together Logically’s capabilities in at-scale analysis, classification and detection to help governments and organisations monitor the online media landscape for the spread of damaging activity and narratives. This includes Crisis Response, Election Integrity, Misinformation, Disinformation, On-line Harms and Influence Operations.
-
SOFTCAT PLC
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
INTEGRITY360 LIMITED
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.
-
Atlas Cloud Ltd
Microsoft 365 Teams Phone allows you to replace your existing VoIP system with features directly delivered from Microsoft 365. Calls between users within your organization are handled internally, removing long-distance costs on internal calls. It’s like having a digital phone system integrated seamlessly with your collaboration tools.
-
CDW LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
Khipu Networks Limited
Rubrik provides a zero-trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, Incident containment and Orchestrated Application Recovery all within a single management plane.
-
INTEGRITY360 LIMITED
Sophos Intercept X is the industry’s only X/MDR solution that synchronizes native endpoint, server, firewall, email, cloud, and O365 security. Get a holistic view of your organization’s environment with the richest data set and deep analysis for threat detection, investigation, and response for both dedicated SOC teams and IT admins.
-
BOXXE LIMITED
See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.