-
HANDD Business Solutions
GoAnywhere MFTaaS (Managed File Transfer as a Service) is a cloud-based solution for secure file transfers. It offers encryption, automation, and centralised management, enabling businesses to securely exchange data across systems, partners, and platforms. It simplifies file transfer processes while ensuring compliance with data security regulations.
-
STERLING COMPUTERS CORPORATION (UK) LTD
Transform Your Data Center Backup with Druva for Hybrid Workloads. Centralize your local and remote data protection, with a single control plane to manage all your data center backup and disaster recovery needs.
Scalable, all-in-one backup, disaster recovery (DR), archival and analytics. Simplify data protection, dramatically reduce costs.
-
AVELLA SECURITY LIMITED
BLOCKPHISH delivers cloud-based Cyber Security Training and Awareness to help reduce the risk of a cyber attack on your business. As phishing and socially engineered attacks rely on exploiting human vulnerabilities, improving user behaviour is essential. Our cloud platform delivers learning in multiple formats to ensure the most effective results.
-
VE3 GLOBAL LTD
Our CSP Subscriptions for Dynamics 365 provide the subscription licensing of your Microsoft Cloud environment in a flexible and cost-effective manner.
-
PHOENIX SOFTWARE LIMITED
Microsoft Defender Experts for XDR is a managed extended detection and response (MXDR) service that combines automation and human expertise to protect across Microsoft 365. It offers proactive cyberthreat hunting, live dashboards, and continuous security improvements
-
INTEGRITY360 LIMITED
Claroty xDome spans the entire cybersecurity journey, empowering organisations with comprehensive OT (operational techncology)/ICS (Industrial Control Systems) asset visibility, identifying, measuring, prioritising risk, deploying Zero Trust-based protective controls, to optimising threat-detection through a vast network of integrations. xDome is a modular, SaaS platform that makes XIoT cybersecurity decision clear through:
-
Proact IT UK Limited
Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).
-
Transparity
Our CSP Subscriptions for Microsoft 365 provide the subscription licensing of your Microsoft Cloud environment in a flexible and cost-effective manner. We also offer proactively managed services which are offered as a chargeable add-on services, which are materially lower in cost than traditional asset and user based managed service offerings.
-
UNSUNG LIMITED
Protect the integrity of code, containers, and
software with secure code signing as a service. With Keyfactor Signum, sensitive keys are
protected, policy is automated, and signing is
integrated with your tools and build processes
-
Cyberlab
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
CYMBALSTREAM SOLUTIONS LIMITED
Cymbalstream delivers 24/7 monitoring and response software designed to detect, investigate, and mitigate cyber threats across networks, endpoints, and cloud environments. Combining advanced security technology, threat intelligence, and expert-driven workflows, our platform enables organisations to proactively hunt for threats and respond to incidents across their IT infrastructure.
-
BYTES SOFTWARE SERVICES LIMITED
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud. bssgc
-
CDW LIMITED
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
Skyguard Ltd
Using Travelsafe is just like a regular travel app with the bonus of a timed SOS alarm for the journey. Round-the-clock protection is provided whether travelling for business, commuting or meeting friends after work. Backed by expertly trained operatives, Travelsafe can get emergency help faster than calling 999.
-
Gradian Systems Ltd
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
BOXXE LIMITED
A Calling Plan is an add-on telephone service that, when combined with Phone System in Office 365, can become the voice solution for your entire organization. A Calling Plan provides people with a primary phone number and lets them make and receive phone calls.
-
I-NET SOFTWARE SOLUTIONS LTD
testing services includes mobile testing,REST,SOAP,UI,Data,System testing,I Automation testing, User acceptance testing, performance testing.Central Government departments and their agencies, Healthcare,Local Government,Defence,Education,Transport ,Criminal Justice.A Quality Assurance and Test Consultancy service that can respond to client needs for testing support as part of an overall solution providing individual on-site testing professionals and teams.
-
PHOENIX SOFTWARE LIMITED
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Salesforce Mobile App Development, tailored for government departments. Our expert developers create secure, user-friendly mobile apps to enhance government operations, citizen engagement, and data accessibility. We ensure seamless integration with Salesforce, enabling efficient on-the-go functionality for government entities and their constituents.
-
Transparity
Our Azure CSP Subscriptions provide monthly billing and services for Microsoft's Azure public cloud platform in a flexible and cost-effective manner. We also offer proactively managed services which are offered as a chargeable add-on services, which are materially lower in cost than traditional asset and user based managed service offerings.
-
Creative Networks
PaperCut is a software solution for managing printing environments efficiently. It tracks print jobs, allocates costs, manages quotas, and integrates with authentication systems. It empowers businesses to control resources, reduce waste, monitor activities, and enhance security and productivity in printing workflows.
-
Melissa Data Ltd
Mobile Service that runs advanced scans against UK & Global ID documents: Passport; Driver Licence; National ID etc, to ensure a person's identity is thoroughly authenticated and verified. Verification checks combine Facial Matching, Liveness Test, Pattern Match, Data Crosscheck, and MRZ uplift, for efficient onboarding and protection from fraudulent identities.
-
Made Purple Ltd
Purple Visits iso27001 certified secure video calling platform is a scalable, robust, and proven virtual / prison video call service with purpose built media server's, booking system's and a proprietary ai security system. Specifically designed for Prisons, Secure Hospitals and Secure Training centres where security and robustness are vital.
-
Elemendar - AI for Cyber Threat Intelligence (CTI)
Elemendar supplies READ, an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. READ makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.
-
I-NET SOFTWARE SOLUTIONS LTD
We have dedicated and more than 15 years of experience resources in developing applications with skills fullstack(angular/react). We have delivered many projects for start ups to multimillion projects in public and private sector
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
CDW LIMITED
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
BYTES SOFTWARE SERVICES LIMITED
OneTrust is the category-defining enterprise platform to operationalize trust. More than 12,000 customers, including half of the Fortune Global 500, use OneTrust to make trust a competitive differentiator, implementing central agile workflows across privacy, security, data governance, GRC, third-party risk, ethics and compliance, and ESG programs. bssgc
-
BRIDGEALL LIMITED
We provide a comprehensive 24/7 security service for Microsoft 365 and Azure. Our service includes advanced threat detection across your email, documents, and collaboration tools, with real-time protection against phishing, malware, and ransomware. Our team manages your security posture, ensuring best practices are followed and vulnerabilities are quickly addressed.
-
BOXXE LIMITED
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.