-
LEFKE IT LIMITED
At LefkeIT, our Multi-Cloud Docker Deployments service is designed for Government Departments, ensuring flexibility and redundancy in containerized application deployment. We specialize in deploying Docker containers across multiple cloud providers, enabling seamless migration and optimal resource utilization. Trust us to maximize your infrastructure's resilience and scalability with multi-cloud Docker deployments.
-
PRIMESYS LTD
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving
-
BUSINESS SYSTEMS (U.K.) LIMITED
Mobile call recording and SMS recording enables your organisation to record inbound and outbound calls, together with SMS communications. Providing your mobile workforces with all the benefits of office based communications.
Capture every detail with Mobile Voice and SMS Recording with Business Systems Mobile Voice recording solutions.
-
CHESS ICT LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
MONDAS CONSULTING LTD
Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.
-
S8080 LIMITED
ISO27001 open-source CMS digital platform for Local Government / Local Authorities. S8080's icon-driven Local Government self-service digital platforms securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, powerful content management systems. Mobile and accessible, designed around Local Government / Council user's needs.
-
ZIVVER LIMITED
Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.
-
PHOENIX SOFTWARE LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
SOFTCAT PLC
Cybersecurity solution that provides organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to a network, ensuring a strengthened defense against cyber threats.
-
SOFTCAT PLC
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
CHESS ICT LIMITED
InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.
-
MISCO TECHNOLOGIES LIMITED
Microsoft365 backup for Mail, SharePoint, OneDrive and Teams.
Billed per user, with unlimited cloud storage for all services.
Full (mailbox, Site, Drive, team) or Granular recovery (Emails, Contacts, attachments, SharePoint & Ondrive files etc.). Sharing permissions recovered.
Recover to same or different location / user / organisation.
-
THALES UK LIMITED
Thales Luna Cloud HSM is a cloud-based platform that provides a range of Cloud HSM and key management services through a simple online marketplace. With Cloud HSM security is made simpler, more cost-effective and easier to manage because there is no hardware to buy, deploy and maintain.
-
SOFTCAT PLC
Privilege Management stops attacks by removing excessive privileges on Windows/Mac/Unix/Linux/Network Devices. The solution empowers organizations to enforce least privilege by eliminating admin and root access.
Privileged Remote Access: Securely manage, and audit vendor and internal remote privileged access without a VPN. Eliminating Cybersecurity Threat Vector, Meeting Privileged Access Compliance Requirements.
-
WAVENET LIMITED
LAN, Firewall and IPS Managed Service, based on cloud monitoring technology. Essentials For customers to manage their own environment with access to skilled technical resource for ad-hoc assistance where required Enterprise For customers to co-manage their environment, adding monitoring and event management Enterprise Plus For customers requiring fully managed service.
-
SUREVINE LIMITED
Manage even your most sensitive vulnerabilities and their remediations across your organisation and its supply chain. Manage high severity vulnerabilities urgently. Quickly identify priority exposures. Flexibly adapt to changes in your organisation. Integrate seamlessly with your exiting tools and interoperate with other organisations to enable a coordinated response.
-
SOFTCAT PLC
Rubrik provides a zero trust data protection platform across all data and applications whether it be located on premises or in the public, private or hybrid cloud. Rubrik provides Ransomware detection and remediation, Sensitive Data Discovery, incident containment and Orchestrated Application Recovery all within a single management plane.
-
SILVER LINING CONVERGENCE LTD
Silver Lining Network Management services install and manage networks across the UK from our centralised NOC manned 247/365 by qualified, experienced engineers and project managers.
-
SOMERFORD ASSOCIATES LIMITED
Boundary provides access to applications and critical systems with fine-grained authorizations without managing credentials or exposing your network.
-
CDW LIMITED
Amazon AppStream 2.0 lets you move your desktop applications to AWS, without rewriting them. It’s easy to install your applications on AppStream 2.0, set launch configurations, and make your applications available to users.
-
Peoplesafe
Lone worker services from Peoplesafe protect emergency service responders. Alarms raised through lone working devices, safety apps and body cameras are professionally managed by our 24/7/365 control centre. Emergency service workers can receive help whenever they need it, wherever they are. Peoplesafe protects the largest share of public workers.
-
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
Six Degrees
Brand impersonation attacks that compromise customers and partners are devastating. They destroy trust, are extremely difficult to uncover, and even harder to shut down. Mimecast Brand Exploit Protect helps identify and neutralise these attacks, sometimes even before they can even be launched.
-
4NET TECHNOLOGIES LTD
FourNet's Cloud Access Security Broker (CASB) provides centralised security management across multiple cloud services. It enforces security policies, detects threats, ensures compliance and offers data protection by monitoring and controlling user activity and sensitive data across all cloud platforms, effectively bridging the security gap between cloud users and cloud applications.
-
CDW LIMITED
Proofpoint Secure Email Relay (SER) consolidates and secures transactional emails. It prevents compromised third-party senders from sending malicious email using your domains and enables DKIM signing to help you meet DMARC compliance. As a hosted solution, Proofpoint SER helps you achieve your cloud migration initiatives.
-
ROKE MANOR RESEARCH LIMITED
Roke provides full-lifecycle support for AI and ML in operational environments, offering AI research, technology selection, implementation, consultancy, computer vision (image processing and video processing), data science and training services. Our solutions enable the integration of AI and ML into new and existing workflows, aligned to client and government policies/processes.
-
Glemnet Ltd
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
-
POSTREMO IT LIMITED
Jamf simplifies Apple device management and security, offering streamlined deployment, secure access, and robust threat prevention. With user based licensing, organisations benefit from cost effective scalability and simplified management. Experience seamless Apple device management and enhanced security, ensuring optimal performance for end users and administrators
-
CHARTERHOUSE VOICE & DATA LIMITED
Check Point Microsoft Azure Virtual WAN is a service that lets customers easily establish optimized large-scale branch connectivity with Azure and the Microsoft global network. Microsoft Azure Virtual WAN is a networking service that provides optimized and automated branch-to-branch connectivity through Azure.
-
SOFTCAT PLC
Mimecast Awareness Training is a security awareness
training and cyber risk management platform that
helps you combat information security breaches
caused by employee mistakes.