-
CHESS ICT LIMITED
Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.
-
SOFTCAT PLC
With CrowdStrike Falcon® Counter Adversary Operations get 24/7 protection across endpoint, identity, and cloud workloads, delivered by AI-powered threat hunting, threat intelligence, and unrivalled expertise.
-
BYTES SOFTWARE SERVICES LIMITED
Microsoft 365 F1 is a complete, intelligent solution that combines Office 365, and Enterprise Mobility + Security to extend the Microsoft 365 service value across entire customer organizations. It empowers frontline Workers to be creative and work together, securely. bssgc
-
EKCO CLOUD (UK) LIMITED
The Ekco Darktrace Active AI Security Platform is designed for your Security Operations Centre (SOC) to eliminate alert triage, perform investigations, and rapidly detect and respond to known and unknown threats, whilst exposing risk gaps across your technologies and processes so your users can shift to a proactive cyber approach.
-
ROWDEN TECHNOLOGIES LTD.
Rowden's Fully Provisioned TAK Server Ecosystem delivers top-tier performance across cloud platforms, with Kubernetes-driven scaling and failover, comprehensive support, and extensive add-ons like VoIP and video re-streaming. Designed for complex missions with multiple user demands, it ensures uninterrupted operations with full data security and support. Accredited to OFFICIAL-SENSITIVE.
-
TMC3 LIMITED
tmc3's Managed Detection and Response (MDR) Service provides a fully outsourced 24/7x365 Managed Detection and Response SOC capability. We utilise technology platforms and experienced security analysts to provide a full MDR capability. Including SIEM, Threat Intelligence, Automation, Incident Management and Vulnerability Management. Monitoring and detection as a fully managed Service.
-
PHOENIX SOFTWARE LIMITED
BeyondTrust Secure Remote Support is a software platform used by Service Desk, Help Desk and Customer Support departments to establish secure remote access and control of desktops, laptops, servers and mobile devices.
-
INTEGRITY360 LIMITED
Resolve your email threats across attack chains, from detection to response. Automate abuse mailbox management by removing malicious user-reported phishing-emails. Address threats lik phishing, business email compromise (BEC), supplier fraud, ransomware/malware. Gain visibility into who's being attacked, how they're being attacked, whether they click on/report phishing and whether they're compromised
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions offers Chrome -Family Link, a service that helps parents and guardians manage their children's digital activity on Chromebooks. This tool allows for the setting of screen time limits, managing app access, and keeping an eye on online behavior, ensuring a balanced and safe educational experience for students.
-
BIT ZESTY LIMITED
EchoIncident is an incident management platform that helps tech-driven businesses manage incidents from the initial alert to post-mortem analysis and beyond, ensuring smooth operational continuity
-
CM Security Ltd
Censornet Secure Email Gateway is an email security solution designed to protect organisations from various email-borne threats such as spam, phishing attacks, malware, and data leaks. It acts as a gatekeeper for incoming and outgoing emails, ensuring that only legitimate and safe emails reach their intended recipients.
-
QUADRIS LIMITED
FortiWeb WAFs provide advanced features that defend your web-applications and APIs from known and zero-day threats. Using an advanced multi-layered approach, FortiWeb protects against the OWASP Top 10 and more. FortiWeb customises the protection of each application, providing robust protection without requiring the time-consuming manual tuning required by other solutions.
-
BOXXE LIMITED
Bitdefender GravityZone is an easy-to-use, single security platform to address all security threats. It protects against prevalent threats (ransomware, phishing attacks, fileless attacks etc) with prevention, detection and response capabilities. Proactively highlighting risk regarding endpoint configurations, policies and CVE's throughout the asset lifecycle.
-
SAS SOFTWARE LIMITED
SAS® Analytics for Public Safety on G-Cloud is a cloud-based environment to help organisations use advanced data techniques to detect and prevent threats to public safety. Traditional approaches to gathering and uncovering insights are no longer adequate given the volume, velocity and variety of data that government departments must manage.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd delivers customized ServiceNow Service Catalog Development for government agencies. Our solutions tailor service offerings to agency requirements, streamlining request management and enhancing user experience. With our expertise, agencies can centralize service access, improve efficiency, and empower users with self-service capabilities for streamlined service delivery.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd provides Workday Financial Management Services, offering government departments robust tools for streamlined financial operations. Our services enhance accuracy, improve compliance, and boost efficiency through comprehensive financial planning, analysis, and reporting capabilities, ensuring transparent and effective management of public funds.
-
SOFTCAT PLC
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
BROOKCOURT SOLUTIONS LIMITED
Email Security – resolve attacks across entire attack chain, detection to response. Automate abuse mailbox management by removing user-reported phishing emails. Address threats – phishing, business-email-compromise, supplier fraud, ransomware and malware. Gain visibility of who’s being attacked, how they are, whether they click on or report phishing and if compromised.
-
LEFKE IT LIMITED
At LefkeIT, our Multi-Cloud Docker Deployments service is designed for Government Departments, ensuring flexibility and redundancy in containerized application deployment. We specialize in deploying Docker containers across multiple cloud providers, enabling seamless migration and optimal resource utilization. Trust us to maximize your infrastructure's resilience and scalability with multi-cloud Docker deployments.
-
PRIMESYS LTD
Barracuda Email Protection Premium Plus is a comprehensive security and data protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks while also protecting data from accidental deletion and compliance via email archiving
-
Business Systems (UK) Ltd
Mobile call recording and SMS recording enables your organisation to record inbound and outbound calls, together with SMS communications. Providing your mobile workforces with all the benefits of office based communications.
Capture every detail with Mobile Voice and SMS Recording with Business Systems Mobile Voice recording solutions.
-
CHESS ICT LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating.
-
MONDAS CONSULTING LTD
Purchase Microsoft Defender EDR licences to utilise the power of the Microsoft Defender Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Microsoft Defender EDR for signs of malicious activity on your network.
-
S8080 LIMITED
ISO27001 open-source CMS digital platform for Local Government / Local Authorities. S8080's icon-driven Local Government self-service digital platforms securely handle multilingualism, forms, CRM/case management integrations with single sign-on, transactions and devolved publishing. Choice of easy-to-use, powerful content management systems. Mobile and accessible, designed around Local Government / Council user's needs.
-
ZIVVER
Zivver automates email security, allowing organisations to avoid data leaks and ensure compliant communications. Providing thousands of organisations worldwide with a native email security tool that combines; contextual AI-powered human error prevention, best-in-class AES 256-bit email encryption, recipient verification, email revocation, verified proof of delivery, 5TB file exchange and eSignatures.
-
PHOENIX SOFTWARE LIMITED
Sophos Cloud Optix, the Sophos Cloud Security Posture
Management solution, proactively reduces business risk from
unsanctioned activity, vulnerabilities, and misconfigurations
across Amazon Web Services (AWS), Microsoft Azure, and Google
Cloud Platform public cloud environments.
-
SOFTCAT PLC
Cybersecurity solution that provides organizations with comprehensive visibility and control over all assets across IT, OT, IoT, and IoMT environments. It enables the detection and mitigation of risks and vulnerabilities by analyzing and managing the security posture of devices connected to a network, ensuring a strengthened defense against cyber threats.
-
SOFTCAT PLC
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
CHESS ICT LIMITED
InsightVM provides a fully available, scalable, efficient way to collect vulnerability data, turn into answers, and minimize risk. InsightVM leverages latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them, facilitate collaboration with other teams, and confirm your exposure has been reduced.
-
MISCO TECHNOLOGIES LIMITED
Microsoft365 backup for Mail, SharePoint, OneDrive and Teams.
Billed per user, with unlimited cloud storage for all services.
Full (mailbox, Site, Drive, team) or Granular recovery (Emails, Contacts, attachments, SharePoint & Ondrive files etc.). Sharing permissions recovered.
Recover to same or different location / user / organisation.