-
NG Bailey IT Services Limited
NG Baileys SD-WAN Service is designed to enhance the functionality and control of traditional private IP-VPN networks.
allowing customers to make optimum use of their available bandwidth
Working with providers such as, Meraki, Cisco and HPE Aruba, Services can be integrated with Microsoft, Amazon or Google
-
Network 2 Supplies Ltd
Data destruction and disposal/recycling of legacy equipment is central to managing a system migration to Cloud. N2S offer onsite data destruction for hardware. Certificates listing hard drive serial numbers as proof of destruction are provided. All resultant waste will be disposed of in-line with the WEEE regulations.
-
Phoenix Software Ltd
XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
Infosec Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
CIVICO LIMITED
Civico is a unified hybrid committee meeting and decision management plugin framework, that links and integrates a comprehensive suite of cloud software meeting management applications. Your Cloud services, meeting management software, and on-premises installed audiovisual systems, are seamlessly networked together so you have a single compete committee meeting system.
-
Softcat Limited
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform. Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams. Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
Trustmarque Solutions Limited
The Direct Routing service enables PSTN calling and a range of additional call control features for Microsoft Teams.
It uses MS Phone System as the PBX.
It allows customers to use their preferred voice carrier and enable their users to make and receive PSTN calls in Microsoft Teams.
-
Ve3 Global Ltd
The Cloud Enterprise Mobility + Security licensing suite comprises Azure Active Directory Premium P2, Windows Server CAL, Microsoft Intune, Azure Information Protection Premium P2, Microsoft Advanced Threat Analytics, and Microsoft Cloud App Security.
-
Network 2 Supplies Ltd
N2S are specialists in large scale multi-site ICT installations, including desktops, screens, unified comms/telephony and managed print. Utilise a fleet of tracked vehicles to return equipment to headquarters for WEEE recycling or resale.
-
Creative Networks
Our Cyber Security Services offer customised protection against digital threats, encompassing threat detection, vulnerability assessments, incident response, training, compliance assistance, and consulting. Our goal is to strengthen your defences and maintain resilience amidst evolving cyber risks.
-
Idox Software Limited
Voyager delivers a holistic view of the transport network to the public via mobile and desktop, SMS, kiosks, broadcast screens, social media, mobile web phone apps and on and off street displays. All outputs provide accessibility information and meet the required standards for the blind and partially sighted.
-
PEGASUS LABS PTY LTD
When using a Protective or Filtering DNS service, these only identify which DNS queries were blocked not the source device on your local network. This service allows you to automatically track down and report on compromised devices inside your network, including IP address and device name.
-
4 DATA SOLUTIONS LIMITED
CleanINTERNET® is an intelligence-powered security solution that leverages the world's most comprehensive Threat Intelligence (TI) database combined with a team of TI operatives to provide an unprecedented level of protection at the perimeter. An order of magnitude faster than NGFWs, CLEANInternet is essential as part of your Secure Boundary strategy.
-
CYBIT LIMITED
F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.
-
Red Sift Ltd
Continuous automated discovery of Internet and Cloud assets, with comprehensive monitoring and coverage of network and security standards. Special focus on subdomain takeover protection. Covered standards include WHOIS/RDAP, DNS, DNSSEC, SMTP, SPF, DMARC, MTA-STS, SSL, TLS, PKI, HTTP, web application security, CSP, HSTS, CAA, security headers, technologies.
-
Idox Software Limited
Modular UTMC, network control system. Provides an integrated view of traffic and travel information, integrating all data adaptors into a single data model which ensures Strategy Manager can automatically intervene to manage congestion and improve all different network targets. See Service Definition for modules available.
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
MASS Consultants Ltd
MASS has decades of experience and a proven track record delivering IT and data solutions via our Digital Services Group. We offer expertise, value for money and high quality service in all elements of IT and data provision, including but not limited to Computer and application hosting, Datamining, analysis tools.
-
Barrier Networks
Leveraging Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide Area Networking (SD-WAN) and Software Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
Phoenix Software Ltd
iboss is a Zero Trust Edge. iboss utilises a containerised cloud architecture allowing customers to easily migrate from legacy appliances, maintaining 100% dedicated IP address space in the cloud. Allowing for PDNS intergration, admin created GDPR Zones with dedicated UK datacentres. Packages include Core Filtering, Malware detection, Data Loss Prevention
-
Nine23
UK Sovereign managed Cloud service for effective Multi-Factor Authentication (MFA). Protects your applications by using a second source of validation, like a phone or token, to verify user identity before granting access. OKTA provides simple, streamlined login experience for every user and application, it integrates easily with your existing technology.
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
JEDEX Ltd
Dev-ops support for cloud services, including management, maintenance and monitoring to meet the needs of the service. Providing support for web application stacks across multiple languages and frameworks. We evaluate performance across technical, metrics, process and culture and create strategies, roadmaps and delivery support for successful implementation of DevOps
-
Origin8tive Ltd
Origin8tive's Cloud Packet Broker enables distributing network traffic across multiple appliances, vital for complex cloud networks requiring various analytical tools to meet legal and regulatory standards and enhance data security. Deployable in AWS environments, it utilises VPC traffic mirroring for seamless traffic capture and distribution to end appliances.
-
Ve3 Global Ltd
Implementation of Infor ERP and comprehensive work ticket and escalation protocol. Documentation of all support tasks. Clarification of business procedures/transactions within M3. Serving as a remote extension for client key users. Troubleshooting and resolving configuration issues. Addressing general table maintenance and bug fixes. Establishing or modifying business processes.
-
Kick ICT
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
Cisilion Limited
Cisilion's provides access to our Microsoft Certified Professionals that help you monitor and managed your Teams Meeting rooms solution from the tenant through to the physical meeting rooms infrastructure
-
DBaaS Ltd
We use the latest cloud technologies and offer reliable, user-friendly data to assist your business towards your desired goal. We have an experienced team of data engineers, data warehousing experts and advanced analytics experts. We believe that sharing valuable data across your organization securely shouldn’t be difficult.
-
FOOTPRINT IT SOLUTIONS LIMITED
Footprint’s Managed Platform as a Service (mPaaS) is a cloud platform comprising infrastructure and middleware, allowing system developers to focus on building/deploying applications without the cost/burden of platform management.
It offers scalability, flexibility, and cost-effectiveness in database management, application hosting/development, monitoring, mobilisation and optimisation and deployment workflows including pilot projects.
-
CDW Limited
Darktrace leverages AI to detect and respond to emerging cyberthreats in real time across the entire digital estate.