-
KONSOLUTE
Secure your enterprise with our Microsoft Cloud Security Services, offering robust protection for endpoints and cloud environments. Utilising advanced security protocols, compliance measures, and continuous monitoring, we safeguard your infrastructure against emerging threats, ensuring resilience and compliance across all your Microsoft cloud platforms.
-
INOAPPS LIMITED
Inoapps Rental Management and Oracle Cloud Enterprise Resource Planning (ERP) enable end-to-end execution of the rentals process ensuring equipment is at the right place, at the right time - everytime.
Track ownership, location, costs and status. Minimise late, incomplete/damaged returns. Avoid project delays. One-stop solution for the complete rental lifecycle.
-
Cloud Cover IT Limited
Power App designed and tailored SharePoint to monitor and track staff and guests access to buildings providing guest lists, fire registers, email updates for visitors, and wayfinding information to meeting rooms
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring.
Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.
-
Bytes Software Services
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
MICRO FOCUS
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
R2P Systems UK Ltd
TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.
-
INTEGRATION360 LIMITED
Turbo360 Business Applications is aimed at trying to make it simpler to manage and monitor solutions developed with Microsoft Azure. At runtime you need highly experienced Azure experts to manage your solution and there are significant benefits if we can democratize the support experience for your cloud solution.
-
Lloyds Ventures
Humans are the weakest link in cyber security. HumanFirewall makes them the strongest by training them using automation and gamification via phishing simulation, and by leveraging employee powered incident reporting & remediation to mitigate real attacks.
EmailAuth enables Brand-Protection, Anti-Spoofing, Anti-Phishing and Enhances Email Deliverability using SPF, DKIM and DMARC.
-
Computacenter (UK) Ltd
CrowdStrike's Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation.
-
apto solutions limited
Apto provide SaaS products for Splunk to help monitor and analyse machine data. Used in conjunction with data pipelining services such as Cribl and Splunk Edge Processor along with data analytics we deliver improved operational intelligence. We use Splunk and Cloud Accredited Consultants (AWS and Azure) to deliver this service.
-
Computacenter (UK) Ltd
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
Computacenter (UK) Ltd
Proofpoint Email Protection stops malware and non-malware threats, it also utilises granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats and never-before-seen attacks that use malicious attachments and URLs.
-
LEGADO TECHNOLOGIES LIMITED
Legado makes digital interactions with customers secure, simple and personal using a cloud-native platform that can be flexibly deployed using a set of scalable and modular APIs. The platform has dozens of pre-built features for customer communications, workflows, intelligence and data insights.
-
INTEGRITY360 LIMITED
Frustrate hackers, satisfy auditors and delight users with password policy enforcer from Netwrix. Leaked and weak passwords remain a gaping hole in IT networks, making it far too easy for attackers to gain the foothold they need to steal sensitive data, damage systems and unleash ransomware.
-
Blue Lights Digital
Full featured platform to manage case work and evidence for digital forensics, eDiscovery, and incident response teams. Users can easily search and share the stored evidential data. With the option to permanently or temporarily share information, control, what is being shared, with whom, on what terms, and for how long.
-
Jigsaw24
Jamf lead on Apple device management, building Unified Endpoint Management solutions specifically for the Apple ecosystem. Jamf Pro manages macOS, iOS and tvOS devices, and with the introduction of Jamf Connect and Jamf Protect, Jamf for Business delivers an enterprise platform, with capabilities in authentication, management and endpoint protection.
-
BLANKBOX TECHNOLOGIES LTD
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
BEMROSE BOOTH PARAGON LIMITED
Paragon ID is a leader in identification solutions, in the e-ID, transport, smart cities, traceability & brand protection sectors. Using the latest technologies such as RFID and NFC, it provides smart cards, tickets, labels and tags to worldwide clients in diverse markets including public transport, manufacturing, logistics, gaming and retail.
-
PRECISELY SOFTWARE LIMITED
Integrate IBM mainframe and iSeries systems into leading IT analytics and operations platforms for an enterprise-wide view. Deliver insightful log data, events and intelligence from IBM mainframe and iSeries environments and makes them work seamlessly with Splunk, ServiceNow, Micro Focus, Elastic, Kafka, Microsoft SCOM and more.
-
INTEGRITY360 LIMITED
Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort.
-
KGN Software Ltd
KGN offers end-to-end software development and support services, designed for the Cloud and utilising the best technologies to meet customers’ Value for Money, quality and usability requirements. We have a global track record in reliably delivering solutions ranging from the simple to the complex, underpinned by our industry-leading core capabilities.
-
QUADRIS LIMITED
Comprehensive application security for organisations serious about securing websites, applications and networks to provide best-in-class availability and protection for your users and reputation. Mitigate security threats with this wide ranging suite of functionality providing deeper protection, automation and containment, including same day blocking of zero-days, to attain world class security.
-
DATASUMI LTD
Datasumi provides a state-of-the-art Generative AI Planning and Integration Service designed to integrate AI solutions into government operations smoothly. We focus on project development, proofs of concept, and data science prototypes. We perform feasibility studies, identify specific technical requirements, and ensure secure and compliant implementation.
-
GET SWARMS LIMITED
GetSwarms' service protects organizations from risks while ensuring compliance with standards like ISO 9001, ISO 27001, PCI DSS, and GDPR. Featuring advanced analytics, automated monitoring, and customizable frameworks, it detects and mitigates potential threats. GetSwarms also provides proactive risk management and comprehensive compliance support.
-
Softcat Limited
CrowdStrike Falcon® for IT, a module of the leading AI-native CrowdStrike Falcon® platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action
-
UNSUNG LIMITED
Keyfactor EJBCA SaaS provides the full power of
EJBCA Enterprise without the need for managing
the underlying infrastructure. Keyfactor will
manage your PKI infrastructure according to best
practices and highest assurance.
-
Softcat Limited
Forcepoint Insider Threat (FIT) has been identifying and stopping threats for government and Fortune 100 customers for over 20 years. With more than 1 million endpoints deployed, FIT is a proven solution that protects some of the world’s most sensitive organizations. FIT gives you unrivalled visibility into computer users’ activities.
-
INTEGRITY360 LIMITED
Netwrix Password Reset enables users to securely reset or change their passwords and unlock their accounts from any browser, desktop or mobile device. This dramatically reduces costly password reset requests to the IT service desk, avoids user frustration, and increases IT and user productivity
-
OMDA HEALTH ANALYTICS LIMITED
Cloud-based database web application for bio-specimen management.