-
NETWORK INTEGRATION TECHNOLOGIES LTD
OPSWAT's MD-Core consists of Multiscannng, Deep CDR, Filescan (Sandbox), DLP, File Based Vulnerability, Software Supply Chain for the protection against malware threats. OPSWAT has complimentary products and features such as Managed File Transfer (aka Vault), Diode Technology (CDS, IDG), and an umber of Access and IOT Solutions.
-
Fusion Business Solutions (UK) Limited
BMC Helix iPaaS is a powerful iPaaS platform offering (by Jitterbit) to help enable a broad set of integrations between BMC products and 3rd party solutions and sources. In addition to connectors, the platform includes a simplified UI, graphical mapping, transformational capabilities, routing, orchestration, operational monitoring and management.
-
Meritec Limited
Digital end-to-end fulfilment of one specific process built on our Low-Code Digital Platform, meaning this process can adapt over-time with your organisational needs. This module can be applied across a variety of use cases to automate, schedule and action a variety of tasks. Business rules engine combines with system integration.
-
Cyberlab
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Cloud Security Posture Management, part of the CloudGuard Cloud Native Security platform, automates governance across multi-cloud assets and services including visualization and assessment of security posture, misconfiguration detection, and enforcement of security best practices and compliance frameworks. bssgc
-
APROBRIUM LIMITED
Lexacom Echo is a cloud based speech recognition application. It enables the accurate and efficient entry of information onto the computer using voice. Lexacom Echo improves the quality of notes, boosts productivity, and saves time.
-
BOXXE LIMITED
EJBCA PKI for Enterprises - A powerful and flexible certificate issuance and management system to issue and enable full life-cycle control of digital certificate and Certificate (CA), Registration (RA) and Validation Authorities (VA); enabling multiple use cases and standards compliance
-
Kick ICT
We offer UK business telephone systems that will improve your business communications, including set up of telecom systems, VoIP, business landlines and call recording solutions from vendors including 3CX, Horizon, Avaya and Microsoft Teams Phone.
-
IDOX SOFTWARE LTD
Voyager delivers a holistic view of the transport network to the public via mobile and desktop, SMS, kiosks, broadcast screens, social media, mobile web phone apps and on and off street displays. All outputs provide accessibility information and meet the required standards for the blind and partially sighted.
-
PRINT IMAGE NETWORK LTD (Trading as UK Engage)
Our secure online voting solution is used for board, council/committee elections, referendums, polls or AGMs. It’s easy to use and flexible. With voter encryption & multi-factor authentication, our solution makes it easy undertaking ballots. Our system can be branded with a client’s logo, colour scheme and imagery to increase engagement.
-
SPINWELL GLOBAL LIMITED
A "NO CODE" Enterprise Integration Platform that;
Is configured by Analysts. No software development, 100% NO CODE
Is Singularly Versatile and Flexible across industries i.e., industry agnostic
Is Secure and sits within clients physical & technical boundaries
Is to HALVE the Time to Market and the Cost of integrating systems.
-
SAPPHIRE TECHNOLOGIES LIMITED
Criminals often impersonate an organisation and many citizens aren't aware that .gov.uk is the norm for public sector organisations. This service monitors for similar web sites using non authorised domains and provided optional take down services
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions offers Chrome - Pear Deck, an interactive presentation tool that enhances classroom engagement. It allows educators to create dynamic slides with formative assessments and real-time student feedback, improving participation and understanding in educational settings.
-
SOFTCAT PLC
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
NG Bailey IT Services Limited
NG Baileys cloud WiFi solution is built around offering Cloud Managed WiFi Services
We can offer a simple and secure solution that is cost-effective and allows for the delivery, management and monitoring of wireless networks
Working with Leading vendors such as: Meraki, Cisco and HPE Aruba
-
Inform Communications Ltd
Engage Automation and Digital Transformation enhances public sector efficiency through advanced AI, CRM, data analytics, and digital communication tools including chatbots and voice assistants. Our digital strategy improves profitability, unlocks additional revenue solutions, streamlines operations and ensures compliance with robust security measures, significantly reducing overheads and improving service delivery.
-
BROOKCOURT SOLUTIONS LIMITED
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. They enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
4 DATA SOLUTIONS LIMITED
CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.
-
HANDD Business Solutions
Fortra's Classifier Suite FCS (Boldon James) allows you to organise and label data according to sensitivity and importance, across platforms and devices. Protect sensitive information by assigning persistent metadata labels like "Confidential" or "Public", alongside rich context labels. FCS aids in enforcing data security policies and ensures compliance with regulations.
-
ROCKTIME LIMITED
Providing gazetteer custodians a simple method to upload and access property address (LLPG) and local street gazetteer (LSG) data.
A cloud-based solution for gazetteer data import via an automated FTP file to destination service or collection from location service.
An API enables access to data reducing charges and streamlining processes.
-
BYTES SOFTWARE SERVICES LIMITED
Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy. Powered by a data processing engine purpose-built for IT and Security, Cribl’s product suite is a vendor-agnostic data management solution. bssgc
-
DEF Software Limited
MasterGov Appeals is a standalone module to manage the full life cycle of Planning and Enforcement appeals. With full integration with Planning and Enforcement modules this module makes management of the appeal process quick and efficient. In both scenarios data can be automatically copied from source records to save errors.
-
Jigsaw24
Supporting your remote workflows, LucidLink presents cloud storage as if it were local. LucidLink removes the need to install hardware into your environment, allows for always-on data access to cloud stored assets, and supports global collaboration in real time; all protected by secure end to end encryption.
-
BYTES SOFTWARE SERVICES LIMITED
Microsoft 365 E5 Compliance offers comprehensive solutions for managing data risks and regulatory requirements. Safeguard sensitive data across clouds, applications, and endpoints, identify ,remediate critical risks . Additionally, Microsoft Purview, included with an E5 license, provides unified data governance capabilities, including data-loss prevention, compliance management and insider risk management. bssgc
-
Immersive Labs
True resilience requires people and teams work together. With a seamless and tailored experience for individuals, teams, and organization, we provide unmatched cybersecurity exercises and training, along with data-driven insights and guidance to improve resilience.
Immersive provides enterprise-class scale, security, reliability, and integrations for the world's largest organizations.
-
AVOCO SECURE LIMITED
Avoco’s Orchestration and Decisioning Engine (ODE) is the technology behind Trust&Assure, a service that connects government services to Open Banking data, eWallets, CIFAS and other data sources, to deliver assured identity. Trust&Assure connects to your identity service to provide the data, verification, and deepfake checks to deliver secure services.
-
FULLPROXY LIMITED
Penetration testing is a vital first line of defence for anyone managing a website. It replicates the actions a hacker would take to try to penetrate your cyber defences and shows you where the vulnerabilities lie. FullProxy provide a range of advanced and affordable options from one-off to continuous testing.
-
Verint Systems Inc.
Verint Application Visualizer ™ is an innovative, cloud-based, desktop analytics solution that provides contact center leadership and staff with visibility into employee desktop activity. Its rapid deployment model means that in a matter of weeks, you can have real-time, objective data to help manage and provide feedback
-
Bright Cyber (Voodoo technology LTD)
Recorded Future is the world's most comprehensive independent threat intelligence cloud platform. This service enables organizations to identify and mitigate threats across cyber, supply chain, physical, and fraud domains with real-time, unbiased, and actionable intelligence. Options include integration with Tidal Cyber for heat mapping threat with defensive controls.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Falcon MDR licences to utilise the power of the Crowdstrike Falcon Complete MDR tool to protect your endpoints from Cyber Security threats. Receive 24x7 monitoring and response services from a team of Crowdstrike experts searching for signs of malicious activity on your network.