-
SOMERFORD ASSOCIATES LIMITED
SoSafe offers effective awareness training for companies. With our interactive E-Learning Platform and customised Phishing Simulation, we continuously educate our customers, employees and raise awareness of
cyber security, data protection and compliance.
-
NDI TECHNOLOGIES LTD.
Hosted, accredited and audited access to the Police National Computer service via a secure software gateway.
-
LRQA
Cortex XDR is the world’s first detection and response app that natively integrates network, endpoint and cloud data to stop sophisticated attacks. Leveraging advanced AI / ML driven techniques, Cortex XDR unifies prevention, detection, investigation, and response in one platform for unrivalled security and operational efficiency.
-
HYPER TALENT SOLUTIONS LTD
At Hyper Talent Solutions Ltd, our SAP Security and Compliance Services are tailored for Government Departments. We specialize in ensuring the security and compliance of SAP systems, implementing robust controls, and conducting audits to mitigate risks. Trust us to safeguard your SAP environment and maintain regulatory compliance with confidence.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Salesforce Government Cloud Services,tailored for government agencies and departments.Our expert consultants collaborate closely with government entities to implement Government Cloud-solutions that enhance citizen engagement,streamline operations,and ensure data security and compliance.We configure Salesforce Government Cloud to align with specific governmental objectives,ensuring efficient and effective government-services.
-
COMPUTACENTER (UK) LIMITED
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
Lloyds Ventures
SecurityRating.com: See your attack surface and third-party (vendor) risk with unrivalled clarity. Reduce your team’s workload with automation. Continuously monitor IT infrastructure. Get insights into vulnerabilities and threats, helping organisations manage risk and comply with regulations. Third-Party & Supply Chain Risk & Attack Surface Management made easy. Finally.
-
CDW LIMITED
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
LOGIQ CONSULTING LTD
DISX is a secure, scalable and fully managed platform, aligned to Secure-by-Design principles, DART accredited to OFFICIAL (including SENSITIVE), enabling collaboration between MOD, other Government Departments and Defence Industry at OFFICIAL. Actively used by Defence Industry and Government supporting entire organisations to small project teams, delivering exceptional functionality, security requirements.
-
COMPUTACENTER (UK) LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
MISCO TECHNOLOGIES LIMITED
Google Workspace backup for Mail, Calendars, Contacts Drive and Shared Drive.
Billed per user & cloud storage capacity
Full (mailbox & Drive) or Granular recovery (Emails, Contacts, attachments, calendar events, files etc.). Sharing permissions recovered.
Recover to the same or different location/user/organisation.
-
FORDWAY SOLUTIONS LIMITED
Fordway offer a comprehensive range of services ensuring best use of Microsoft 365 Enterprise Subscriptions, specifically E3, E5 and F1/F3, aligned to NCSC Blueprint, we can then maintain operational management and security for the environment.
-
CHESS ICT LIMITED
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.
-
SOFTCAT PLC
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
BYTES SOFTWARE SERVICES LIMITED
Microsoft 365 F1 is a complete, intelligent solution that combines Office 365, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely. bssgc
-
EKCO CLOUD AND SECURITY LIMITED
The Ekco Darktrace Active AI Security Platform is designed for your Security Operations Centre (SOC) to eliminate alert triage, perform investigations, and rapidly detect and respond to known and unknown threats, whilst exposing risk gaps across your technologies and processes so your users can shift to a proactive cyber approach.
-
ROWDEN TECHNOLOGIES LTD.
Rowden's Fully Provisioned TAK Server Ecosystem delivers top-tier performance across cloud platforms, with Kubernetes-driven scaling and failover, comprehensive support, and extensive add-ons like VoIP and video re-streaming. Designed for complex missions with multiple user demands, it ensures uninterrupted operations with full data security and support. Accredited to OFFICIAL-SENSITIVE.
-
TMC3 LIMITED
tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.
-
PHOENIX SOFTWARE LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
INTEGRITY360 LIMITED
Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions offers Chrome -Family Link, a service that helps parents and guardians manage their children's digital activity on Chromebooks. This tool allows for the setting of screen time limits, managing app access, and keeping an eye on online behavior, ensuring a balanced and safe educational experience for students.
-
BIT ZESTY LIMITED
EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity
-
CM SECURITY LTD
Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.
-
QUADRIS LIMITED
FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
-
BOXXE LIMITED
Bitdefender GravityZone is an easy-to-use, single security platform to address all security threats. It protects against prevalent threats (ransomware, phishing attacks, fileless attacks etc) with prevention, detection and response capabilities. Proactively highlighting risk regarding endpoint configurations, policies and CVE's throughout the asset lifecycle.
-
SAS SOFTWARE LIMITED
SAS® Analytics for Public Safety on G-Cloud is a cloud-based environment to help organisations use advanced data techniques to detect and prevent threats to public safety. Traditional approaches to gathering and uncovering insights are no longer adequate given the volume, velocity and variety of data that government departments must manage.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd delivers customized ServiceNow Service Catalog Development for government agencies. Our solutions tailor service offerings to agency requirements, streamlining request management and enhancing user experience. With our expertise, agencies can centralize service access, improve efficiency, and empower users with self-service capabilities for streamlined service delivery.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides Workday Financial Management Services, offering government departments robust tools for streamlined financial operations. Our services enhance accuracy, improve compliance, and boost efficiency through comprehensive financial planning, analysis, and reporting capabilities, ensuring transparent and effective management of public funds.
-
SOFTCAT PLC
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BROOKCOURT SOLUTIONS LIMITED
Email Security – resolve attacks across entire attack chain, detection to response. Automate abuse mailbox management by removing user-reported phishing emails. Address threats – phishing, business-email-compromise, supplier fraud, ransomware and malware. Gain visibility of who’s being attacked, how they are, whether they click on or report phishing and if compromised.