-
MERITEC LIMITED
A fully UK hosted SaaS web portal deployed across a range of use cases. Allows customer secure registration, access to essential information from multiple data sources including back-office systems, and transactional services. Centre your digital transformation, digital first and channel shift programme around a mobile responsive portal.
-
CENTRAL NETWORKS AND TECHNOLOGIES LIMITED
Barracuda Email Protection provides the most comprehensive protection against all 13 email threat types, from spam and ransomware to socially engineered threats such as spear phishing, business email compromise, and account takeover.
-
CDW LIMITED
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
SAPPHIRE TECHNOLOGIES LIMITED
Forcepoint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and. Information assurance restrictions on using the Cloud.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Lease Extension Solutions streamline the lease extension process for tenants and property owners in housing communities. Our platform automates administrative tasks, facilitates communication between parties, and ensures compliance with lease extension regulations, resulting in faster and more transparent transactions.
-
KONSOLUTE LTD
Implement a robust ISO Certified Quality Management System (QMS) with our solution tailored for Microsoft 365. Manage, track, and audit your organisation's compliance and standards efficiently, enhancing quality management practices across your business operations.
-
MACS EU LIMITED
Computer Aided Facilities Management (CAFM) with IBM-Maximo, Enterprise Asset Management Software including; Predictive Lifecycle Management, Energy and Utilities, Inspection and Audit, Inventory Management, Remote Monitoring (IOT), Mobile EAM, Building Information Modelling (BIM). These we provide as both and on premise or as a securely hosted Software as a Service (SaaS).
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Data Strategy and Maturity Assessment (DMA) Service outlines a strategic approach to leverage information assets in line with organisational goals. Conducted through DAMA or Central Digital & Data Office (CDDO), the DMA evaluates current capabilities and provides actionable insights. A roadmap guides improvements in governance, architecture, BI, MDM.
-
SKYFLO DIGITAL LTD
MuleSoft’s Anypoint Platform, a leading solution for API-led connectivity, creates an application network of apps, data, and devices, on-premise and in the cloud – empowering IT and business to create seamless digital experiences, products, and services with the #1 hybrid platform for integration, full lifecycle API management, and automation. SFDCMSX2024GC14
-
BYTES SOFTWARE SERVICES LIMITED
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivaled security and operational efficiency. bssgc
-
MTI TECHNOLOGY LIMITED
Delinea Secret Server Cloud is an online password manager hosted in Azure, a highly secure and available platform. Secret Server has layers of built-in security with easy access management for IT admins, robust segregation of role based duties, AES 256 bit encryption, 60+ out-of-the box reports to demonstrate compliance.
-
PRIMESYS LTD
Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, anytime, anywhere, providing security inspection and policy enforcement in the cloud, at branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access (ZTNA), Firewall-as-a-Service, web security, fully-integrated office connectivity with Secure SD-WAN.
-
BROOKCOURT SOLUTIONS LIMITED
Engage your end users and arm them against real-world cyber attacks, using personalized cybersecurity training based on our industry-leading threat intelligence.
-
Grove Information Systems
CyberCyte EAR is a Blue Team Platform for discovering and responding to threats and risks more accurately by creating a consolidated analysis framework integrating asset, threat, hardening baseline, and vulnerability information.
-
INFORMU SOLUTIONS LIMITED
The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.
-
SOFTCAT PLC
Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. Providing Wiz Code, Wiz Sensor and Wiz Premium Support
-
2T SECURITY LTD
Evolve delivers on-demand specialist security capabilities that augment your teams, build security capabilities into your business, and maximize security budgets delivering greater coverage and improved security posture of your business.
This removes the need to hire additional employees, enabling your existing team to focus their time on strategic security activities.
-
INTEGRITY360 LIMITED
Netwrix Recovery for ActiveDirectory helps organizations avoid security breaches and business disruptions by enabling
administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime.
This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects
(GPOs), and more
-
BARRIER NETWORKS LIMITED
MetaDefender is used by organizations that require the highest level of security, including critical infrastructure, government agencies, and financial institutions, to enable a secure way to get files in and out of an organization, and prevent cyber security threats.
-
IPLICIT LIMITED
iplicit empowers nonprofits and charities to simplify compliance, enhance transparency, and optimise financial operations.
Its robust handling of complex funding structures and seamless integration capabilities make it an excellent choice for organisations focused on maximising efficiency and seeking to dedicate more resources to mission-critical activities.
-
ARCUS GLOBAL LIMITED
Arcus Trading Standards is a flexible and intuitive cloud-based solution helping Trading Standard's practitioners manage all aspects of their work including inspections, investigations, monitoring, enforcement, providing advice, and managing evidence. The included mobile app supports full access and offline remote working. Enabling officers and teams to work efficiently and effectively.
-
NETWORK 2 SUPPLIES LIMITED
N2S are the leaders in pursuit of zero waste technology, delivering a disposal service that consistently returns technology waste to maximum re-use. We can offer secure collection bins for use in data centre environments. These are then transported to N2S where the data is cleansed and the drives destroyed.
-
CDW LIMITED
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
Intercity Technology Limited
Intercity’s Managed Azure Virtual Desktop is a secure, scalable virtual desktop solution. It enables access to Windows desktops and applications from anywhere, on any device with centralised management and automated updates. Improving productivity and flexibility while reducing IT overhead. Ideal for organisations embracing remote work and cloud-based desktop solutions.
-
BOOMALERT LIMITED
BoomAlert automates incident communication. Build bespoke communication workflows, meet requirements for critical events. Alerting workflows automate coordinated processes based on responses, time triggers, count triggers and escalation paths. Critical Alerting, Incident Management, Business Continuity, IT Monitoring, Machine-2-Machine Alerting, Event Management.
ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited.
-
ADAPPT LIMITED
Progressive software development services at Adappt. We develop robust, scalable and secured web/mobile applications. Share your ideas, taking your business on a success flight! Offload manual data input and repetitive tasks to AI for accurate/speedy results. Enables employees to concentrate on value-driven work, enhancing throughput and minimizing human errors.
-
Chess CyberSecurity Ltd t/a CyberLab
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
BEYOND HOLDINGS LIMITED
Wonde’s innovative School Edusync is a Electronic document and records management (EDRM) tool that provides a secure and automated way to provision school Learning Management Systems (LMSs) such as Google-Workspace, Microsoft-SDS, and Apple School Manager with data from a schools MIS, automatically creating, updating and deleting users, groups and classrooms.
-
BROOKCOURT SOLUTIONS LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.