-
ARMADILLO SEC LTD
Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.
-
CENTERPRISE INTERNATIONAL LIMITED
Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IdAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt.
-
e2e-assure Ltd
Find vulnerabilities in your external-facing services - before attackers do.
Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.
-
MICRO FOCUS
Voltage Fusion SaaS delivers data-discovery capabilities that enrich data and expose value across our Customer’s deep and rich data eco-systems. Voltage Fusion is built to help mitigate the risks associated with managing and preserving sensitive data while containing the total cost of compliance –from a single source in the cloud.
-
S3 Ltd
Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.
-
ZAIZI LTD
Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions.
We provide skills and advice guiding you from discovery through to implementation.
-
Lloyds Ventures
HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.
-
Planet IT
Barracuda Cloud to Cloud Backup is a backup and archiving solution for Office 365. Covering email, SharePoint, One Drive for Business and Teams.
-
Armour Comms
Secure enterprise video conferencing, screen sharing and in-app messaging for iOS/ Android devices. Documents and chats associated with conference call benefit from the trusted security of the Armour mobile platform. Unity uses MIKEY-SAKKE IBE. Participants on a call can be certain that only other invited attendees can join the conference.
-
GET SWARMS LIMITED
Our Incident Management Solution is a systematic approach to identifying, responding to, and resolving unexpected events or disruptions within an organization. It involves processes and tools for promptly addressing incidents, minimizing their impact on operations, and restoring normalcy. Swarms goal is to ensure business continuity, minimize downtime, and mitigate risks.
-
FuseMail
Powerful anti-spam, anti-phishing, and antivirus technology that crushes unwanted or malicious messages while increasing operational efficiency. Integrate VIPRE Email Security Cloud into any email client or server including Microsoft Outlook, Office 365, Google Apps, Lotus Notes. With the ability to use attachment sandboxing to safely validate extracted attachments.
-
SOFTCAT PLC
Web Application and API protection. With deep application contextual analysis, eliminates the trade-off between level of security and complexity of managing application security. Whether application is hosted in data centre or in a public/private cloud, CloudGuard's innovative decision engine covers, OWASP top ten attacks, API attacks, blocks automated attacks (Bots)
-
SEARCHABILITY (NS&D) LIMITED
We provide technically qualified resource, resource augmentation and SoW across a range of Service offerings.
-
DO Business Services Limited
Azure Virtual Desktop enables users to securely use the applications, files and services in their work environment without exposing the systems to Cyber Security threats. Only a web browser is required or for a richer experience the Microsoft Remote Desktop tool. Enabling a mobile workforce is now simple and secure.
-
CriticalArc Ltd
Critical Arc, a global tech innovator, designs and delivers a distributed command and control solution, SafeZone™, which is revolutionising the way organisations manage day-to-day safety and security operations. SafeZone provides response teams with complete operational awareness, to enhance the protection of dispersed people, facilities, and assets, while delivering efficiency savings.
-
CDW LIMITED
Azure Active Directory (Azure AD) cloud-based identity and access management service, secures employees sign-in and access resources such as Office365, Azure portal, and thousands of other SaaS applications. Internal resources, such as applications on your corporate network and intranet, along with any cloud applications developed by your own organization.
-
Khipu Networks Limited
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
Proact IT UK Limited
Proact’s Security Operations for CryptoSpike is a fully managed service offered to improve customers’ ransomware protection on NetApp servers being used to serve NAS based file content. The service delivers the following capabilities and features:
-
Kick ICT
Our managed IT service delivers outstanding IT support and access to a wide range of leading technology providers, meaning we can provide a scalable, secure and modern IT environment for our customers.
Service includes options for 24/7x365 support, cyber security, cloud services, datacentre, back up and disaster recovery and hardware.
-
2T SECURITY LTD
RiskTree is a structured approach for risk management. Based around the well-established concept of attack trees, RiskTree provides a systematic way of capturing and prioritizing the risks to your business and systems. It presents its results in an easy-to-understand format that integrates well with existing business processes.
-
CDW LIMITED
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
LEFKE IT LIMITED
LefkeIT offers expert Data Loss Prevention (DLP) Strategy and Implementation services. Our skilled team designs and deploys comprehensive DLP frameworks to safeguard sensitive data across your organization. From policy development to technology implementation, we ensure proactive protection against data breaches and regulatory compliance.
-
Khipu Networks Limited
HPE Aruba's Cloud Managed Networking Services offers a simple, secure and cost-effective way to deliver, manage and monitor wireless access points, mobility controllers, LAN switches, top of rack networking and security appliances, Cloud Authentication and SD-WAN. This service can be delivered in a number of flexible ways.
-
BYTES SOFTWARE SERVICES LIMITED
Advanced Threat Protection for users who do not want hardware. A Cloud-based solution allows you to quickly deploy web and email security to all users, at any location, without the need to purchase or maintain hardware or software. This will simplify your network and reduce total cost of ownership. bssgc
-
Prosperon Networks Ltd
SolarWinds® User Device Tracker (UDT) delivers automated user and device tracking along with powerful switch port management capabilities. Stay in control of who and what is connecting to your network. Quickly find a device or user with a simple search on a username, IP address, hostname, or MAC address.
-
e2e-assure Ltd
SOC, EDR, MDR, XDR, NDR, TDR, Forensic Analysis, Cloud Security, Sophos Intercept-X, Palo Alto Cortex, Falcon CrowdStrike, Rapid7, SentinelOne, Trend Micro XDR, Carbon Black, Panda, Cybereason, Cynet, ESET Inspect Protect, Darktrace, Antigena, Qualys, Cumulo, Arctic Security Early Warning System, Intelfinder, Dark Web, Threat Intelligence, Remedy, ServiceNow, Jira, Tenable, Nessus, Netography
-
CDW LIMITED
Phone System in Office 365 gives you PBX capabilities, but without the complicated and expensive equipment. Phone System allows you to replace your existing on-premises PBX system with a set of features delivered from Office 365 that is tightly integrated into your cloud experience.
-
VIABLE DATA LTD
Experts in biometrics and security controls, Viable Data offer a range of Identity Assurance Services, covering strategy, design, development, operational support and implementation services. With digital identity industry expertise, we provide services ranging from securing digital channels to performing biographical and biometric checks, ensuring the accuracy of an identity claim.
-
THE SERVER LABS LTD
Sonatype products such as Maven, Nexus and Lifeycycle (formerly CLM) and Lifecycle Cloud form the backbone of Devops. Thousands of teams choose Sonatype tools to develop and manage their software projects and artifacts. Clouds supported: AWS, Google Compute Engine, Azure, UKCloud