-
INTEGRITY360 LIMITED
InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach.
Strengths include:
- Multi-Cloud security & compliance
- Container & Kubernetes security
- Cloud Vulnerability Management
-
Network Utilities (Systems) Ltd
Managed security solution that collects, aggregates, and normalises log data from Office 365 tenants using an analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Detects Business Email Compromise and identify threat like behaviour i.e. unauthorised access, admin changes, impossible logins, mass file downloads, and brute force attacks.
-
QUADRIS LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
Softcat Limited
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
ORCHA Health Ltd
ORCHA is the world’s leading digital health quality management and distribution platform, featuring the infrastructure needed to deliver digital health safely in healthcare services at scale. The platform enables and supports the end-to-end digital transformation of organisations, through a formulary, app library, digital health academy, toolkits and risk management frameworks.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
BlueFort Security Ltd
Provides a Cloud-Native zero-touch approach to cloud security. Operates a patent-pending “SideScanning” technology, which delivers 100% security visibility and coverage across customer’s entire cloud environment. Utilizes a context engine combining workload and cloud configuration details to build a unified data model and visual map of all cloud based critical assets
-
Specialist Computer Centres plc
Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM). SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.
-
INTEGRITY360 LIMITED
PolicyPak instantly makes your Windows endpoints more secure while keeping your applications, browsers and operating system security settings in compliance. PolicyPak leverages Active Directory & Group Policy for on-prem or your existing MDM service like Microsoft Intune. Alternatively, you can use PolicyPak Cloud to deliver all Microsoft and PolicyPak settings
-
Phoenix Software Ltd
Manage privileges across all identity types through unified and centralized management platform and seamlessly extend PAM to optimize productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.
-
Avepoint UK Ltd
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
ACUITY RISK MANAGEMENT LIMITED
STREAM Integrated Risk Manager provides a holistic environment to capture integrated risk use cases within a Cloud infrastructure and provide clear reports. These use cases include Enterprise Risk, Cyber and IT, ISMS, Control and Compliance Assurance, Incidents, Audits and Findings, Policy, Business Continuity, Privacy, Vendor and Supply Chain, Vulnerability.
-
Chess CyberSecurity Ltd
Logpoint's platform brings together Security Incident and Event Management(SIEM), Security Orchestration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. It provides a comprehensive and centralised view of the security posture of an IT infrastructure.
-
INTEGRITY360 LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.
-
Bytes Software Services
Netwrix Change Tracker helps organisations to enhance their security posture, through the process of hardening configurations and monitoring for unauthorized changes to criticial system files - in real time. The solution includes a comprehensive library of CIS certfied benchmark reports, designed to reduce the attack surface. bssgc
-
Atlas Cloud Ltd
Disaster recovery (DR) for virtual desktops ensures your organisation can swiftly recover from disruptions of any kind. It allows us to replicate virtual applications and desktops in a different location, at the touch of a button with minimal data loss and downtime – keeping key systems running in any situation.
-
Forfusion Ltd
Gain end-to-end visibility to confidently plan and deploy your hybrid cloud, whilst obtaining valuable insights through real-time workload performance. Our experts help you to leverage application and infrastructure monitoring tools to reliably validate success, so you can tailor your approach to addressing potential issues in hybrid or multi-cloud environments.
-
Isotoma Ltd
Even when hosting in the cloud, the security of your web application is your responsibility. Isotoma's penetration testing service helps ensure your application is secure against the most common techniques used by hackers today.
-
Netpremacy Limited
BeyondCorp is Google's implementation of the zero trust model. By shifting access controls from the network perimeter to individual users, BeyondCorp enables secure work from virtually any location without the need for a traditional VPN.
-
CDW Limited
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types
-
Forfusion Ltd
Leverage end-to-end security for both public and private cloud domains. Exploit the power of identity services and user identity to secure your network. Using products from the largest IT security vendor in the world to secure your workplace is critical and a very positive step towards increasing business performance.
-
Grey Monarch Limited
Pathlock Cloud CAC automatically scans SAP systems for over 4000 security vulnerabilities and cybersecurity weaknesses at any desired frequency (e.g. daily, weekly, monthly). In this way, the SAP systems remain up-to-date with SAP security notes and patches. Other SAP security risks are also quickly identified with clear remediation instructions provided.
-
Softcat Limited
Vulnerability and external attack surface management service powered by Tenable technology and delivered by Sophos threat exposure and remediation experts. With Sophos Managed Risk, our experienced analysts identify high-priority cybersecurity vulnerabilities and potential attack vectors in your environment so actions can be taken to prevent
attacks before they disrupt business.
-
CDW Limited
CloudGuard Code Security, part of CloudGuard CNAPP, provides automated tools that integrate with developers’ tools to detect code vulnerabilities and to identify secrets and misconfigurations in the code before deployment, preventing unauthorized use to nefarious ends.
-
BLANKBOX TECHNOLOGIES LTD
Skylight is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Compliance Plus is a comprehensive new-school compliance training library of more than 500 modules that provides global continuously-updated, engaging, relevant, concise and customisable content to teach employees how to be compliant with their local organisational regulations.
-
CYMBALSTREAM SOLUTIONS LIMITED
Cymbalstream, partnering with CrowdStrike, offers Endpoint Detection and Response (EDR) services. CrowdStrike's Falcon Insight XDR consolidates security products into one agent, console, and cloud-native architecture. It provides comprehensive endpoint protection, detection, and response capabilities against breaches and advanced cyber threats targeting endpoints like laptops, desktops, and servers
-
WR LOGIC LIMITED
Azure IoT Insights utilizes Azure Stream Analytics and Azure IoT Hub to provide real-time data processing and analytics for IoT-driven industries. It enables real-time monitoring and analysis, supports immediate decision-making, and enhances operations across smart city infrastructure, manufacturing, and environmental monitoring, ensuring timely and relevant insights.
-
Ampliphae
Allows you to manage encryption risk, address weak encryption that puts your data at risk today, and implement an effective mitigation strategy to migrate your organisation to quantum-safe encryption technologies. Post-quantum encryption discovery, planning and implementation for cloud, IoT and applications. Continuously updated realtime cryptographic inventory for the whole organisation.
-
Phoenix Software Ltd
See what is running in your multi-cloud environments, automate compliance and prioritize risks with identity driven insights.