-
Nettitude Limited
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
Softcat Limited
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
IRIS Intelligence Ltd.
IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.
-
COOLSPIRiT
Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources
-
Mydex Data Services Community Interest Company
The need for transformation to locally integrated operational services is growing. This requires integrated journeys, reducing effort and improving outcomes. Information can flow seamlessly and securely, intervention is timely, and services are more effective. The SSC allows organisations across varying sectors and regulatory environments, working together to deliver joined-up services.
-
Grey Monarch Limited
Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.
-
INTEGRITY360 LIMITED
Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.
-
CDW Limited
Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.
-
GBM DIGITAL TECHNOLOGIES LIMITED
Supporting equitable learning with iPad, Lightspeed Alert is a safety monitoring tool for schools. Utilising advanced AI, it detects concerning online behaviours such as cyberbullying, self-harm, and explicit content in real-time. Integrated with Google/Microsoft, it enables early intervention, promoting student safety with comprehensive device coverage.
-
Bright Cyber (Voodoo technology LTD)
AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.
-
CHESS ICT LIMITED
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
INTEGRITY360 LIMITED
Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.
-
Computacenter (UK) Ltd
IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.
-
Bytes Software Services
Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service.
You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications. bssgc
-
Fordway
KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage.
Enterprise-strength reporting for both training and phishing.
-
INTEGRITY360 LIMITED
Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.
-
JBi Digital
We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services.
We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.
-
Bytes Software Services
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc
-
CDW Limited
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
MONDAS CONSULTING LTD
Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.
-
BOXXE LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Office 365 Security Monitoring is a managed security product
that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.
-
Charterhouse Voice & Data
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
GMO GLOBALSIGN LIMITED
GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.
-
Cantium Business Solutions
EIS (the trading arm of Cantium Business Solutions) provides BitWarden to help secure passwords, passkeys and sensitive information. Specialising in aiding with all aspects of BitWarden, we collaborate with the complete application suite within BitWarden's portfolio, addressing business obstacles, enhancing workflows, increasing efficiency and minimising costs.
-
Softcat Limited
An add-on to Tenable Vulnerability Management.
Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.
-
Computacenter (UK) Ltd
Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
Jisc Services Ltd
The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.