-
LEIDOS INNOVATIONS UK LTD
The Vulnerability Research Service provides access to Leidos’ in-house Offensive Cyber Operations (OCO) Research and Development (IR&D) programme, operated globally. It is an innovative attack and exploitation capability designed to conduct exploit development, and technology research against defined target system, be they internal, or external.
-
Cantium Business Solutions
Tenable provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments. EIS (the trading arm of Cantium) goes beyond providing licenses; offering consultancy services ensuring organisations procure the most suitable licenses for their requirements. EIS provides support throughout the entire process, including design, implementation and ongoing management.
-
NEOTAS LIMITED
Neotas offers online investigative enhanced due diligence solutions through its AI-driven SaaS platform that harnesses the power of OSINT to identify, understand, and connect both structured, unstructured data across the surface, deep, and the dark web to help private and public sector analyse digital footprint of any given entity.
-
INTEGRITY360 LIMITED
Mimecast Awareness Training is a security awareness training and cyber risk management platform that helps you combat information security breaches caused by employee mistakes.
-
CDW LIMITED
Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.
-
BlackBerry UK Limited
BlackBerry® AtHoc is trusted by 2000+ organizations globally to unify their crisis communications. It offers a whole new level of protection for your people and gives leaders the information they need to make critical safety decisions.
-
Computacenter (UK) Ltd
Proofpoint Cloud App Security Broker (PCASB). Our product is developed using continuous integration/continuous deployment methodology. We provide a single product SKU for CASB, with functionality leveraged from related Proofpoint solutions such as Threat Attack Protection (TAP), Browser Isolation, and our mesh VPN solution based on our Meta networks acquisition.
-
ERNST & YOUNG LLP
GVRT is a cloud-hosted, global Value Added Tax (VAT) and Goods and Services Tax (GST) reporting solution, that redefines and globally standardises the preparation, production, and reporting process of the business. EY GVRT is designed to simplify, digitise, and automate your indirect tax compliance, helping future proof your organisation.
-
MetaCompliance Ltd
MetaLearning Premium combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium provides animated and lifelike eLearning courses.
-
CYBEXER TECHNOLOGIES
Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.
-
CYBERIAM HOLDINGS LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
MTI TECHNOLOGY LIMITED
MTI delivers a range of Hybrid-datacentre services and solutions, designed to unleash the power of digital information and boost business agility, mobility, flexibility and operational efficiencies. Our experience with current and emerging technologies gives us the advantage of expertise in improving existing infrastructures or transitioning to Cloud.
-
Computacenter (UK) Ltd
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
VE3 GLOBAL LTD
Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues.
-
BYTES SOFTWARE SERVICES LIMITED
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
bssgc
-
INTEGRITY360 LIMITED
Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.
-
Matrix42 Sweden AB
Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management (ITSM & ESM), Identity and Access Management (IAM), and Conversational IT. With our innovative and scalable solutions, organizations can streamline operations, enhance productivity, and achieve digital transformation goals.
-
INOAPPS LIMITED
Inoapps Customer Billing Cloud integrates with Oracle Cloud Enterprise Resource Planning (ERP) to deliver an end-to-end business process in a fully integrated solution that helps you keep track of every aspect of your customer billing lifecycle.
-
PALANTIR TECHNOLOGIES UK, LTD.
Palantir Gotham is an enterprise platform for planning missions and running investigations using disparate data, while maintaining privacy and access controls. The platform also incorporates Palantir Foundry’s capabilities, offering a suite of analytical and operational applications, enabling analysts to produce actionable intelligence based on the full ecosystem of available data.
-
Barrier Networks
Leverage Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide-Area-Networking (SD-WAN) and Software-Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
Gradian Systems Ltd
Symantec Endpoint Security delivers the most comprehensive and integrated endpoint security platform on the planet. As an on-premises, hybrid, or cloud-based solution, the single-agent Symantec platform protects all traditional and mobile endpoints, providing interlocking defences at the device, application, and network level, and uses
artificial-intelligence (AI) to optimize security decisions.
-
S3 Ltd
KnowBe4: the world's most popular integrated platform for awareness training and simulated phishing attacks.
Blending AI with an expansive, interactive content library (1500+) & phishing templates (20000+), KnowBe4 delivers individualised, interactive & engaging awareness training and simulated phishing, helping users stay vigilant about social engineering. Enterprise reporting, managing human risk.
-
CDW LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
GBM DIGITAL TECHNOLOGIES LIMITED
Jamf allows educational institutions to easily manage and secure their Apple ecosystem, enabling them to support equitable learning with iPad. Jamf provides a complete and comprehensive management and security solution for an Apple-first environment that is enterprise secure, consumer simple and protects personal privacy.
-
Kick ICT
Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.
-
ALTIATECH LTD
alt Identity & Access Management (altIAM) is an end-to-end service that covers identity related security and access. We assess all levels of IAM, from internal departments to customer stakeholders and engage vendor partners to integrate IAM policies and practices (e.g. SSO, MFA), together with full auditing and compliance.
-
Turnkey Consulting (UK) Limited
A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. .
Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.
-
Turnkey Consulting (UK) Limited
A managed services approach to GRC provides the opportunity for companies to access the latest GRC software quickly, via the cloud through a subscription model. This helps smooth the upfront implementation costs to reduce capital expenditure. The service can also include the cost of the SAP license, further decreasing capex.
-
GRANT THORNTON UK LLP
Grant Thornton's information security training goes to the heart of cyber resilience. Our online training modules are flexible and can be tailored to your employees' needs. They can supplement your existing information security training or be used to create a comprehensive cyber security awareness training programme for all employees.
-
BYTES SOFTWARE SERVICES LIMITED
XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs. bssgc