-
PHOENIX SOFTWARE LIMITED
The appeal of SaaS applications, such as Office 365, GSuite is growing; but so are the hidden threats in SaaS offerings: costly data-leaks, regulatory noncompliance, malware propagation, etc. The Prisma SaaS service complements your existing security tools and delivers data-classification, data-leakage prevention, and threat detection, helping you secure SaaS applications.
-
HICOMPLY LTD
GDPR, Cyber Assessment Framework CAF and NIS2 platform for risk and compliance management. Privacy, GDPR, CAF, NIS2, ISO27001, other frameworks. Centralised GRC and ISMS solution.
Configurable tools, automation, and integrations enhance risk management, monitoring, and compliance. Ensure alignment with CAF, ISO 27001, and NIS regulations for a proactive security posture.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
INTEGRITY360 LIMITED
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.
-
SOFTCAT PLC
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
MISCO TECHNOLOGIES LIMITED
Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, and allows security inspection and policy enforcement in the cloud, at the branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access, Firewall-as-a-Service, web security,and fully integrated office connectivity with Secure SD-WAN.
-
DIGITAL INTERACTIVE LIMITED
Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents
-
eCora
The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.
-
MEGANEXUS LTD
SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.
-
EXPERIAN LIMITED
An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.
-
CENTRAL NETWORKS AND TECHNOLOGIES LIMITED
Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.
-
JBi Digital
Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.
-
EXPERIAN LIMITED
Email Risk Assessment is available to support account opening (originations), Account Management and Transaction Validation. Algorithms assess the risk level associated with a customer’s email address, in real time. A risk score is generated to help decide the right action for a customer application.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
CrowdStrike Falcon Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
INTEGRITY360 LIMITED
Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.
-
BYTES SOFTWARE SERVICES LIMITED
Resolve your email threats across the entire attack chain, from detection to response. This includes the ability to automate abuse mailbox management by removing malicious user-reported phishing emails. This addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. bssgc
-
BOXXE LIMITED
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.
-
CDW LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more.
-
SOFTCAT PLC
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
-
ALTIATECH LTD
Our endpoint and network security services protect your IT environment, manage unauthorised access and target threats to prevent them from entering your organisation’s network. To prevent malicious attacks, we provide security component architecture and implementation, with testing to uncover any vulnerabilities, threats or risks in your applications, network and infrastructure.
-
SOFTCAT PLC
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.
-
SOFTCAT PLC
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
LEIDOS INNOVATIONS UK LTD
Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.
-
PHOENIX SOFTWARE LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
SPINDOGS LTD
Support for mobile optimised, accessible Wordpress CMS websites. Spindogs' Wordpress CMS platform provides bespoke templates for content editors. GDPR compliant Wordpress CMS has an easy to use admin interface and flexible content editing features. Wordpress content management system is open-source, user friendly, and fully customisable.
-
INTEGRITY360 LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
MTI TECHNOLOGY LIMITED
Trend Micro Cloud App Security protects incoming and internal emails from Microsoft 365 and Gmail™ against advanced malware and other threats. It also enforces compliance on other cloud filesharing and collaboration services, including Box, Dropbox, Google Drive™, Microsoft SharePoint online, Microsoft OneDrive for business, and Microsoft Teams.
-
NOC365 LTD
Sophos provides security to protect Windows, Mac and Linux systems against malware and advanced threats. The Sophos Central platform provides one unified console to manage the suite of security solutions which includes: Sophos Intercept X, Sophos Endpoint Protection, Sophos Email Scanning, Sophos XG Firewall, Sophos Cloud Optix, Sophos Mobile Security
-
SAPPHIRE TECHNOLOGIES LIMITED
Dot™ conducts asset discovery and vulnerability management to generate a comprehensive picture of your operational technology networks. Through the use of security-by-design and safety-critical scanning technology, our solution supports both modern and legacy networks, and leverages exclusive active scanning software.
-
SOFTCAT PLC
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,