-
UNILINK SOFTWARE LIMITED
Unilink's next generation self-service software enables the secure and controlled delivery of digital content and services, tailored to the specific needs of the offender/resident as well as managing every-day tasks, helping them to really engage in change and prepare for reintegration into society.
-
QUADRIS LIMITED
Cisco Umbrella secures your users internet access and controls cloud application usage across networks, branch offices, and roaming users. Cisco Umbrella delivers DNS-layer security, secure web gateway and firewall protection all delivered from a single cloud security service. The platform provides rapid protection to reduce phishing, malware and ransomware threats.
-
ECKOH UK LIMITED
CardEasy enables you to de-scope your contact center environment from PCI DSS, including voice and digital engagement channels. Seamless integration with your existing telephony and IT infrastructure reduces the risks and costs associated with managing compliant card payment transactions in your contact centers, whilst improving customer experience and trust
-
XALIENT HOLDINGS LIMITED
Xalient will provide a fully managed Identity and Access Management service based on the Okta Identity Cloud platform. This platform allows you to orchestrate and administer your user base using Okta’s Workforce Identity toolset.
-
NINE23 LTD
Nine23 offer a fully managed private cloud infrastructure (Platform FLEX) hosted in UK Sovereign, FSC/PASF accredited datacentres, capable of hosting Tier 1 OFFICIAL (SENSITIVE) applications and fully managed service to provide SaaS services. Connections available to government networks (RLI,LECN,PSN,HSCN) and internet-connected. NCSC Cloud Security Principles, Secure-by-Design. Enables secure user-focused applications.
-
MTI TECHNOLOGY LIMITED
Cloud-native security operations platform, service cloud, hybrid, and on-premises environments, combines attack surface management (ASM) and extended detection and response (XDR) in one console to manage organisational cyber risk.
Trend Micro Cloud One (Security, Conformity, Cloud Storage), Micro Network One (Discovery Inspector, Micro Workforce One (Smart Protection Complete), Micro XDR
-
BYTES SOFTWARE SERVICES LIMITED
InsightAppSec is part of Rapid7's security suite, providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks that provide a richer experience and an easier path to full feature sets. bssgc
-
FIRETEXT COMMUNICATIONS LTD
FireText provides a secure and user-friendly web platform for two-way SMS messaging, omnichannel API messaging, RCS, and WhatsApp. Our UK-based cloud platform is accredited to ISO27001, Cyber Essentials Plus and NHS DSP Toolkit standards. We undergo annual penetration testing by a CREST and NCSC CHECK accredited company.
-
LEVETT CONSULTANCY LIMITED
Google Workspace Enterprise Plus is designed for large organisations, providing a complete suite of productivity and collaboration apps, flexible storage options, and enterprise-grade video conferencing with up to 1K participants. Live-stream to 100K viewers in-domain and across trusted domains, and benefit from the most advanced enterprise-grade security and management tools.
-
LRQA
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Grove Information Systems
Cylance leverages AI to detect and prevent malware from executing in real time. By taking a mathematical approach to malware identification utilising patent-pending, machine learning techniques instead of reactive signatures and sandboxes, Cylance renders new malware, viruses, bots, and unknown future variants useless.
-
INTEGRITY360 LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials.
-
JBi Digital
JBi creates custom-built, interactive and secure cloud-based apps for your business that are completely bespoke and cost effective.
Our collaborative, user-centred approach to web app development is driven towards bringing your organisation the best possible engagement and results with optimal technology.
-
SOFTCAT PLC
Secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA, and GDPR. It reduces the risk of data loss and non-compliance with a fully-auditable and managed file transfer solution.
-
FCS SOFTWARE SOLUTIONS LIMITED
ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.
-
Q-SOLUTION LIMITED
A Private Certificate Authority service, hosted within public cloud, providing X.509 client certificates for users, devices and systems. Designed for use by an organisation or closed community for applications such as API messaging, server mutual TLS, VPNs, IoT devices, mobile device or laptop authentication, user access to secure systems.
-
TECHNOXANDER LTD
TechnoXander's Confirmation of Payee (CoP) solution is a name-checking service designed to reduce misdirected payments and provide greater assurance that payments are being sent, and collected from, the intended account holder. It aims to enhance customer confidence, mitigate APP Fraud risks, and assist financial institutions in fulfilling their regulatory obligations.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.
-
VE3 GLOBAL LTD
The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.
-
INTEGRITY360 LIMITED
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.
-
COMMUNICATION STEM LIMITED
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.
-
GET SWARMS LIMITED
Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.
-
SALUS DIGITAL SECURITY LIMITED
Red Teaming is the process of using Tactics, Techniques, and Procedures
(TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.
-
XEROX (UK) LIMITED
As a Direct-Bill Cloud Service Provider, Xerox's managed service of Microsoft's cloud-based office productivity, collaboration and security suite of applications. ISO27001 hosted MS Azure
Applications include, Exchange, Outlook, Teams, OneDrive, SharePoint, Defender, Autopilot, Intune and much more.
Project work and ongoing support is available as part of this service.
-
AVELLA SECURITY LIMITED
Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA
-
BYTES SOFTWARE SERVICES LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc
-
NETPREMACY LIMITED
Netpremacy provides Google Workspace Marketplace applications to integrate into your domain. Google Workspace Marketplace offers a wide range of quality enterprise apps: CRM, Task Management and Admin tools that add functionality and features to your native Workspace apps. Includes Recommended for Google Workspace, Google Drive, Gmail, Communications and Utilities.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..
-
SYNERGI SOFTWARE LIMITED
Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.
-
BYTES SOFTWARE SERVICES LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc