-
Planet IT
Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.
-
SOFTCAT PLC
Secure collaboration and automated file transfers of sensitive data and advanced workflow automation capabilities without the need for scripting. Encryption and activity tracking enable compliance with regulations such as PCI, HIPAA, and GDPR. It reduces the risk of data loss and non-compliance with a fully-auditable and managed file transfer solution.
-
FCS SOFTWARE SOLUTIONS LIMITED
ComplaintsPro manages adult and child social care complaints; all types of corporate complaints; as well as FOI and SAR requests, enabling all complaints to be maintained in one place.
-
Q-SOLUTION LIMITED
A Private Certificate Authority service, hosted within public cloud, providing X.509 client certificates for users, devices and systems. Designed for use by an organisation or closed community for applications such as API messaging, server mutual TLS, VPNs, IoT devices, mobile device or laptop authentication, user access to secure systems.
-
TECHNOXANDER LTD
TechnoXander's Confirmation of Payee (CoP) solution is a name-checking service designed to reduce misdirected payments and provide greater assurance that payments are being sent, and collected from, the intended account holder. It aims to enhance customer confidence, mitigate APP Fraud risks, and assist financial institutions in fulfilling their regulatory obligations.
-
BT PLC
The BT Managed Endpoint Security CrowdStrike service utilises BT’s managed security services capability and CrowdStrike's EDR technology to provide customers with the capabilities to detect and prevent ransomware attacks, malware infections, and other advanced threats that target the security of customer's endpoints around the clock.
-
VE3 GLOBAL LTD
The system proactively identifies emerging network threats such as DDoS attacks, web attacks, and brute force attempts, triggering alerts within security systems. It enhances security by offering a predictive strategy to preemptively counter the attack, thereby minimizing potential damage and ensuring robust system protection.
-
INTEGRITY360 LIMITED
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.
-
Communication-STEM Ltd
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.
-
CYBERLAB CONSULTING LTD
Providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.
-
GET SWARMS LIMITED
Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.
-
SALUS DIGITAL SECURITY LIMITED
Red Teaming is the process of using Tactics, Techniques, and Procedures
(TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.
-
XEROX (UK) LIMITED
As a Direct-Bill Cloud Service Provider, Xerox's managed service of Microsoft's cloud-based office productivity, collaboration and security suite of applications. ISO27001 hosted MS Azure
Applications include, Exchange, Outlook, Teams, OneDrive, SharePoint, Defender, Autopilot, Intune and much more.
Project work and ongoing support is available as part of this service.
-
AVELLA SECURITY LIMITED
Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA
-
BYTES SOFTWARE SERVICES LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc
-
Netpremacy Limited
Netpremacy provides Google Workspace Marketplace applications to integrate into your domain. Google Workspace Marketplace offers a wide range of quality enterprise apps: CRM, Task Management and Admin tools that add functionality and features to your native Workspace apps. Includes Recommended for Google Workspace, Google Drive, Gmail, Communications and Utilities.
-
Planet IT
Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.
-
BT PLC
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..
-
Synergi Software Limited
Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.
-
BYTES SOFTWARE SERVICES LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc
-
LINEAL SOFTWARE SOLUTIONS LIMITED
Lineal provide Phishing Campaign design and execution services for customers followed by management reporting and end user training to support real business change and develop improved awareness of modern cyber security risks. We also provide full support and are a Microsoft Gold and KnowBe4 partner providing licensing and support.
-
CDW LIMITED
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
QUADRIS LIMITED
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.
-
Fusion Business Solutions (UK) Limited
BMC Helix Operations Management is a turnkey solution that provides a comprehensive view of how key services are performing, so IT knows immediately if customer experiences may be impacted. Recognised by Gigacom & Forrester as a Market Leader for AIOps
-
SOMERFORD ASSOCIATES LIMITED
Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.
-
INTEGRITY360 LIMITED
Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)
-
CDW LIMITED
Unify critical advanced endpoint management and security solutions. Simplify your endpoint management experience, improves security posture, and keeps people at the centre with exceptional user experiences.
Empower IT and security teams with data science and AI to increase automation, move from reactive to proactive in addressing endpoint and security challenges.
-
LEFKE IT LIMITED
LefkeIT specializes in Google Cloud Cost Management and Optimization, helping businesses maximize their cloud investment while minimizing expenses. Our expert consultants analyze your usage patterns, identify cost-saving opportunities, and implement strategic optimization measures.
-
CLARITAS SOLUTIONS LIMITED
Empowers users to have complete control of their property management cases. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.
-
CDW LIMITED
Rubrik provides a zero trust data protection platform across all data and applications whether located on premises or in the public, private or hybrid cloud. Rubrik provides Identity Recovery, Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane