-
INTEGRITY360 LIMITED
Sophos Mobile is a Unified Endpoint Management (UEM) and Mobile Threat Defense (MTD) solution that helps businesses spend less time and effort to manage and secure traditional and mobile endpoints. Sophos Mobile manages and secures iOS, Android, Chrome OS, Windows 10, and macOS devices.
-
DAVID HORN COMMUNICATIONS LIMITED
Ark is an interview management solution for accurate functionality to receive, monitor and retain the evidence throughout its lifetime.
The client applications are attachable to our Core backend and facilitates the recording of evidence on smart phones, interview rooms and laptops.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
KnowBe4 is the world’s largest security awareness and compliance training and simulated social engineering platform. It combines the industry’s most comprehensive library of engaging, localised content, AI-driven simulated phishing and training recommendations, enterprise-grade reporting and robust user testing and assessments to drive awareness and change behaviour.
-
IRIS Intelligence Ltd.
IRIS Project and Program Risk Management Software helps organisations assess project/program risks and manage them more effectively. It facilitates increased risk identification, enables consistent risk assessment, and tracks the progress of risk mitigation activity. The IRIS risk software supports a variety of UK and international guidance including ISO31000, PMBoK, APM.
-
Bytes Software Services
Wiz is a CNAPP security platform that helps customers protect everything they build and run in the cloud, providing full-stack agentless cross-cloud support for AWS, Azure, GCP, OCI and Kubernetes. bssgc
-
COALESCENT LIMITED
Dapian has been designed by public sector organisations and national bodies, to empower non-experts in the wider business to take responsibility for their data protection processes. Organisations can complete, signoff, store, share and collaborate on Information Sharing Agreements.
-
Network Utilities (Systems) Ltd
Managed security product that collects, aggregates, and normalises log data from hundreds of sources for AI enabled analysis using Barracuda Network’s analytics platform, SIEM, threat intelligence, and 24/7 365 Security Operations Centre. Identifies threat like behaviour in your systems such as impossible logins, multi-factor bypass, coordinated attacks, and rogue agents.
-
Cinos
Cisco Meraki service from Cinos delivering cloud controlled wired and wireless networking, SD-WAN, network security, security cameras/CCTV and endpoint management. Wireless Access Points, LAN switches, security and SD-WAN, cellular gateways, smart cameras and sensors all controlled via simple, comprehensive cloud dashboard and fully managed by Cinos.
-
Phoenix Software Ltd
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
Core
Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E3, Enterprise Mobility + Security E3. Includes cybersecurity, eDiscovery, Azure Information Protection, Threat Analytics, MDM.
-
INTEGRITY360 LIMITED
Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.
-
BOXXE LIMITED
Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline
-
Ultranyx
Prizsm ultra-secure data storage and communications in the public cloud.
Prizsm enables anyone to easily protect and secure their information in the public cloud. Prizsm’s unique multi-cloud distribution approach enables businesses to retain data safely at all levels of security classification.
-
Softcat Limited
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents
-
Softcat Limited
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
IRIS Intelligence Ltd.
The IRIS Business Continuity Planning Software provides your business with all the tools necessary to plan and implement your business continuity protocols, and assess effectiveness after any disruption. Our software facilitates increased risk identification, enables consistent risk assessment processes across teams, and tracks business continuity plans development and deployment.
-
Computacenter (UK) Ltd
Visibility, control, remediation of endpoints in real-time, cloud-scale and autonomous - Tanium offers the only converged endpoint management (XEM) platform that combines end-to-end visibility, control, and remediation in one place.
-
S3 Ltd
SaaS Cloud Backup Solution
Keepit provides data protection for all your key SaaS applications in one single, vendor-independent platform. We protect your crucial cloud data created in Microsoft 365, Entra ID (formerly Azure AD), Salesforce, Google Workspace, Azure DevOps, Power Platform, Dynamics 365, and Zendesk.
-
WM Promus
Protect cloud native applications by minimizing their attack surface, detecting vulnerabilities, embedded secrets, and other security issues. Gain insight into your vulnerability posture and prioritize remediation and mitigation according to contextual risk. Accelerate development, enforce compliance, gain real-time visibility and control over your security posture and protect applications.
-
Bytes Software Services
BeyondTrust Privileged Remote Access, Secure, manage, and audit vendor and internal remote privileged access without a VPN. Eliminate a Cybersecurity Threat Vector and Meet Privileged Access Compliance Requirements. bssgc
-
Softcat Limited
Calculate, communicate and compare your cyber risk.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Cloud Management Service offers comprehensive support for your cloud infrastructure, covering applications, databases, and platforms. Our highly-experienced Application Managed Service (AMS) team ensures optimal performance, freeing up internal resources and delivering exceptional value. We support both Open Source and proprietary stacks across IaaS, PaaS, and SaaS environments.
-
Somerford Associates Limited
Imprivata Identity Governance and Administration provides a policy-based approach to simplify and accelerate secure role-based and least privileged access to systems and applications. The solution simplifies and streamlines the entire user lifecycle, improves auditing processes, and delivers on-demand analytics for faster threat evaluation and remediation.
-
NquiringMinds Ltd
NQM Secure Remote Access provides administrative level remote access to systems, using highly secure frameworks.
-
BRADLEYSOFT
Data Backup & Restore, AI-Powered Malware Protection, Centralised Administration / Cloud Console, Patch Management. Any Platforms. Cloud and On-Premises. We provide complete integrated cybersecurity and data protection by implementing Veeam or Acronis solutions. We help to choose and install optimal and cost-effective model based on our Customer needs study.
-
Roke Manor Research
Roke designs, delivers and supports solutions that enable operators to identify, understand and respond to complex behaviour and events. We perform research, technology selection, implementation, consultancy, and training, all closely integrated with cloud. We work with our clients to ensure solutions provide timely and effective support to decision making.
-
virtualDCS Ltd
An established Microsoft 365 estate has over 250 configurable items governing how Microsoft 365 is used within an organisation. CloudCover Guardian for Azure enables you to capture and protect these configurations and pro-actively manage your Microsoft 365 environment. Includes protection for SharePoint, Teams, OneDrive, Exchange and Entra ID (Azure AD).
-
Cloudhouse Limited
Guardian is a vendor agnostic SaaS monitoring tool, providing a single source of truth across security, configuration drift risk and changes for public, hybrid and on premise IT assets. Driving consistent reliable compliant systems at scale.
-
BT PLC
Falcon Data Protection, part of the powerful CrowdStrike Falcon platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
INTEGRITY360 LIMITED
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.