-
ITHQ LTD
Rapid7’s MTC managed service - prepare for, detect, and respond to threats in your environment. Rapid7 supports your team to accelerate your proactive, responsive, and strategic security maturity and extend your security operations by providing customised security guidance and hands-on 24x7x365 monitoring, threat hunting, incident response, and exposure management.
-
Bright Cyber (Voodoo technology LTD)
AttackIQ's Breach and Attack Simulation (BAS) service enables organizations to identify vulnerabilities and gaps in their security. Security teams simulate real-world attacks to evaluate the effectiveness of their security controls, introducing evidence to enhance decision-making, security operations, and investments. Integrates with Tidal Cyber to heatmap your threats and defensive controls.
-
KPMG LLP
SOFY platform runs on both subscription-based and one-off assessment model, and offers advanced, configurable, and ready-to-use data analytics solutions allowing clients to make better SOX Compliant business choices, manage risk, and improve overall performance. SOFY helps streamline - Access management, Continuous Controls Monitoring, Risk Management, Third Party Risk & more.
-
True Digital
Building world class websites using a headless CMS, and creating high performing digital experience platforms to answer our clients bespoke requirements.
-
CHESS ICT LIMITED
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
Viable Data
We can create a real-time model of your system, enabling efficient data capture and quicker insights. We connect diverse datasets to create a holistic view to enable effective decision making. We extend your system beyond the raw data, initiating automated decisions based on inputs.
-
INTEGRITY360 LIMITED
Frictionless, Reliable, and Highly Secure Remote Access for Industrial Networks.
-
RSM UK RISK ASSURANCE SERVICES LLP
Action tracking software that enables actions to be assigned to action owners and their status reported. Interactive monitoring dashboards provide real-time views of the status of agreed actions. Attach evidence to support action completion and utilise alerting and calendar integration to provide reminders. Mobile and tablet friendly, iOS and Android.
-
Computacenter (UK) Ltd
IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.
-
TheTechForce Limited
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
Fordway
KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks. On-demand, interactive, engaging training with over 1000 course modules available, the largest online database available anywhere. Fully automated simulated phishing attacks, 4000+ email templates with unlimited usage.
Enterprise-strength reporting for both training and phishing.
-
INTEGRITY360 LIMITED
Adaptive Email DLP uses behavioral AI to learn about employees’ normal email sending behaviors, their trusted relationships and how they communicate sensitive data. It analyzes each email to detect anomalous behavior, notifying admins of potential data loss incidents. It warns the user in real-time and prevents sensitive data-loss through email.
-
Glemnet Ltd
ActivTrak is a workforce productivity and analytics application that helps organizations understand how and what people do at work. Our cloud-based user activity monitoring software provides contextual data and insights that enable mid-market organizations to be more productive, secure, and compliant.
-
JBi Digital
We create user-friendly CMS websites that make life easy by harnessing the full benefits of a customisable, flexible and scalable CMS with our design, build and hosting services.
We prioritise understanding your objectives & values, then identify and recommend the most bespoke & beneficial solution to help achieve your goals.
-
Bytes Software Services
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments. bssgc
-
CDW Limited
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
MONDAS CONSULTING LTD
Purchase AT&T USM Anywhere SIEM licences to utilise the power of USM Anywhere to collate log data from all of your Microsoft security tools and generate alarms for a SOC team to triage. USM Anywhere can remediate these alarms using powerful automated playbook actions.
-
BOXXE LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Office 365 Security Monitoring is a managed security product
that monitors Office 365 activity using analytics platform, Security Information and Event Management, threat intelligence and 27/7/365 Security Operations Centre.Identification of threat-like behavior such as unauthorized access to cloud mailboxes, admin changes in the environment, impossible logins and brute force attacks.
-
Aiimi Ltd
Insight Engine connects to and ingests information from a multitude of source systems, including both data and documents via API, data export ingestion or from databases and file shares. Once made available through our search and discovery interface, the legacy application can be safely decommissioned.
-
Softcat Limited
SecurityCoach is the first real-time security coaching product that delivers immediate feedback to users at the moment of risky behaviour. It leverages event data from your existing security stack to deliver real-time coaching, reinforces your security culture and turns insecure user behaviour into an opportunity
-
Charterhouse Voice & Data
Harmony SASE is a cloud-based security service that converges networking and security functions. It delivers secure access to cloud applications and resources for users anywhere, on any device. Harmony SASE simplifies security management and protects against advanced threats.
-
Communication-STEM Ltd
The Aiimi Insight Engine is our unique discovery platform. It works alongside you, using AI to serve relevant information and insight swiftly and securely. Whether you’re complying with GDPR, using enterprise search, decommissioning legacy platforms, or getting the most accurate data science insights, the Insight Engine adapts to your needs.
-
GMO GLOBALSIGN LIMITED
GlobalSign provides an array of digital certificates including TLS (public and private), CodeSigning, Document Signing and Authentication certificate. Suppling DV, OV, EV SSL and Code Signing certificates for single, multiple and complex domains/sub-domain sites. All your certificate needs met by GlobalSign.
-
Softcat Limited
An add-on to Tenable Vulnerability Management.
Unlimited number of comprehensive scans of your networks so you can identify and address vulnerabilities and ensure your organization complies with PCI DSS. Process strictly follows PCI Compliance Guidelines, ensuring vulnerabilities don't exist for more than 90-days on networks that involve payment card transactions.
-
Computacenter (UK) Ltd
Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
Jisc Services Ltd
The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.
-
Computacenter (UK) Ltd
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
WR LOGIC LIMITED
Integration of Microsoft Power Platform applications with public-sector systems and third-party services through custom APIs. Ensuring smooth data flow and integrity, enhancing low-code/no-code apps on PowerApps, Power Automate, and Power BI. Leveraging advanced API techniques and Microsoft's secure cloud, optimising connectivity and functionality for improved service delivery and operational efficiency.
-
MetaCompliance Ltd
MetaPrivacy is a cloud-based privacy lifecycle management system that delivers an automated approach to data privacy compliance. The platform has been designed to increase stakeholder engagement by providing graphically rich, interactive assessments incorporating video instruction, as part of the personal data information gathering phase.