-
QUADRIS LIMITED
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC compliance.
-
BYTES SOFTWARE SERVICES LIMITED
Calculate, communicate and compare your cyber risk. bssgc
-
CASTLEPOINT SYSTEMS LIMITED
Castlepoint reads, registers and regulates all information in a network, in any format and any system. It uses Explainable AI to automatically detect and classify high-risk and high-value information, and track what happens to it. It provides enterprise eDiscovery, privacy and security management, audit, records management, and Generative AI governance.
-
DEFENCE DATASEC LTD
Defence DataSec provides Performance Optimization Services, enhancing the speed, efficiency, and reliability of your applications and systems.Our expert team conducts thorough performance assessments, identifies bottlenecks,and implements optimization strategies to improve response times,scalability,and resource utilization. Partner with us to maximize the performance of your IT infrastructure and deliver exceptional user experiences.
-
ITogether
SIA Enterprise Standard - Enables customers to on-ramp all Web traffic to the Akamai Cloud Proxy as a Secure Web Gateway. In addition to the DNS-based protections of SIA Enterprise Essentials, SIA Enterprise Standard integrates with the customer's IDP to support group and user-level Acceptable Use Policies.
-
ITHQ LTD
Delinea Secret Server is a comprehensive Privileged Access Management (PAM) solution that securely manages and audits access to critical systems and data. It offers robust functionality including encrypted credential storage, session monitoring, role-based access controls, and compliance reporting, both in the cloud and on-premises. Remove complexity of legacy PAM solutions.
-
GRADIAN SYSTEMS LTD
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
AXIANS NETWORKS LIMITED
Radware’s Cloud DDoS Protection Service defends organizations against today’s most advanced DDoS attacks using advanced behavioral-based detection for both network-layer (L3/4) and application-layer (L7) attacks, automatic real-time signature creation to protect against zero-day attacks, unique SSL DDoS protection and flexible cloud-based and hybrid deployment options to suit every customer.
-
Chess CyberSecurity Ltd t/a CyberLab
Forcepint CASB is security as a service that lowers the data and human behavioural risk of using any cloud applications so that it enables customers to overcome compliance and Information assurance restrictions on using the Cloud
-
Daon
xProof Identity Verification (IDV) utilises patented AI technology, including advanced OCR, for swift, precise identity verification using automated ID document processing and face biometrics.
Enhanced by cutting-edge presentation attack detection and photo watchlist matching, xProof significantly reduces user friction during an onboarding process, identity proofing or within an eKYC process.
-
NEXUS OPEN SYSTEMS LIMITED
Microsoft Enterprise Mobility + Security is the only comprehensive solution designed to help manage and protect users, devices, apps, and data in a mobile-first, cloud-first world. Service includes: Azure Active Directory Premium; Microsoft Cloud App Security; Microsoft Intune; Azure Information Protection and Microsoft Advanced Threat Analytics.
-
INTEGRITY360 LIMITED
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
-
BYTES SOFTWARE SERVICES LIMITED
CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics. bssgc
-
ITHQ LTD
Fortinet’s FortiGate-VM delivers robust security for cloud environments through a virtual appliance that can be deployed across multiple cloud platforms such as AWS, Azure, Google Cloud, and Oracle Cloud. It provides comprehensive protection by integrating next-generation firewall capabilities, including intrusion prevention, application control, antivirus, URL and DNS filtering, and sandboxing.
-
Stone Technologies Limited Trading as Converge Technology Solutions
Stone utilises Cisco Umbrella to deliver the most secure, reliable, and fastest internet experience to more than 100million users daily. Umbrella unifies firewall, secure web gateway, DNS-layer security, cloud access security broker (CASB), and threat intelligence solutions into a single platform to help businesses of all sizes secure their network.
-
Chess CyberSecurity Ltd t/a CyberLab
"InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach.
Strengths include:
- Multi-Cloud security & compliance
- Container & Kubernetes security
- Cloud Vulnerability Management"
-
TMC3 LIMITED
Veracode is an enterprise-class application security solution, which allows DevOps teams to embed a Secure Software Development Lifecycle. Veracode SaaS platform helps automate security feedback and aligns with development technologies, providing the highest accuracy and broadest coverage in the industry. Supporting policies and procedures enable adoption of Secure Software Development.
-
NOC365 LTD
Provides organisations with complete full-suite protection providing security admins with an easy-to-deploy and manage platform, block sophisticated social engineering attacks such as impersonation, zero-day phishing and Business Email Compromise. Using AI-trained engines. Securing inbound, outbound, and internal emails from phishing attacks inspects the communication’s metadata, attachments, links and language.
-
LEFKE IT LIMITED
LefkeIT specializes in Google Cloud DevOps Services, enabling seamless collaboration between development and operations teams for efficient software delivery. Our expert consultants implement best practices, automation, and continuous integration/continuous delivery (CI/CD) pipelines on Google Cloud Platform.
-
SAPPHIRE TECHNOLOGIES LIMITED
Harmony Email and Collaboration (HEC) is an inline API based email security solution. HEC combines AI/ML, threat intelligence and sandboxing to protect businesses from all variants of email based attacks. HEC also protects collaboration applications from phishing attacks, malware and data loss.
-
Keyfactor
Keyfactor EJBCA SaaS provides the full power of EJBCA Enterprise without the need for managing the underlying infrastructure. Keyfactor will manage your PKI infrastructure according to best practices and highest assurance.
-
BASEEL LTD
Baseel Limited can offer various products in the areas of cyber security, IT governance, data protection, digital forensics, business processes and compliance requirements. We can also develop bespoke products as per the client needs and provide the services as SaaS solution.
-
COOLSPIRIT LIMITED
Barracuda Web Application Firewall blocks sophisticated web-based attacks that target the applications hosted on web servers and the sensitive or confidential data to which they have access. Placed between the Internet and web servers, scan all inbound web traffic to block attacks and outbound traffic to prevent data loss.
-
INTEGRITY360 LIMITED
PhishER Plus adds an AI-validated, crowdsourced blocklist and PhishRIP capabilities to proactively block and remove active phishing attacks that have bypassed email filters BEFORE your user gets exposed to them. It saves significant budget and InfoSec time by reducing the volume of remediation efforts handled by your SOC team
-
BYTES SOFTWARE SERVICES LIMITED
The cloud based VMs provide: visibility, assessment of any OT/IoT device on the network.
bssgc
-
SAPPHIRE TECHNOLOGIES LIMITED
Forcepoint Email Security uses the Advanced Classification Engine (ACE) to identify threats ranging from annoying spam to advanced malware, phishing, and Business Email Compromise (BEC) attacks.
-
Rigr AI Limited
Our Location Estimation tool harnesses the power of AI to analyse visual
clues of photos or videos, indoors or outdoors, accurately ranking
potential countries and regions the media originates from. The result is a comprehensive list of potential
locations accompanied by confidence scores.
-
COMPUTACENTER (UK) LIMITED
Falcon Identity Protection unifies endpoint and identity security with a single agent and console for immediate time-to-value. Extend your protection further and close the skills gap with industry-leading 24/7 MDR services when you need it.
-
BOXXE LIMITED
Digital transformation and the shift to a more distributed workforce are driving the need for anywhere, anytime access to resources, wherever they are. Cisco’s Secure Access Service Edge (SASE) combines networking and security functions in the cloud to simplify IT environments, delivering seamless, secure access to applications, anywhere users work.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.