-
DEFENCE DATASEC LTD
Defence DataSec delivers top-tier Data Security and Privacy Services, safeguarding your sensitive information from threats and ensuring compliance with regulations.Through advanced encryption, access controls, and monitoring, we protect your data assets from unauthorized access and breaches. Partner with us to mitigate risks, build customer trust, and uphold data privacy standards.
-
NEO TECHNOLOGY LIMITED
Neo Technology's AWS Managed Services provide comprehensive support to optimise your AWS platform, allowing you to focus on your core services and users. Our tailored solutions cover AWS infrastructure, platform, and software-as-a-service (SaaS) offerings, including microservices, databases, AI/machine learning, and IoT applications.
-
MICRO FOCUS SOFTWARE UK LTD
The Network Operations Management (NOM) suite provides market leading management for enterprise networks, across public, managed and private clouds, integrating capabilities to monitor fault, performance, configuration, and compliance of physical, virtual, and software defined network (SDN) infrastructure. The Suite has the broadest and deepest multi-vendor support beyond simple SNMP/ICMP monitoring.
-
CYBEXER (UK) LTD
The Cyber Resilience Training Platform (SaaS) delivers a cloud-based solution for organizations to practice cyber resilience. It provides scalable, realistic simulations tailored to business and public sector cyber threats, emphasizing response and recovery to ensure organizations can withstand and quickly rebound from cyber incidents.
-
BOXXE LIMITED
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications
-
PHOENIX SOFTWARE LIMITED
Sophos Central Device Encryption lets you centrally manage Windows BitLocker and macOS FileVault native device encryption. With Sophos Central’s web-based management, there is no server to deploy and no need to configure back-end key servers.
-
CHARTERHOUSE VOICE & DATA LIMITED
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
BOOMERANG I-COMMS LTD
An intelligent platform to automate appointment management using our patented threading technology for 2-way messaging. We make it easy to manage appointments and integrate with your booking system / schedule. SMS, EMAIL AND IVR used to set, remind and cancel appointments. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
BOXXE LIMITED
Manage digital/TLS certificates in cloud, with CA agnostic Keyfactor Command. Discover all of your certificates, public & private, across your
enterprise & achieve single screen visibility & control.
-
DEFENCE DATASEC LTD
At Defence DataSec, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.
-
Gaiasoft International Limited
Integrated, comprehensive, customisable incorporating healthcare management, health records, telemedicine, real-time patient monitoring and personalized treatment plans. Efficient marketplace of labs and imaging providers. Enhances accessibility, improves diagnostic accuracy. Proactive population health through data analytics and learning and healthy family habits.
-
SAP Concur
Concur Invoice allows you to capture and automate paper and electronic invoices, then integrate those payments into a single system for managing all of your spending. You’ll literally be able to track every penny in one, simple AP system and access it anytime, anywhere with the Concur mobile app.
-
PROACT IT UK LIMITED
Proact’s Vulnerability Assessment as a Service (VAaaS) provides a vulnerability analysis service that enhances traditional options with specialist security analysis, advice and remediation recommendations, and robust ITIL ® based support and service management processes. Proact's security specialists will advise and remediation options threat landscape and enterprise security best practices.
-
CIVICA UK LIMITED
Civica provides local authorities throughout the UK with a diverse range of electoral management software and services. Our secure, web-based system is kept fully compliant with UK Legislation and offers all the benefits of a true Cloud Native solution.
-
PENTAGULL LTD
Our elected members ward enquiries system is a cloud software service that readily and effectively meets all the requirements for managing councillor enquiries across the organisation, from initiating the enquiry through our intuitive and simple online form through to case resolution via back-office.
-
DBAAS LTD
We provide the cost effective solutions with the migration of existing system&technological upgrade with a fresh UI for better look & feel. Technologies that we serve RESTful Web Services,Angular, Node JS, HapiJs, Laravel, Codeigniter,Python.Technologies that we serve @ DBaaS Native Applications - Android, iOS & Hybrid Applications - Ionic, Flutter.
-
CENTRAL NETWORKS AND TECHNOLOGIES LIMITED
N-Able is used to monitor physical and virtual devices in a customer's networks.
-
ABM INTELLIGENCE LIMITED
ACOS module for managing Protected Persons (Witness Protection) requirements is highly secure and easy to use. Capture all data, identity, financial management, identification documentation including passport, driving licence, family officer. Identified areas of risk are assessed, mitigated and managed effectively ensuring those involved in the process remain fully protected.
-
CDW LIMITED
CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
ARMOUR COMMUNICATIONS LIMITED
Armour Bridge provides secure controlled access between Armour Mobile and third party Instant Messaging (IM) / chat applications. It supports cross domain interoperability and can use popular open-source capabilities like Matrix to exchange messages with consumer apps like Signal or WhatsApp.
-
CONTENT SQUARE LTD
Outcome: understand service users digital journeys and experience.
Our analytics platform analyses billions of digital behaviours, providing session replay, unique metrics, journey maps, visualisations, and recommendations to increase engagement, reduce costs to serve, improve user experience and identify issues / errors / bugs / frustration / fraud.
-
PENTAGULL LTD
Our blue badges system is a cloud software service for the effective management of blue badges. Our system facilitates enhanced efficiencies, tangible savings and improved customer satisfaction levels. It integrates to the Department for Transport (DfT) portal and will automatically retrieve new Blue Badge applications.
-
BYTES SOFTWARE SERVICES LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss. bssgc
-
VE3 GLOBAL LTD
VE3's email protection defends against sophisticated threats in real-time, with automated analysis and detonation of suspicious content and URLs. Gain insights into targeted individuals and attack categories, with features for investigating blocked messages and tracing URLs, ensuring proactive cybersecurity measures.
-
PHOENIX SOFTWARE LIMITED
Identify misconfigurations and flaws in your Active Directory environment to eliminate attack paths before they can be exploited.
-
SAPPHIRE TECHNOLOGIES LIMITED
Risk-based view of your identified vulnerabilities to identify, investigate and prioritise what is most critical.
Managed in the cloud, Tenable Vulnerability Management provides the industry's most comprehensive vulnerability coverage with real-time assessment of your organisation. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and prioritise remediations
-
BOOMERANG I-COMMS LTD
Boomerang can manage multiple vacancies for temporary appointments, one-off events or recurring requirements. It contacts, counts and fulfils based on requirement. System manages shifts, overtime and emergency manning. It informs a candidate pool of new vacancies, developing rosters and manages out-of-hours support. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
TERRAQUEST SOLUTIONS LIMITED
The Consultee Exchange Centre supports the application submission portal by providing a central hub for communication between all stakeholders, allowing invited consultees to respond to requests for feedback about a development. The hub also ensures the information gathering and consultation phase of application decision-making is productive and efficient.
-
BOOMALERT LIMITED
Remote Monitoring service provides monitoring without needing a separate app or device. Seamlessly integrates and swiftly deploys to lone workers, vulnerable individuals, and remote or high-risk environments, ensuring quick accessibility. Ideal for lone workers, remote employees, vulnerable persons, student safety, and high-risk occupations.
ISO-27001, Cyber Essentials, and Cyber Essentials Plus.
-
PROACT IT UK LIMITED
Proact’s security services offer a comprehensive defense platform that offers a combination of human, automation, and machine intelligence, and real-time monitoring of the customer software infrastructure, services are provided directly through our security operations security operations centre (SOC).