-
Computacenter (UK) Ltd
Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.
-
ERNST & YOUNG LLP
GVRT is a cloud-hosted, global Value Added Tax (VAT) and Goods and Services Tax (GST) reporting solution, that redefines and globally standardises the preparation, production, and reporting process of the business. EY GVRT is designed to simplify, digitise, and automate your indirect tax compliance, helping future proof your organisation.
-
MetaCompliance Ltd
MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.
-
CYBEXER TECHNOLOGIES
Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.
-
CYBERIAM HOLDINGS LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
MTI TECHNOLOGY LIMITED
MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.
-
Computacenter (UK) Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
VE3 GLOBAL LTD
Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.
-
BYTES SOFTWARE SERVICES LIMITED
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
bssgc
-
INTEGRITY360 LIMITED
Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.
-
Matrix42 Sweden AB
Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management (ITSM & ESM), Identity and Access Management (IAM), and Conversational IT. With our innovative and scalable solutions, organizations can streamline operations, enhance productivity, and achieve digital transformation goals.
-
INOAPPS LIMITED
Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.
-
PALANTIR TECHNOLOGIES UK, LTD.
Palantir Gotham is an enterprise platform for planning missions and running investigations using disparate data, while maintaining privacy and access controls. The platform also incorporates Palantir Foundry’s capabilities, offering a suite of analytical and operational applications, enabling analysts to produce actionable intelligence based on the full ecosystem of available data.
-
Barrier Networks
Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
Gradian Systems Ltd
Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses
artificial-intelligence (AI) to optimize security decisions.
-
S3 Ltd
KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks.
Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.
-
CDW LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
GBM DIGITAL TECHNOLOGIES LIMITED
Jamf allows educational institutions to easily manage and secure their Apple ecosystem, enabling them to support equitable learning with iPad. Jamf provides a complete and comprehensive management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy.
-
Kick ICT
Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.
-
ALTIATECH LTD
alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.
-
Turnkey Consulting (UK) Limited
A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. .
Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.
-
Turnkey Consulting (UK) Limited
A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.
-
GRANT THORNTON UK LLP
Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.
-
BYTES SOFTWARE SERVICES LIMITED
XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs. bssgc
-
INTEGRITY360 LIMITED
Tenable One gives you visibility across attack surface, focus efforts to prevent attacks, accurately communicate cyber-risk to support optimal business performance.
Tenable One Enterprise is comprises all features in Standard plus:
Attack Path Analysis for breach/attack mitigation, External Attack Surface Management allowing organizations to identify/reduce risks from attacker’s perspective.
-
SOFTCAT PLC
Proofpoint Archive offers cloud-based archiving that simplifies legal discovery, regulatory compliance and data access for your users. It provides a central, searchable repository that supports a wide range of content types. So with our fully managed service, you can say goodbye to the headaches of managing an archive in-house.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.
-
PEGASUS LABS PTY LTD
Pegasus Labs Modern Authentication Proxy allows customers to connect applications to Exchange Online via POP, IMAP or SMTP where those applications only support basic authentication.
-
TRUSTMARQUE SOLUTIONS LIMITED
Proofpoint provides software as a service and products for email security, identity threat defence, data loss prevention, electronic discovery, and email archiving.
-
TMC3 LIMITED
The OneTrust platform enables organisations to centrally manage and track UK GDPR compliance activities. Enforce the governance of UK GDPR policies and procedures across the organisation’s data landscape. The platform helps to remove the reliance on manual processes and the burden on under resourced teams with effective automation and integrations.