-
INTEGRITY360 LIMITED
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.
-
Through Technology Limited
NodeZro Command Centre automates the discovery, mapping, monitoring, vulnerability management and supply chain risk analysis for Internet DNS Namespaces. It provides customers with an efficient automated process to understand and secure your external digital footprint while reducing the risk of domain hijacking and phishing attacks. The leading Namespace Security Tool.
-
Kick ICT
We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security.
We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.
-
CDW Limited
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.
-
QUADRIS LIMITED
Combine full Web Application and API Protection (WAAP) functionality with a complete set of advanced security services and solutions that protect your applications against today’s multiplying threats. Whether your applications are deployed on-premises, in the cloud, or hybrid, Barracuda Application Protection makes it easy to keep them secure and available.
-
Phoenix Software Ltd
Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.
-
IRIS Intelligence Ltd.
The IRIS Cyber Security Remediation Tracker enables enterprises to proactively identify and manage threats and vulnerabilities concerning Cyber Security. The service facilitates collaboration of IT and Business units in managing Cyber Security risks. The service can be used to integrate best practices and policies from NIST and NCSC.
-
CHESS ICT LIMITED
With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.
-
Brookcourt Solutions
Leveraging Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide Area Networking (SD-WAN) and Software Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
INTEGRITY360 LIMITED
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
MISCO TECHNOLOGIES LIMITED
Barracuda Email Protection Premium is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.
-
INTEGRITY360 LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
DAVID HORN COMMUNICATIONS LIMITED
Ark is an interview management solution for accurate functionality to receive, monitor and retain the evidence throughout its lifetime.
The client applications are attachable to our Core backend and facilitates the recording of evidence on smart phones, interview rooms and laptops.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.
-
Bytes Software Services
Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. bssgc
-
Cinos
Cisco Meraki service from Cinos delivering cloud controlled wired and wireless networking, SD-WAN, network security, security cameras/CCTV and endpoint management. Wireless Access Points, LAN switches, security and SD-WAN, cellular gateways, smart cameras and sensors all controlled via simple, comprehensive cloud dashboard and fully managed by Cinos.
-
Phoenix Software Ltd
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
Core
Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3. Includes cybersecurity, eDiscovery, Azure Information Protection, Threat Analytics, MDM.
-
INTEGRITY360 LIMITED
Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.
-
Spindogs Ltd
Development of Bilingual Umbraco CMS mobile optimised, accessible websites. Spindogs' Umbraco CMS platform provides bespoke templates for content editors. GDPR compliant Umbraco CMS forms and tagging are out-of-the-box. Umbraco CMS offers version control, integrations, SSO, and multilingualism. Umbraco content management system is open-source, user friendly, and fully customisable.
-
BOXXE LIMITED
Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline
-
Ultranyx
Prizsm ultra-secure data storage and communications in the public cloud.
Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.
-
Softcat Limited
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
Softcat Limited
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
Computacenter (UK) Ltd
Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.
-
S3 Ltd
SaaS Cloud Backup Solution
Keepit provides data protection for all your key SaaS applications in one single, vendor-independent platform. We protect your crucial cloud data created in Microsoft 365, Entra ID (formerly Azure AD), Salesforce, Google Workspace, Azure DevOps, Power Platform, Dynamics 365, and Zendesk.
-
WM Promus
Protect cloud native applications by minimizing their attack surface, detecting vulnerabilities, embedded secrets, and other security issues. Gain insight into your vulnerability posture and prioritize remediation and mitigation according to contextual risk. Accelerate development, enforce compliance, gain real-time visibility and control over your security posture and protect applications.
-
Bytes Software Services
BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bssgc
-
Softcat Limited
Calculate, communicate and compare your cyber risk.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.