-
INTEGRITY360 LIMITED
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to networks, ensuring strengthened defense against cyber-threats.
-
Communication-STEM Ltd
Armis Centrix is a cybersecurity solution providing organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security-posture of devices connected to networks, ensuring a strengthened defense against cyber-threats.
-
CYBERLAB CONSULTING LTD
Providing Dynamic Application Security Testing (DAST) for mature and maturing Application Security professionals. Apps are getting more and more complex, utilizing complex JavaScript frameworks, like React and Angular, that provide a richer experience and an easier path to full feature sets, but also present challenges to secure those apps.
-
GET SWARMS LIMITED
Our Privacy Management Platform centralizes organizational privacy office operations. Whether on cloud or on-premises, this tool aids GDPR compliance, managing tasks like data inventory, privacy impact assessments, breach notifications, subject access requests, and compliant workflows seamlessly.
-
SALUS DIGITAL SECURITY LIMITED
Red Teaming is the process of using Tactics, Techniques, and Procedures
(TTPs) to emulate a real-world threat with the goals of training and measuring the effectiveness of the people, processes, and technology used to defend an environment.
-
XEROX (UK) LIMITED
As a Direct-Bill Cloud Service Provider, Xerox's managed service of Microsoft's cloud-based office productivity, collaboration and security suite of applications. ISO27001 hosted MS Azure
Applications include, Exchange, Outlook, Teams, OneDrive, SharePoint, Defender, Autopilot, Intune and much more.
Project work and ongoing support is available as part of this service.
-
AVELLA SECURITY LIMITED
Software license and optional deployment services for Okta Identity Management, SSO and MFA / 2FA
-
BYTES SOFTWARE SERVICES LIMITED
BeyondTrust Identity Security Insights is a solution providing a way to gain a centralised view of identities, entitlements and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. bssgc
-
Netpremacy Limited
Netpremacy provides Google Workspace Marketplace applications to integrate into your domain. Google Workspace Marketplace offers a wide range of quality enterprise apps: CRM, Task Management and Admin tools that add functionality and features to your native Workspace apps. Includes Recommended for Google Workspace, Google Drive, Gmail, Communications and Utilities.
-
Planet IT
Cloud-managed Endpoint Security including Threat Prevention, Behavioural Analysis & Threat Remediation as well as Endpoint Productivity Controls such as Device Control, Data Leakage Prevention, Application Control, Web Security etc.
-
BT PLC
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further past the endpoint to cover the identity and account based attack surface..
-
Synergi Software Limited
Office 365 provides industry leading productivity and collaboration tools for Office based and remote workers. Delivering the power of cloud productivity to organisations of all sizes, combining Microsoft Office desktop suite with cloud-based versions of next-generation communications and collaboration services, including Exchange, SharePoint, Teams & OneDrive, MS Entra.
-
BYTES SOFTWARE SERVICES LIMITED
Delivers web security from an innovative NanoAgent within a browser, inspecting all SSL traffic on the endpoint and preventing malicious behaviors. Zero-Phishing technology identifies and blocks the use of phishing sites in real time. Sites are inspected and if found malicious, the user is blocked from entering credentials. bssgc
-
LINEAL SOFTWARE SOLUTIONS LIMITED
Lineal provide Phishing Campaign design and execution services for customers followed by management reporting and end user training to support real business change and develop improved awareness of modern cyber security risks. We also provide full support and are a Microsoft Gold and KnowBe4 partner providing licensing and support.
-
CDW LIMITED
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
QUADRIS LIMITED
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.
-
Fusion Business Solutions (UK) Limited
BMC Helix Operations Management is a turnkey solution that provides a comprehensive view of how key services are performing, so IT knows immediately if customer experiences may be impacted. Recognised by Gigacom & Forrester as a Market Leader for AIOps
-
SOMERFORD ASSOCIATES LIMITED
Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.
-
INTEGRITY360 LIMITED
Check Point CloudGuard WAF provides Web Application and API protection. With contextual analysis, it eliminates the tradeoff between security and complexity of managing application security. Whether your application is in a data center or public/private cloud, CloudGuard's innovative, decision engine covers, OWASP top ten attacks, API attacks. blocks automated attacks(Bots)
-
CDW LIMITED
Unify critical advanced endpoint management and security solutions. Simplify your endpoint management experience, improves security posture, and keeps people at the centre with exceptional user experiences.
Empower IT and security teams with data science and AI to increase automation, move from reactive to proactive in addressing endpoint and security challenges.
-
LEFKE IT LIMITED
LefkeIT specializes in Google Cloud Cost Management and Optimization, helping businesses maximize their cloud investment while minimizing expenses. Our expert consultants analyze your usage patterns, identify cost-saving opportunities, and implement strategic optimization measures.
-
CLARITAS SOLUTIONS LIMITED
Empowers users to have complete control of their property management cases. Secure, scalable, with full GDPR hosted in the UK offering quick and flexible deployment with no upfront costs. Full multi-agency working utilising cutting edge technology ensuring full UK data sovereignty for efficient and sustainable operations.
-
CDW LIMITED
Rubrik provides a zero trust data protection platform across all data and applications whether located on premises or in the public, private or hybrid cloud. Rubrik provides Identity Recovery, Ransomware detection and remediation, Sensitive Data Discovery , Incident containment and Orchestrated Application Recovery all within a single management plane
-
Barrier Networks
CrowdStrike Falcon® Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon® platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
VE3 GLOBAL LTD
SAP Cloud Platform (VCP) is a platform-as-a-service (PaaS) product offering a development and environment for cloud applications. Built on SAP HANA in-memory database technology, SCP utilizes open source and open standards, enabling independent software vendors, startups, and developers to build and test cloud applications based on VE3 in-memory database technology.
-
IBM UNITED KINGDOM LIMITED
IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that uncovers vulnerabilties and protects sensitive on-premises and cloud data.
-
Central Networks and Technologies Ltd
Central Intercept X Advanced for Server includes multiple policies, control capabilities (Web, Peripheral, Application, DLP), and threat cases. Cloud Security Posture Management (CSPM) service for AWS, Azure, and Google Cloud includes Inventory of cloud resources, identification of insecure workload configuration, suspicious access events, and unusual network traffic vulnerabilities.
-
BECRYPT LIMITED
Aimed at Public Sector departments or projects that are ‘cloud-based’ or infrastructure free, this service helps organisations deploy quickly, scale users and maintaining security thus gaining maximum value from the desktop estate.
Helping organisations align, and more importantly stay aligned, with the End User Device Guidance for Windows and macOS.
-
Epiq Systems Ltd
Microsoft 365 is a cloud based integrated Enterprise productivity application that helps transform the way organisations work. It enables employees to connect to people, collaborate, share content and information from any device and anywhere, whilst securely safeguarding organisations’ assets with intelligent security.
-
Prosperon Networks Ltd
SolarWinds® Hybrid Cloud Observability (HCO) is a comprehensive, integrated, and full-stack observability solution designed to integrate data from across the IT ecosystem, including networks, servers, applications, databases, and more. Our platform includes built-in intelligence to help customers optimize performance, ensure availability, and reduce remediation time across on-premises and multi-cloud environments.