-
SAPPHIRE TECHNOLOGIES LIMITED
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
SEP2 LIMITED
SEP2.security MDR is a cloud-based threat detection and response platform. SEP2 are assisting organisations with honing in on and eradicating threats, building upon Google's Chronicle platforms for SIEM and SOAR.
-
TMC3 LIMITED
Veracode Static Analysis (SAST) is an enterprise-class application security solution, which allows DevOps teams to shift-left in their security approach. Veracode Static Analysis provides fast, automated feedback to developers in the IDE and CI/CD pipeline, conducts a full Policy Scan before deployment, and gives clear guidance to fix issues fast.
-
SOFTCAT PLC
PhishER is a light-weight SOAR platform that automatically analyses and prioritises reported email messages to identify and quarantine malicious email across your organisation. Additionally, transforms in-the-wild phishing emails into training opportunities
by flipping them into simulated phishing campaigns.
PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities
-
PHONEHUB IO LTD
Hydrax is a cloud managed, ultra-secure locked-down operating system for mobile devices such as tablets and phones, enabling them to be used by prisoners and prison staff in custodial environments without the risk of abuse. It has been fully penetration tested and deemed fit for use in prisons.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
SAPPHIRE TECHNOLOGIES LIMITED
Optics™ provides in-depth dynamic automated risk management for operational technology environments. Taking inputs from policy, process and people to technical metadata about your OT environment and its vulnerabilities, Optics™ identifies your highest priority risks and ensures return on investment for your mitigation strategies.
-
BLUEFORT SECURITY LIMITED
F5 Licensing to facilitate Local /Global Load Balancing / Access Policy Manager (VPN) /Advanced Firewall Manager / DNS / App Security Manager / Big IQ Management/Waap/F5 Distributed Cloud Services Essential App Protect & Nginx sundry services to support installation / training.
-
SOFTCAT PLC
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multi-cloud environments.
-
DBAAS LTD
DBaaS as your best digital marketing partner brings you the difference in making your website rank in the popular search engines,SM followers,sales.We make sure that each campaign is positioned to gain high results through our regular digital marketing activities.Clients choose us because of the invincible digital marketing services we provide.
-
ITGL Limited
Services to cover all Palo Alto Security Products including NGFW Firewalls, IPS, Panorama, Cortex XDR, Cortex XSOAR, DNS Security, Prisma Access, Prisma SASE, Prisma Cloud, Enterprise DLP. Assistance towards achieving Cyber Essentials accreditation.
-
BYTES SOFTWARE SERVICES LIMITED
With Network Security Cyber Assurance organizations can fortify their cyber defense from multiple angles. This offering allows IT and security operations leaders to achieve comprehensive network visibility, enforce robust access controls, swiftly respond to incidents, seamlessly integrate within their IT and cybersecurity ecosystem, effectively manage risk, and ensure compliance.
bssgc
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides Workday Financial Management Services, offering government departments robust tools for streamlined financial operations. Our services enhance accuracy, improve compliance, and boost efficiency through comprehensive financial planning, analysis, and reporting capabilities, ensuring transparent and effective management of public funds.
-
Charterhouse Voice & Data
InsightVM provides a fully available, scalable, and efficient way to collect
vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm exposure has reduced.
-
LEFKE IT LIMITED
At LefkeIT, our Workday Security Configuration services are tailored for Government Departments, ensuring robust protection of sensitive data and compliance with regulatory requirements. We specialize in configuring Workday's security settings, roles, and permissions to safeguard your organization's information and mitigate risks.
-
Kick ICT
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
MTI TECHNOLOGY LIMITED
(Palo Alto Networks Cortex XSOAR), (Palo Alto Networks Cortex XDR), (Palo Alto Networks Prisma Cloud), (Palo Alto Networks Prisma SaaS), (Palo Alto Networks VM-Series Next-Generation Firewalls).
Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services.
-
AVELLA SECURITY LIMITED
The Guardicore Centra Security Platform allows you automatically visualise your entire data centre environment, map application dependencies and flows to identify security gaps, and create policies based on asset classification, including AI-powered templates, reducing your attack surface and minimising the risk of Ransomware
-
MONDAS CONSULTING LTD
Purchase Crowdstrike Next Gen SIEM licences to utilise the power of Crowdstrike to collate log data from all of your security stack and generate alarms for a SOC team to triage. Crowdstrike Next Gen SIEM can remediate these alarms using powerful automated playbook actions.
-
INTEGRITY360 LIMITED
Proofpoints Tessian ICES is a AI/ML tool designed to help organisations defend against sophisticated inbound threats such as Phishing, BEC, QR codes etc.
-
MICRO FOCUS
OpenText Core IAM Foundation provides essential Identity and Access Management capabilities that organizations need to support a secure IAM program. The OpenText Core IAM Foundation provides:
• Identity Governance
• Advanced Authentication Limited – a Multi-Factor Authentication (MFA) framework
• Password Management
• Identity Intelligence Basic
-
I-NET SOFTWARE SOLUTIONS LTD
This 2 day training for product owners and stake holders help in understand agile software development and importance of their value to the project. This training also covers the GDS standards and importance of it so that they will ensure the development team is adhere them
-
ARMADILLO SEC LTD
Logpoint's platform brings together Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) to provide monitoring, detection, and alerting of security events or incidents within an IT environment. Providing a comprehensive and centralised view of the security posture of an IT infrastructure.
-
CENTERPRISE INTERNATIONAL LIMITED
Centerprise Email Archiving solution by TitanHQ (ArcTitan) archives email securely allowing for lightening fast search and retrieval. ArcTitan includes full email audit functionality, guaranteeing that emails have not been altered. Compliant with GDPR, eDiscovery, Sarbanes–Oxley, HIPPA, and other legislation for e-discovery, retention and audit
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IdAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt.
-
e2e-assure Ltd
Find vulnerabilities in your external-facing services - before attackers do.
Simple to scale and customise for specific installations, our External Vulnerability Scanning Service enables you to take informed decisions about your external infrastructure.
-
MICRO FOCUS
Voltage Fusion SaaS delivers data-discovery capabilities that enrich data and expose value across our Customer’s deep and rich data eco-systems. Voltage Fusion is built to help mitigate the risks associated with managing and preserving sensitive data while containing the total cost of compliance –from a single source in the cloud.
-
S3 Ltd
Egress Defend is Intelligent Cloud Email Security. It protects against data breaches by reducing human activated risk. Intelligent technologies using AI detect sophisticated phishing attacks, including BEC compromise and account takeover and engage users with contextual, colour-coded warnings embedded in suspicious emails.
-
ZAIZI LTD
Zaizi designs, implements and supports Identity and Access Management solutions using enterprise-grade and open source: Including Keycloak, Redhat, Amazon Cognito, Okta, Microsoft AD and other Cloud based SSO and Multi Factor Authentication (MFA) solutions.
We provide skills and advice guiding you from discovery through to implementation.
-
Lloyds Ventures
HumanFirewall measures, manages and mitigates risk at the Human Layer. Platform uses automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing and Enhances Email-Deliverability using DMARC, SPF, DKIM, MTA-STS, TLS-RPT & BIMI.