-
BOXXE LIMITED
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
CDW LIMITED
Sophos XDR (Extended Detection & Response) provides a rich data set and deep analysis for threat detection, investigation, and response actions for both dedicated SOC teams and IT admins across a mixed state environment. 3rd party integration packs allow for the extra visability across other 3rd party security vendors.
-
Netpremacy Limited
Backupify protects your most important cloud data through secure, automatic, daily backup. Backupify allows search and restore of files with advanced administrative features, safeguarding your business from data loss caused by user errors, malicious deletions, hackers, and application errors. Backs-up data in Google Mail, Drive, Calendar, Contacts, and Shared Drives.
-
INTEGRITY360 LIMITED
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behavior. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
PHOENIX SOFTWARE LIMITED
SophosManaged Risk is a vulnerability and external attack surface management service powered
by Tenable technology and delivered by Sophos threat exposure and remediation
experts. With SophosManaged Risk, our experienced analysts identify high-priority cybersecurity
-
COMPUTACENTER (UK) LIMITED
WatsonX.Governance provides end-to-end monitoring for machine learning and generative AI models. Monitor your foundation model and machine learning assets from request to production. Collect facts about models that are built with IBM tools or third-party providers in a single dashboard to aid in meeting compliance and governance goals.
-
MeVitae
Helping organisations hire smarter, faster and fairer, by mitigating unconscious and algorithmic bias. Improving diversity and inclusion typically involves three stages: identifying areas for improvement, selecting appropriate interventions, and assessing their impact. MeVitae’s analytics assists you throughout each of these stages, whilst seamlessly integrating with 20+ ATS' and HR tools.
-
COMMUNICATE TECHNOLOGY LIMITED
We offer comprehensive breach detection and response, powered by Microsoft Sentinel, delivered by our 24/7 UK-based Security Operations Centre. Our service uses cloud-native SIEM and SOAR capabilities for rapid detection, investigation, and response to threats across cloud, hybrid, and on-premises environments, supported by expert analysts and automation.
-
SOFTCAT PLC
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
NEO TECHNOLOGY LIMITED
Empower staff and residents with offline functionalities and a mobile app powered by Neo Technology. Access essential features, submit requests, and receive alerts seamlessly, even without an internet connection. Improve convenience, engagement, and operational efficiency with this innovative solution.
-
SOFTCAT PLC
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
CHESS ICT LIMITED
Sophos XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
COMPUTACENTER (UK) LIMITED
Combat email threats comprehensively with end-to-end solutions, spanning detection to response. Automate abuse mailbox handling to swiftly eliminate user-flagged phishing emails. Tackle diverse threats like phishing, BEC, supplier fraud, ransomware, and malware. Enhance visibility into attack targets, methods, user responses, and compromises for proactive defense strategies.
-
BYTES SOFTWARE SERVICES LIMITED
Train end users to be more resilient against threats they receive. Augment threat protection with a robust security awareness training programme that integrates with your email security controls and includes phishing simulations, cultural and knowledge assessments, comprehensive training and awareness materials. bssgc
-
Grove Information Systems
MIRACL Trust Proof is a service using the Designated Verifier Signature (DVS) digital signature scheme that allows the signing of any digital transaction, user action, data transfer or Machine-Machine interaction to make it irrefutable. Authenticity of action can be proven due to the immutable and cryptographic nature of the signatures.
-
Cloudflare, Inc.
Stop data loss, malware, phishing and ransomware attacks with the most performant Zero Trust application access and Internet browsing platform.
Replace legacy security perimeters with Cloudflare global edge, making the Internet faster and safer for your teams.
Verify, filter, Isolate, inspect all devices you manage and devices you don’t.
-
SOFTCAT PLC
InsightAppSec part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting complex, utilizing JavaScript frameworks, like React and Angular, that provide a richer experience and easier path to full feature sets, but also present challenges to secure those apps.
-
COMMUNICATE TECHNOLOGY LIMITED
Detecting and Preventing breaches. XDR / MDR / SIEM / SOC. Monitoring and detection as a fully managed Service
-
SAS SOFTWARE LIMITED
SAS® Fraud Insights on G-Cloud provides an innovative way of joining massive amounts of data to visualise new patterns and trends across complex fraud and audit typologies. SAS uses its powerful visualisation, data quality and machine learning technologies together with speed-of-thought analysis to find and detect fraud fast at scale.
-
TotalMobile
Totalmobile is the market leader in construction logistics harnessing its enterprise digital platform supporting major construction/infrastructure programmes to achieve excellence in operational efficiencies and compliance monitoring. Key aspects of our platform include; logistics tracking, lone working, asset/inventory management, delivery management, appointment booking, integrated routing/visual maps, navigation/location APIs and real-time analytics.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Refund Management Solutions streamline the process of issuing refunds in the housing sector. Our system automates refund requests, tracks refund statuses, and facilitates timely reimbursements to tenants. With built-in reporting and communication tools, landlords can efficiently manage refunds while maintaining transparency and compliance.
-
SOFTCAT PLC
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
SPINDOGS LTD
Kentico web content management system. Mobile optimised, accessible development. Spindogs' Kentico CMS platform provides bespoke templates for content editors. GDPR compliant Kentico CMS forms and tagging are out-of-the-box. Kentico CMS offers version control, integrations, SSO, and multilingualism. Kentico content management system is a licensed product, user friendly, and fully customisable.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Voids Management Solution optimises the process of managing vacant properties in the housing sector. Leveraging advanced case management and task assignment features, it streamlines workflows, reduces turnaround times, and enhances operational efficiency, ensuring swift property occupancy and tenant satisfaction.
-
EQUINE REGISTER LIMITED
Enables organisations exchange data and record the arrival and departure of an equine, livestock, companion animals (including dogs and cats) also check the biosecurity status of an animal in advance of its arrival. Supports recording of double ended movements and communications between organisations and users to manage biosecurity and risk.
-
Concur
Concur Invoice allows you to capture and automate paper and electronic invoices, then integrate those payments into a single system for managing all of your spending. You’ll literally be able to track every penny in one, simple AP system and access it anytime, anywhere with the Concur mobile app.
-
CDW LIMITED
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
LEFKE IT LIMITED
LefkeIT delivers comprehensive Threat Intelligence Services. Our expert team monitors global threats, analyzes trends, and provides actionable insights tailored to your organization's risk profile. With proactive threat detection and response measures, we help fortify your defenses against evolving cyber threats, ensuring resilience and protection of your assets.
-
SAPPHIRE TECHNOLOGIES LIMITED
An Identity and Access Management (IAM) system is designed to be a single solution for managing user access and permissions within an organisation’s environment. Covering solutions for Privileged Account and Session Management (PASM), Privilege elevation and delegation management (PEDM), Secrets Management and Cloud Infrastructure entitlement management (CIEM).
-
ISx4
ISx4 specialises in the implementation of analytics and AI solutions on cloud infrastructure. Options include Azure, AWS, SAS, Watsonx, Posit, Anaconda and bespoke solutions. ISx4 can host and own the cloud environment or deploy to the client cloud environment . In-life management and support is part of the service offering.