-
SAPPHIRE TECHNOLOGIES LIMITED
Web Application and API protection. Deep application contextual analysis, it eliminates the tradeoff between the level of security and the complexity of managing application security. Whether your application is hosted in a data center or in a public/private cloud, decision engine covers, OWASP top ten attacks, API attacks and Bots
-
ARMADILLO SEC LTD
SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.
-
Cyberlab
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
Computacenter (UK) Ltd
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.
-
Lloyds Ventures
CyberForceHQ.com: Skills speak louder than words. CyberForce utilizes a science-backed methodology in cyber security skill assessment, developing and validating its tests with input from cyber security experts. These assessments are constructed around established cyber security skill frameworks and have been independently verified for predictive accuracy.
-
CDW LIMITED
Easily create and manage team-focused and project-focused sites for collaboration. In addition, you can deploy an organisation-wide intranet portal to disseminate information and news across the organization. Use it as a secure place to store, organize, share, and access information from almost any device via a browser.
-
SOFTCAT PLC
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
BYTES SOFTWARE SERVICES LIMITED
Mimecast Awareness Training is a security awareness
training and cyber risk management platform that
helps you combat information security breaches
caused by employee mistakes. bssgc
-
SOLOPROTECT LIMITED
Personal Safety Management service providing peace of mind for lone workers by providing access to a 24/7 monitoring centre at the push of a button from an App or dedicated device (ID or fob).
Operators are listening immediately with ability to escalate to emergency services faster than a 999 call.
-
Charterhouse Voice & Data
Part of Rapid7's suite.
Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.
-
COGNITAS GLOBAL LIMITED
View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising
-
METERIAN LTD
Meterian security suite for enterprise applications continuously protects against vulnerabilities in open source components, stability and licensing risks, while validating the underlying digital infrastructure. Thanks to its unique ingestion algorithms, Meterian ensures unparalleled coverage and precision.
-
JBi Digital
JBi Digital has years of experience designing and developing both online and offline mobile applications.
JBI’s user-focused (UX) applications are built securely using industry best practices. The result is an intuitive, engaging and seamless mobile app that supports your goals and caters to your users’ specific needs.
-
PHOENIX SOFTWARE LIMITED
CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection
-
Computacenter (UK) Ltd
IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.
-
Focus Group
Focus Group are a Tier-1 Cloud Solutions Provider (CSP) allowing your organisation to benefit from license consultancy, procurement of services such as M365 licenses, Microsoft software licenses and Azure subscriptions as well as support, underpinning these services by leveraging Microsoft Premier Support.
-
VE3 GLOBAL LTD
Quickly find relevant data and respond efficiently for a variety of requests including litigations, investigations, and privacy regulations
-
CYBIT LIMITED
F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.
-
BYTES SOFTWARE SERVICES LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization. bssgc
-
Wavenet
Wavenet's visibility solutions transform network monitoring, offering full insight into traffic across physical, virtual, and cloud environments. This reduces costs and labour in managing hybrid networks. Efficient traffic processing enhances monitoring and security data distribution, ensuring comprehensive coverage and consistent monitoring, optimising outcomes while minimising expenses.
-
INTEGRITY360 LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more. bssgc
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.
-
SOFTCAT PLC
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
SOFTCAT PLC
Sophos offers seamless integration with a broad, open ecosystem of technology partners to deliver superior cybersecurity outcomes.
-
INTEGRITY360 LIMITED
Galaxkey Enterprise Cloud Plus - Hybrid provides pure end-to-end Email encryption, file
encryption, Secure Workspace collaboration and Digital Document Signing. All based
on CPA certified encryption through the NCSC. Features: email revocation,
classification, notifications, geofencing, digital signatures, secure collaboration and file
sharing capabilities. Centrally managed with complete white labelling capabilities
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Tufin Enterprise elevates your network security program to a highly evolved state, in which, network and cloud security processes are integrated, policy is managed and implemented via zero-touch automation, and everything is administered via a central control plane that delivers unmatched scalability and extensibility
-
VIEWDECK ENGINEERING LIMITED
Secure Open Source Security platform, providing agent/syslog based Endpoint Security, Threat Intelligence, Security Operations and Cloud Security as a Service. Deploy to Secure Public, Sovereign and Private cloud environments. Unified XDR and SIEM protection for endpoints and cloud workloads. Consolidate your logs, events and compliance into one place.
-
Red Sift Ltd
Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action. bssgc