-
Stone Technologies Limited trading as Converge Technology Solutions
Stone utilises Cisco Duo to provide Two Factor Authentication.
Duo’s Trusted Access platform is a holistic security solution that reduces your risk of a data breach caused by compromised credentials, known
vulnerabilities and/or exploits.
-
BOXXE LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating
-
Cyberlab
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
NINE23 LTD
The Platform FLEX / EBF Onboarder service enables efficient migration from one EMM or MDM Platform to another. Flex Onboarder replaces the manual process of migrating a Device with an automated User notification and a guidance process supported by a central Administration Console.
-
CHESS ICT LIMITED
"Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service.
You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications."
-
UNBLUR SL.
Unblur helps front-line first responders (Fire Service, Law Enforcement, Civil Protection, SAR...)to make safer and faster decisions in the field. IRIS Core, our Incident Command software provides greater Situation Awareness supporting the decision making, team coordination, and easy & transparent post-incident reporting.
-
OMDA HEALTH ANALYTICS LIMITED
Cloud-based database web application for medical studies, trials and registers.
-
CLARITAS SOLUTIONS LIMITED
Empower users to have complete control of Business Operations Case Management. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.
-
SAPPHIRE TECHNOLOGIES LIMITED
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
SEP2 LIMITED
SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.
-
TMC3 LIMITED
Veracode Static Analysis (SAST) is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Static Analysis provides fast, automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance to fix issues fast.
-
SOFTCAT PLC
PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities
by flipping them into simulated phishing campaigns.
PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities
-
PHONEHUB IO LTD
Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
SAPPHIRE TECHNOLOGIES LIMITED
Optics™ provides in-depth dynamic automated risk management for operational technology environments. Taking inputs from policy, process and people to technical metadata about your OT environment and its vulnerabilities, Optics™ identifies your highest priority risks and ensures return on investment for your mitigation strategies.
-
BLUEFORT SECURITY LIMITED
F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.
-
SOFTCAT PLC
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.
-
DBAAS LTD
DBaaS as your best digital marketing partner brings you the difference in making your website rank in the popular search engines,SM followers,sales.We make sure that each campaign is positioned to gain high results through our regular digital marketing activities.Clients choose us because of the invincible digital marketing services we provide.
-
ITGL Limited
Services to cover all Palo Alto Security Products including NGFW Firewalls, IPS, Panorama, Cortex XDR, Cortex XSOAR, DNS Security, Prisma Access, Prisma SASE, Prisma Cloud, Enterprise DLP. Assistance towards achieving Cyber Essentials accreditation.
-
BYTES SOFTWARE SERVICES LIMITED
With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.
bssgc
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides Workday Financial Management Services, offering government departments robust tools for streamlined financial operations. Our services enhance accuracy, improve compliance, and boost efficiency through comprehensive financial planning, analysis, and reporting capabilities, ensuring transparent and effective management of public funds.
-
Charterhouse Voice & Data
InsightVM provides a fully available, scalable, and efficient way to collect
vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm exposure has reduced.
-
LEFKE IT LIMITED
At LefkeIT, our Workday Security Configuration services are tailored for Government Departments, ensuring robust protection of sensitive data and compliance with regulatory requirements. We specialize in configuring Workday's security settings, roles, and permissions to safeguard your organization's information and mitigate risks.
-
Kick ICT
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
MTI TECHNOLOGY LIMITED
(Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls).
Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.
-
AVELLA SECURITY LIMITED
The Guardicore Centra Security Platform allows you automatically visualise your entire data centre environment, map application dependencies and flows to identify security gaps, and create policies based on asset classification, including AI-powered templates, reducing your attack surface and minimising the risk of Ransomware
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.
-
INTEGRITY360 LIMITED
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
MICRO FOCUS
OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides:
• Identity Governance
• Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework
• Password Management
• Identity Intelligence Basic
-
I-NET SOFTWARE SOLUTIONS LTD
This 2 day training for product owners and stake holders help in understand agile software development and importance of their value to the project. This training also covers the GDS standards and importance of it so that they will ensure the development team is adhere them