-
Fusion Business Solutions (UK) Limited
BMC Helix Continuous Optimisation helps IT organizations effectively plan for changes in business demand and continuously optimize both IT cost and capacity. Fusion GBS is a Elite Partner of BMC, reselling BMC Helix.
-
Planet IT
Sophos Intercept X Advanced with EDR consolidates powerful endpoint detection and response (EDR) with unmatched endpoint protection. Hunt threats to detect active adversaries, or leverage for IT operations to maintain IT security hygiene. When an issue is found remotely, respond with precision.
-
IOCO SOLUTIONS LIMITED
FortiGate, FortiManager and FortiAnalyzer solutions provide a core capability to any organization looking to improve their security posture. Flexible licensing models based on organizational and regulatory requirements results in great ROI. Backed by world leading security researchers and developers results in solutions for now and the future.
-
CHESS ICT LIMITED
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 15 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Check Point CloudGuard WAF provides Web Application and API protection.With deep application contextual analysis,it eliminates the tradeoff between the level of security and the complexity of managing application security.Whether your application is hosted in a datacenter or in a public/private cloud,CloudGuard's patent-pending decision engine covers,OWASP top ten attacks,API attacks
-
Virgin Media Business
Zscaler is a global cloud-based information security company that provides Secure Access Service Edge (SASE) solutions; internet security; web security; next generation firewalls; sandboxing; SSL inspection; antivirus; vulnerability management and granular control of user activity in cloud computing, mobile and Internet of Things (IoT) environments.
-
SAPPHIRE TECHNOLOGIES LIMITED
Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
Khipu Networks Limited
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organisation actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
SOFTCAT PLC
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
CDW LIMITED
OneTrust is the category-defining enterprise platform to operationalize trust. More than 12,000 customers, including half of the Fortune Global 500, use OneTrust to make trust a competitive differentiator, implementing central agile workflows across privacy, security, data governance, data protection, third-party risk, ethics and compliance, and ESG programs.
-
INTEGRITY360 LIMITED
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Workday Process Redesign, helping government departments optimize their operational workflows. Our services streamline processes, enhance efficiency, and improve user experiences by aligning Workday functionalities with specific organizational needs and goals.
-
PHOENIX SOFTWARE LIMITED
Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.
-
HYPER TALENT SOLUTIONS LTD
Nutanix Security and Compliance service offers robust solutions to safeguard data and infrastructure. It ensures adherence to industry standards and regulatory requirements. This service provides advanced security measures, continuous monitoring, and proactive threat detection, ensuring data integrity and protecting against cyber threats, enabling businesses to maintain compliance.
-
QUADRIS LIMITED
Quadris offer the Fortinet flagship enterprise firewall platform, FortiGate, as a fully managed firewall solution, it is available in a wide range of sizes and form factors to fit any environment. Quadris offers 24x7x365 support, deployment-flexibility, predictable costs. Quadris provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.
-
PHOENIX SOFTWARE LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
Barrier Networks
SASE extends networking and security capabilities beyond where they have typically been available, allowing users, regardless of location, to take advantage of firewall as a service (FWaaS), secure web gateway (SWG), zero-trust network access (ZTNA), and a medley of other threat detection functions.
-
Netsweeper Inc.
Netsweeper OnGuard™ is a powerful content monitoring and reporting platform that helps schools meet safeguarding initiatives and protect at-risk students by identifying harmful actions in real time, allowing you to take proactive steps for early intervention, safety and the promotion of mental health wellness.
-
Unify Business Solutions Limited
The Unify Call Control System (UC3S) is a secure platform which enables prisons and secure facilities to manage phone calls internally and externally. The UC3S allows staff to control, monitor and record phone calls and includes integrated reporting. Call rates are adjustable enabling differing tariffs to be set for detainees.
-
CDW LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
Gradian Systems Ltd
In the world of BYO devices and remote access, organizations need a
security-solution that can address the growing attack surface.
Symantec-VIP is a user-friendly, cloud-based, strong-authentication service that provides secure access to sensitive data and applications anytime, anywhere, from any device enabling a critical piece of your Zero-Trust security strategy.
-
CORE TECHNOLOGY SYSTEMS (U.K.) LIMITED
Windows 10 / 11 Enterprise Licenses for customers wanting to access Enterprise feature sets on their corporate desktop.
-
CultureAI
The CultureAI Human Risk Management Platform empowers security teams to proactively monitor human risk across multiple applications, providing real-time insights into risky employee behaviours and security vulnerabilities. Armed with these insights, organisations can deliver coaching in the moment and automate fixes, ensuring optimal efficiency and effectiveness.
-
Computacenter (UK) Ltd
Proofpoint's Advanced package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration to the Core package offerings.
-
Origin8tive Ltd
Origin8tive's Cloud Packet Broker enables distributing network traffic across multiple appliances, vital for complex cloud networks requiring various analytical tools to meet legal and regulatory standards and enhance data security. Deployable in AWS environments, it utilises VPC traffic mirroring for seamless traffic capture and distribution to end appliances.
-
XPERTEX LTD
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.
-
SAPPHIRE TECHNOLOGIES LIMITED
DDOS protection automatically prevents scalable attacks including HTTP/S Floods, DNS, and more. We defend organisations against today’s most advanced DDoS attacks using advanced behavioural based detection for both network layer (L3/4) and application-layer (L7) attacks, automatic real-time signature creation to protect against zero-day attacks,
-
VE3 GLOBAL LTD
Implementation of Infor ERP and comprehensive work ticket and escalation protocol. Documentation of all support tasks. Clarification of business procedures/transactions within M3. Serving as a remote extension for client key users. Troubleshooting and resolving configuration issues. Addressing general table maintenance and bug fixes. Establishing or modifying business processes.
-
GET SWARMS LIMITED
Safeguard Your Data with Get Swarm's Key Management Solution, designed to safeguard sensitive data and streamline access control. Our service ensures the secure storage, encryption, and centralized management of cryptographic keys.Able to manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.