-
INTEGRITY360 LIMITED
Falcon Insight XDR delivers continuous and comprehensive endpoint visibility that spans detection, response and forensics to stop potential breaches.
-
Cloudflare, Inc.
Secure user inboxes, adopt a proactive security posture, and save time on email security operations.
Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks.
With deep integrations into Microsoft and Google environments and workflows.
-
Viable Data
Experts in biometrics and security controls, Viable Data offer Multi-Biometric Factor Authentication to authenticate identities. Utilising multiple biometric methods (such as fingerprint and facial recognition), we enhance business security and authentication accuracy.
-
Softcat Limited
Ensure compliance with aggregated sensitivity and activity data across your tenant so critical permissions surface at the top of the priority list. Implement corrective action on priorities, including permission removal, owner notification, or setting an expiration date - quickly securing collaboration in Teams, Groups, Sites, and OneDrive.
-
INTEGRITY360 LIMITED
Auth0 Identity Platform is a cloud-based identity management service that helps organizations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.
-
FCS SOFTWARE SOLUTIONS LIMITED
CommitteesPro is a cloud-based committee management system which has been designed from the ground up to manage the day to day activities involved in a busy democratic services team. From report writing, to Councillor profile management and the publication of agendas and plans all designed in our secure web-based environment.
-
Computacenter (UK) Ltd
Proofpoint DLP Transform employs a human-centric approach that helps modernize your DLP program. It accurately identifies sensitive content and provides deep visibility into user behaviour. Analysts can quickly assess data loss risk across cloud and endpoint, reach high-fidelity verdicts and take appropriate action.
-
Ceox
Ceox’s Microsoft Power Apps Public Engagement Manager enables Public Sector Organisations to administer enquiries and official correspondence management. Manage cases: Freedom of Information (FOI) requests, Inter-Ministerial (IM), Complaints, Data Access Requests, Environmental Information Regulation (EIR) requests, Parliamentary Questions (PQ), Subject Access Requests (SAR), Ministerial Correspondence (MC), Treat Official, Write-Rounds, Invitations.
-
Exponential-e Ltd
The PAM Service allows policies and identities to be to be defined and managed for human and non-human (machine) identities requiring privileged credentials. Time bound sessions are monitored, logged, recorded, and stored for compliance and audit. Context aware MFA and SSO are integrated, with remote access for external vendors controlled.
-
COC00N CYBER LIMITED
Core coc00n provides highly secure devices without compromising usability. It employs familiar, off-the-shelf hardware such as Apple and Windows devices to ensure that while users benefit from high-level security, the learning curve associated with new or unfamiliar technology is minimized, allowing for a seamless integration into their daily lives.
-
Britannic Technologies
Providing mobile services on Vodafone/O2/EE with options for:
-Inclusive minutes and texts
-Data bundles (SIM/pooled)
-Roaming capabilities across Europe/Rest of World
-Use from data bundles when roaming with options to cap data usage when reach the limit or to pay overage charges
-Options for mobile data management by user.
-
Southern Communications Corporate Solutions T/A SCG Corporate
Sophos Intercept X is the world’s best endpoint protection, combining ransomware protection, deep learning malware detection, exploit prevention, EDR, and more in a single solution. Get complete protection for all your endpoints. Works across all your desktops, laptops, servers, tablets, and mobile devices. Works across all major operating systems.
-
ABM Intelligence Limited
ACOS offers the IIC module to record intelligence provided by public volunteers to identify opportunities for CHIS (Covert Human Intelligence Source) recruitment. A useful assessment tool that can be integrated with the ACOS Source Management module to ensure intelligence is always captured and recruitment opportunities are not missed.
-
QUADRIS LIMITED
Barracuda Email Protection Advanced is a comprehensive email security protection platform for Microsoft 365. The solution delivers best in class email security and filtering against spam, zero day malware as well as more sophisticated phishing attacks.
-
Nettitude Limited
A Complete threat defense solution designed to prevent emerging cyber attacks and allow workers to safely conduct business. Its technology protects against threats to the OS, apps, and network, scoring the industry’s highest threat catch rate without impacting performance or user experience.
-
Computacenter (UK) Ltd
CyberArk Endpoint Privilege Manager, hosted by CyberArk and delivered as SaaS, helps to remove the barriers to enforcing least privilege and allows organizations to block and contain attacks at the endpoint, reducing the risk of information being stolen or encrypted and held for ransom.
-
NEXER DIGITAL LTD
Umbraco is one of the world's most popular, and easiest to use, open source web Content Management Systems (CMS). Nexer is a Contributing Platinum Umbraco Partner, the highest level of accreditation possible. We’ve built 250+ websites and digital solutions based on Umbraco. We lead the Umbraco accessibility and sustainability communities.
-
BOXXE LIMITED
ThousandEyes helps customers see all the networks and services, that create user experience in a single view, from synthetic transactions and service availability to network paths and global Internet routing feeds. Patented cross-correlation algorithms and interactive visuals to plan service rollouts, isolate problems and resolve issues faster.
-
CEGEKA UK LIMITED
Cegeka UK's Disclosure Management System (DMS); an advanced software solution designed to streamline and automate disclosure processes. Organisations can efficiently handle a range of disclosures, retrieving and aggregating data from multiple sources. DMS provides a secure centralised platform for raising, fulfilling, reviewing, and approving disclosure requests, ensuring accuracy and consistency.
-
Lefke IT Limited
At LefkeIT, our Dockerization of Development Environments service is tailored for Government Departments, facilitating streamlined and consistent software development workflows. We specialize in containerizing development environments using Docker, ensuring portability, reproducibility, and scalability. Trust us to optimize your development process for efficiency and agility with Docker.
-
Intec Systems Ltd
HCL AppScan is a dynamic application security testing solution designed for security experts and pen testers to use when performing security tests on web applications and web API. It runs automated scans that explore and test web applications based on one of the most powerful scanning engines available.
-
Reach-Data Ltd
We offer a dedicated inbound / outbound SMS service specifically aimed at Councils and Local Authorities. All services are housed in UK data centres using dedicated infrastructure and direct connectivity with the mobile networks. We are ISO 27001 accredited with a suitably scoped ISMS covering all services.
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Bot Manager Premier provides advanced bot detections designed to detect and mitigate the most sophisticated bots, like those typically seen in use cases such as credential abuse, inventory hoarding, gift card balance checking, and other forms of web fraud.
-
PROPEL TECH LTD
Change is the only constant. It drives the need for digital transformation, rethinking how your business uses technology and processes to continuously evolve. We help businesses manage change and become more efficient by finding the right possibilities, using new and evolving technology to achieve digital transformation.
-
BASEEL PARTNERS LLP
Baseel Partners LLP can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.
-
TECHNOLOGY TRANSFORMATION GROUP LTD
Technology Transformation Group assesses your organisation's software needs to develop a tailored Microsoft 365 Service strategy, leveraging the full potential of your licenses. We analyse existing licensing agreements, identifying cost-saving opportunities and offer guidance on product features such as Word, Excel, and Teams for enhanced productivity, security and team empowerment.
-
Nine23
UK Sovereign Managed Cloud PaaS for Symmetric Key Agreement (Arqit - SKA(PaaS)™). Secure by design, it hardens cyber security across the network and data communications by generating symmetric encryption keys between end-points. Manage individual and group key sessions with policy enforcement. Supports existing encryption algorithms to layer into existing network.
-
Softcat Limited
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
CYBERLAB CONSULTING LTD
Security Incident and Event Management (SIEM), Security Orchastration Automation Response (SOAR) and User Entity Behaviour Analytics (UEBA) provides monitoring, detection, alerting of security events/incidents. Provids a centralised view of the security posture of an IT infrastructure to view activities within an environment. Also enables automated playbooks in response to events.
-
CSI Limited
IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.