-
Softcat Limited
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
MISCO TECHNOLOGIES LIMITED
Barracuda’s cloud-first SASE platform enables businesses to control access to data from any device, and allows security inspection and policy enforcement in the cloud, at the branch, or on device. Barracuda SecureEdge delivers enterprise-grade security including Zero Trust Network Access, Firewall-as-a-Service, web security,and fully integrated office connectivity with Secure SD-WAN.
-
Digital Interactive Ltd
Infreemation Incidents is a management software system built specifically to help you manage your legal obligations with regards to both incidents and data incidents
-
eCora
The eCora Security Container wraps a Docker based application in a secure encrypted sandbox and controls user access using hardware backed security such as passkeys linked to biometrics. It uses a combination of TPMs and Confidential Computing to ensure the highest level of confidentiality, integrity and availability.
-
MegaNexus Ltd
SHARE is a Cloud-based (SaaS) platform for information sharing across organisations, facilities and networks. The interchange of sensitive case information between secure settings is critical. Using interoperability technologies, SHARE provides a secure and authenticating mechanism to share data across different stages of organisational and business processes.
-
Experian
An ExPin match key is a unique ten digit personal identification number. By matching each of your customer records to the right ExPin match key, you can see which records belong to the same person where there may be duplicates in a single file, or across separate files.
-
Central Networks and Technologies Ltd
Barracuda WAF-as-a-Service offers Advanced Bot Protection that uses machine learning to continually improve its ability to spot and block bad bots and human-mimicking bots — while allowing legitimate human and bot traffic to proceed with minimal impact.
-
JBi Digital
Our Laravel specialists use versatile open-source PHP web development frameworks, known for their resilience, flexibility and speed. JBi has years of experience designing, developing and supporting both Private and Public sector companies using the Laravel Open Source Framework. JBi’s user-focused (UX) Laravel applications are built securely using industry best practices.
-
tmc3 Limited
The OneTrust platform enables organisations to centrally operationalise and demonstrate accountability for UK GDPR requirements, as well as enforce the governance of these policies and principles across the organisation’s data landscape. OneTrust enables organsiations to remove the reliance on manual processes to reduce cost and simplify data protection compliance.
-
Atlas Cloud Ltd
Generative AI has come to the Microsoft 365 suite. Enable Copilot to unlock powerful and intelligent shortcuts for employees, based on organisational data.
-
CACI UK Ltd
Online, cloud hosted based access to MooD Business Architect and MooD Active Enterprise components. This is a hosted service that provides a virtual repository, complete with disaster recovery, flexible licencing and scaleable collaboration.
-
MetaCompliance Ltd
MetaLearning Premium Plus Multi Language combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Premium Plus Multi Language provides animated and lifelike eLearning courses.
-
CONDATIS GROUP LIMITED
Decentralised identity platform, Cenda© simplifies the orchestration of decentralised identity user journeys. The platform provides Verifiable Credential and Trust Framework capabilities using industry standards, supporting integration with existing data sources, verifiable credential and identity verification service providers, eliminating vendor lock-in and future proofing deployed solutions.
-
True Digital
Building world class websites using Umbraco Cloud as a headless CMS, and creating high performing, composable digital experience platforms to answer our clients bespoke requirements.
-
BT PLC
CrowdStrike Falcon Exposure Management is a powerful groundbreaking product that harnesses the cutting-edge capabilities of the CrowdStrike Falcon platform. This innovative solution utilizes the unified, lightweight Falcon agent, which enables real-time, maintenance-free vulnerability assessment.
-
INTEGRITY360 LIMITED
Secure sensitive data and reduce the risk of a data breach. Minimize your attack surface by discovering sensitive information and keeping access to it at the least-privilege level. Pass compliance audits and enhance IT productivity.
-
MICRO FOCUS
Micro Focus ALM Octane gives full visibility into all aspects of the software quality management process. Stakeholders are better able to identify defects in the code before the application goes into production, enabling them to assess the issues, create the solutions, and iterate on the design.
-
Bytes Software Services
Resolve your email threats across the entire attack chain, from detection to response. This includes the ability to automate abuse mailbox management by removing malicious user-reported phishing emails. This addresses threats such as phishing, business email compromise (BEC), supplier fraud, ransomware and other malware. bssgc
-
BOXXE LIMITED
Identify and prioritize vulnerabilities based on risk to your business. Managed in the cloud.
-
MTI Technology Ltd
A fully Managed Privileged Access Management (PAM) solution to Discover, Manage, Protect and Monitor the use of Privileged account passwords for internal staff and remote third parties. PAM provides both control and visibility into who uses privileged accounts, when they can use them and their activities during recorded sessions.
-
Softcat Limited
Gain complete visibility into your Internet-connected assets to eliminate blind spots and unknown sources of risk.
-
Altiatech Ltd
Our endpoint and network security services protect your IT environment, manage unauthorised access and target threats to prevent them from entering your organisation’s network. To prevent malicious attacks, we provide security component architecture and implementation, with testing to uncover any vulnerabilities, threats or risks in your applications, network and infrastructure.
-
Softcat Limited
The cloud based VMs provide: visibility, assessment, remediation and network control of any IP/MAC address connected cyber assets.
-
Softcat Limited
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.
-
Leidos Innovations UK Limited
Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.
-
Viable Data
Viable Data offer cloud-based identity assurance solutions, leveraging cloud-based solutions and tailoring our in-house intelligent identity verification solution, LearnID®, to meet your organisation’s specific identity assurance needs. Utilising our expertise in biometrics and security controls, we offer biometric and identity solution design, build and implementation.
-
Pontus Vision
System of records for a register of processes and activities (RoPA), Data Sources, Risks, and Mitigations. Enables customers to create a data catalogue about all Personal Data within an Organization.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.
-
Gradian Systems Ltd
Broadcom offers the first CASB mirror gateway, a unique and more secure, resilient method to enforce in-line visibility, data security, and threat
protection over the use of any sanctioned cloud app from unmanaged
endpoints
-
Content Formula
Xoralia is easy-to-use policy and procedures management software built for SharePoint, Teams and Office365. Xoralia manages the whole policy lifecycle: policy creation, policy dissemination, gathering acknowledgements, quizzes and policy reviews. Xoralia is unique because it enables you to store your policies and controlled documents inside your own SharePoint environment.