-
Phoenix Software Ltd
CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
HAYMAN.DEV LTD
Asset management and tracking is a multiplatform, multi-device driven system for information control for tomorrow. We listen and drive off the shelf or bespoke requirements to record, track, audit and report of your data. Providing you with a blended approach to giving you the needed information at hand.
-
INTEGRATION360 LIMITED
Turbo360 Business Activity Monitoring (BAM) aims to help you with system integration workloads. If you want to achieve user self service integration where users have visibility of your hidden integration and automation processes and can perform self-service tasks like search and fix data issues then BAM will help
-
Visionist
Strengthen your cloud security with Zscaler solutions. We offer ZIA, ZPA, and Z-App software licenses, along with expert deployment services which follow a Zero Trust Network Model, as recommended by NCSC. Provides access to legacy applications.
-
Bytes Software Services
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. bssgc
-
EVALU-8 SOFTWARE LIMITED
Evalu-8 is an innovative EHS software platform designed by industry experts. It is feature-rich, intuitive, and affordable for all organisations. Its goal is to help organisations manage and reduce risks associated with workplace operations, manage environmental impact, ensure compliance with regulatory requirements, and promote the safety and well-being of employees.
-
Somerford Associates Limited
Splunk's Observability Suite addresses your need to analyse customer experiences and detect, troubleshoot and find root causes to incidents across a cloud-native or hybrid environment.
Consisting of Splunk IT Service Intelligence (ITSI), Infrastructure Monitoring (SIM), Application Performance Monitoring (APM), Real User Monitoring (RUM), Splunk Synthetic Monitoring and Splunk On-Call.
-
e2e-assure Ltd
Incident Response, Case Management, log event alert monitoring, GPG-13, threat intelligence, darkweb, IPS/IDS, traffic analysis, SOC, CERT, Reporting, Collaboration, packet capture, Audit Compliance, EDR, MDR, XDR, NDR, TDR, Privileged User, MDM, Vulnerability Assessment, Cloud Security, Sentinel, Defender, MDE, MCAS, Azure, AWS, CloudTrail, CloudWatch, GuardDuty, Security Hub, GCP, Google WorkSpace, Oracle
-
R2P Systems UK Ltd
This service allows bus operators and local authorities to report on arrival/departures and lateness of vehicles. It provides detailed arrivals/departure times at bus stops along journeys. At the high level, it provides a complex timetable schedule heading report to see how vehicles are performing against timetables.
-
Actionable Ltd
REACH CYBER provides the latest generation cyber security network sensor. Using analytics and AI to not only protect and detect cyber breaches, but also provide the right data you need to identify vulnerabilities and attack vectors.
The platform incorporates the REACH data acquisition engine for precision cyber data analytics.
-
Computacenter (UK) Ltd
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivaled expertise.
-
Premier IT Partnership Ltd.
Our rostering solution caters for all staff groups including Medics, Nurses and AHPs. The system was developed using NHSI guidelines and is fully compliant with the NHS Standards and Levels of Attainment. The platform is configurable, modular and interoperable to manage the complexity and challenges of the modern NHS.
-
Elcom Systems Ltd
EVOLVE Spend Management, seamlessly integrated Source to Pay process including MultiQuote, eSourcing, Tracker, Tail Spend, eAuction, Contract Management, Catalogues, Inventory Management (inc. Scan4Safety), Community Stores, PPE Central Store, Purchase to Pay (P2P), Analytics, Electronic Trading (PEPPOL access point), Supplier Financing and eMarketplaces.
Integration with legacy, supply chain and external systems.
-
CYBERLAB CONSULTING LTD
SecurEnvoy provides MFA / SSO / IAM for Infrastructure and SAML Applications. It can be deployed either as a Cloud Service or On Premise.
-
Softcat Limited
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
City and Guilds Kineo Limited
Kineo Totara TXP is our all-in-one learning management system (LMS) and talent experience platform (TXP) that uses technologies built to work together to close the skills gap and open our clients' learning ecosystem. We provide a fully managed service to take each client’s learning strategy to new heights.
-
The Server Labs Ltd.
Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.
-
MAXINITY SOFTWARE LIMITED
Maxexam is a secure end-to-end exam management system designed to help healthcare educators develop high quality, effective exams, and drive improvement over time (eAssessment).
Maxexam can be used to run both written and clinical exams (OSCE). Successful exams can be run face-to-face, remotely or using a hybrid model.
-
Liaison Financial Services Ltd
The NHS at Work Platform enables full control and visibility across your workforce from rostering through to vacancy release, shift management, reviewing and booking applicants (be it internal Bank, Collaborative Bank or Agency), vendor management, onboarding through to electronic timesheets and payment of workers and agency suppliers alike.
-
MONDAS CONSULTING LTD
Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.
-
Cirro
Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.
-
MICRO FOCUS
Micro Focus® Operations Bridge (OpsBridge) monitors your IT environment and consolidates data from existing tools. Operations Bridge applies automated discovery, monitoring, analytics, and remediation to data across traditional, private, public, and multi-cloud and container-based infrastructure.
It displays business and IT KPIs for executive stakeholders and
operations staff, providing real-time insight.
-
NEO TECHNOLOGY LIMITED
Neo Technology's ASB management solution offers an expanded workflow, audio file upload, parties' management, linkage of multiple instances to one incident, workflow pause/reactivation, categorisation of ASB levels, progression dashboard, communication channels, and secure documentation handling for compliance, resident safety, trust, and incident reduction.
-
Formus Professional Software
FormusPro is a certified Microsoft Partner who specialise in the implementation, configuration and development of software, primarily on the Microsoft Dynamics 365 (D365) platform. In addition, we also offer data migration, system integration, continuous system development, software licensing, consultancy, training, training documentation and support.
-
Phoenix Software Ltd
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.
-
PRESCRIBING SERVICES LTD
Eclipse SCHOLAR (Secure Clinical Hub for Online Learning Audit & Research) empowers NHS ICBs to effortlessly implement a secure pseudonymised data environment for regional activities with full data specialist support. The system allows ICBs to work collaboratively on research programmes with 28 million live patient portals already integrated.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
Softcat Limited
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
CACI UK Ltd
DarkBlue® is a safe space for investigators to explore the Open, Deep and Dark web. With over 6 billion AI-enhanced records, collected over two decades, it unlocks the Deep & Dark Web without direct exposure. Daily scraping of 600,000-800,000 new records ensures DarkBlue® remains a vital tool for intelligence gathering.
-
Phoenix Software Ltd
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.