-
INTEGRITY360 LIMITED
Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.
-
JBi Digital
We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services.
We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.
-
BYTES SOFTWARE SERVICES LIMITED
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc
-
CDW LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
MONDAS CONSULTING LTD
Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.
-
BOXXE LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
APPLIED NETWORK SOLUTIONS LIMITED
247lib.com is a complete web library asset and online resource management system. 247lib.com allows you to implement dynamic content websites, discovery portals, enquiry management, social media management, acquisitions management, mobile library and public library management systems. All applications are backed by full training, migration, implementation and support services.
-
SCG CORPORATE LIMITED
Office 365 Security Monitoring is a managed security product
that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.
-
CHARTERHOUSE VOICE & DATA LIMITED
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
GMO GLOBALSIGN LIMITED
GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.
-
CANTIUM BUSINESS SOLUTIONS LIMITED
EIS (the trading arm of Cantium Business Solutions) provides BitWarden to help secure passwords, passkeys and sensitive information. Specialising in aiding with all aspects of BitWarden, we collaborate with the complete application suite within BitWarden's portfolio, addressing business obstacles, enhancing workflows, increasing efficiency and minimising costs.
-
SOFTCAT PLC
An add-on to Tenable Vulnerability Management.
Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.
-
COMPUTACENTER (UK) LIMITED
Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
JISC SERVICES LIMITED
The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.
-
COMPUTACENTER (UK) LIMITED
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
PHOENIX SOFTWARE LIMITED
Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption
-
WR LOGIC LIMITED
Integration of Microsoft Power Platform applications with public-sector systems and third-party services through custom APIs. Ensuring smooth data flow and integrity, enhancing low-code/no-code apps on PowerApps, Power Automate, and Power BI. Leveraging advanced API techniques and Microsoft's secure cloud, optimising connectivity and functionality for improved service delivery and operational efficiency.
-
OGEL IT LTD
Quest On Demand is a secure, Azure-hosted SaaS management platform to help IT teams, partners and MSPs move faster, tighten security and stay in control of hybrid Office 365 environments. Migrate, manage, report, secure and recover all hybrid AD and Office 365 workloads across all tenants from a single dashboard.
-
E2E-ASSURE LIMITED
A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.
-
SOMERFORD ASSOCIATES LIMITED
Lacework offers automated anomaly detection providing consistent visibility, context, and security across cloud environments, providing customers with the ability to detect attack activity stemming from known and unknown threats. Lacework uses data and automation facilitating the security of multi-cloud environments, helping customers prioritise risk, so they can innovate with confidence.
-
CHESS ICT LIMITED
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
ARX PARTNERS LIMITED
Citadel, is a highly secure, customisable enterprise-wide Audit, Survey, Accreditation and Compliance tool that assesses and evidences any area of risk in a consistent and scalable manner. An integrated risk register enables risks to be monitored, tolerated or mitigated. Live threat or risk-related data can be integrated through APIs.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike EDR licences to utilise the power of the Crowdstrike Falcon Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Crowdstrike EDR for signs of malicious activity on your network.
-
Grove Information Systems
Powered by industry-leading AI, the Enterprise Immune System is a self-learning cyber defense platform capable of detecting and responding to cyber-attacks in real-time. Requiring no set-up, the technology is relied on by organisations to protect their entire digital enterprise, including the cloud, virtualised environments, SaaS applications, and industrial control systems.
-
SPINDOGS LTD
Development of mobile optimised, accessible Wordpress content management system websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.
-
PHOENIX SOFTWARE LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CDW LIMITED
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
GRADIAN SYSTEMS LTD
Valimail Monitor provides DMARC visbility and monitoring while automatically identifying all third party cloud services sending mail on behalf of the government organisation. FedRAMP-authorized DMARC anti-phishing solution that provides an authoritative approach to eliminating deception-based email attacks, including BEC.
-
TMC3 LIMITED
Veracode is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Dynamic Analysis engine crawls and audits hundreds of target applications simultaneously, improving performance and time to results. SaaS platform helps automate security feedback and aligns with development technologies, providing secure software, faster.
-
KAINOS WORKSMART LIMITED
Pinpoint, manage and reduce the risk of fraud, breach, or human error. Exclusively designed for Workday, Smart Audit enables customers to define, modify and execute automated audit checks against Workday tenants, strengthening security controls and enabling risk mitigation across their Workday ecosystem – lowering risk, costs and protecting your reputation.