-
VE3 GLOBAL LTD
Continue your cloud journey by transitioning existing applications and services to Azure or AWS with VE3's comprehensive migration service. Whether working independently or collaboratively with your team, our Azure/AWS Cloud Migration Teams facilitate seamless transitions from on-premise physical or virtual environments, as well as from public or private clouds.
-
Central Networks and Technologies Ltd
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
Netcraft
Netcraft has extensive experience in validating large data streams to identify malicious URLs including phishing, malware, shopping site skimming attacks, and non-consensual cryptocurrency mining. Netcraft can provide a browser extension for Government employees to use for Chrome, Firefox, Opera and Edge to protect against these threats.
-
TMC3 LIMITED
Enterprise Risk Management by OneTrust. The platform enables organisations to streamline and efficiently manage operational risks across the enterprise. Automated workflows simplify risk identification and intelligently flag risks based on your desired scoring methodology, helping to identify your risk posture in real-time and track risk against business initiatives.
-
R2P Systems UK Ltd
A Web-based RTPI Bus Departure Board provides real time information for bus arrivals / departures for either single or multiple bus stops. The objective of the Web-based RTPI is to provide real time predictions in buildings, offices, interchange, or points of information.
-
SCG CORPORATE LIMITED
Barracuda MSP Log Security Monitoring is a managed security that collects, aggregates, and normalizes log data from hundreds of sources for AI-enabled analysis using BMSP’s analytics platform, SIEM, threat intelligence, and 24/7 365 SOC. Identify threat-like behavior in your systems such as impossible logins, multi-factor bypass & coordinated attacks.
-
Gradian Systems Ltd
With no means to authoritatively identify the sender, anyone can easily impersonate sending domains. Valimail is the only fully automated, anti-phishing platform that governs DMARC, DKIM, Unlimited SPF & BIMI. Only full automation provides a guaranteed path to rapid and critically, safe enforcement of DMARC.
-
IBM UNITED KINGDOM LIMITED
IBM Security Verify is a comprehensive cloud-native platform of IAM
capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.
-
Redinet Ltd
Automated patch management for servers and endpoints. This service will apply security patches for Microsoft and 100s of other vendor applications.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs. bssgc
-
NVT Group
Concepta XDR & SOC is an all-in-one cyber security platform. It includes all the prevention, detection, correlation, investigation and response you need, backed by a 24/7 Security Operations Centre (SOC) service, without the traditional costs and complexities.
-
CHESS ICT LIMITED
Zero Trust Assurance delivers an adaptive approach for constructing and reinforcing network resilience against unauthorized access and lateral threats with real-time insight over all connected devices - from automated policy enforcement, advanced segmentation, integration into the cybersecurity ecosystem, and the ability to swiftly respond to and recover from incidents
-
PHOENIX SOFTWARE LIMITED
An advanced external threat intelligence tool that finds and mitigates threats directly targeting your organization/employees/customers. By proactively monitoring thousands of sources across the whole web, Threat Command enables you to make informed decisions and rapidly respond to protect your business. In addition, enables advanced automated response to many threat alerts.
-
PHOENIX SOFTWARE LIMITED
Azure Active Directory (Azure AD) cloud-based identity and access management service, secures employees sign-in and access resources such as Office365, Azure portal, and thousands of other SaaS applications. Internal resources, such as applications on your corporate network and intranet, along with any cloud applications developed by your own organization.
-
BYTES SOFTWARE SERVICES LIMITED
Threat detection software from Netwrix to detect and respond to abnormal behaviour and advanced attacks with high accuracy and speed. bssgc
-
DO Business Services Limited
Parallels Secure Workspace enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required and there are not downloads. Enabling a mobile workforce is now simple and secure.
-
PHOENIX SOFTWARE LIMITED
Windows operating system updated in the cloud with Windows Information Protection, Windows Hello for Business, Credential Guard, Device Guard, App Locker, plus Windows Defender Advanced Threat Protection. Can be used with either Windows 10 or Windows 11
-
PHOENIX SOFTWARE LIMITED
InsightAppSec is part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature/maturing Application Security professionals. Apps are getting more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but present challenges of app security.
-
VERIFILE LIMITED
Employment screening, BPSS vetting (Baseline Personnel Security Standard), online reputation searches, social media checks, and open source internet searches. Verifile's secure vetting platform also enables employers to select global background check services. Integrations with multiple data sources ensure quick turnarounds for BPSS vetting, background checks and employment screening services.
-
Cantium Business Solutions
EIS (the trading arm of Cantium) offers multiple web filtering solutions, delivering an award-winning intuitive management console, over 40 third-party integrations, a RESTful API, plus fully automated endpoint detection, prevention, protection and remediation for a comprehensive cyber resilience strategy. EIS specialises in aiding Web Filtering design, development, implementation and incorporation.
-
CDW LIMITED
Quickly find relevant data and respond efficiently for a variety of requests including litigations, investigations, and privacy regulations
-
SOFTCAT PLC
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization.
-
VE3 GLOBAL LTD
Requirements gathering, solicitation and definition Digital Value Mapping Stakeholder mapping, comms and engagement Digital strategy Business, functional and technical specifications Acceptance Criteria Prioritisation & phasing Content strategy (what content is required and where) Programme Management User testing and research User scenarios, journeys Interactive Proof of Concepts/Prototypes/Wire-frames Procurement Management
-
NETWORK INTEGRATION TECHNOLOGIES LTD
mPulse from Akamai is a web and mobile performance analytics SaaS solution designed to track and report on user experience. This real-time solution provides insight into where front-end performance bottleneck occur and quantifies the impact they have on key business KPIs.
-
Levett Consultancy Ltd
Google Workspace AppSheet is a no-code platform that lets you easily build custom apps to streamline business processes. Use data in Google Sheets or other sources, then use AppSheet to create an app. AppSheet helps teams rapidly create the apps they need to improve workflows, boost efficiency, and solve challenges.
-
Netcraft
We offer a highly automated solution for promptly detecting and removing malicious content from the internet. We can handle a wide range of attack vectors including phishing URLs, brand infringement, malware, fraudulent social media profiles, fake mobile apps, and e-mail addresses being used to conduct fraud.
-
Gradian Systems Ltd
Forcepoint Remote Browser Isolation (RBI) provides secure and more open access to web content through an isolated browser hosted in the cloud, preventing threats from reaching customers network.
-
IRIS INTELLIGENCE LIMITED
The IRIS Net Zero Tracker helps government departments and Arms Length Bodies (ALBs) deliver on their net zero obligations. Building on the IRIS ESG System, the Net Zero Tracker helps implement carbon reduction and remediation actions against international standards such as SASB and TCFD. Authorised reseller of RIO AI Platform
-
Wavenet
Wavenet's Managed Firewall Service for FortiNet Firewalls encompasses comprehensive support, including installation, proactive maintenance, and management, with customisable managed service options. Leveraging their partnership with FortiNet, Wavenet guarantees the secure rollout of infrastructure, applications, and data within a range of hybrid and multi-cloud environments.
-
INTEGRITY360 LIMITED
Proofpoint's Core Plus package adds Email Fraud Defence, Secure Email Relay, and Supplier Threat Protection to the Core package offerings.