-
IBM UNITED KINGDOM LIMITED
IBM Storage Protect for Cloud Dynamics 365 provides cloud-based data protection for your organization’s Dynamics 365 data. You have granular control over what data to backup, and can store backups in Azure storage or your own storage system.
-
Lloyds Ventures
CyberForceHQ.com: Skills speak louder than words. CyberForce utilizes a science-backed methodology in cyber security skill assessment, developing and validating its tests with input from cyber security experts. These assessments are constructed around established cyber security skill frameworks and have been independently verified for predictive accuracy.
-
CDW LIMITED
Easily create and manage team-focused and project-focused sites for collaboration. In addition, you can deploy an organisation-wide intranet portal to disseminate information and news across the organization. Use it as a secure place to store, organize, share, and access information from almost any device via a browser.
-
SOFTCAT PLC
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
MACS EU LIMITED
MACS Enterprise Asset Management (EAM) for FM Accelerator Computer Aided Facilities Management (CAFM) offers a complete set of applications that cover all aspects of cloud based management. IBM Maximo helps reduce unplanned downtime, increasing operational efficiency, whilst proving real time visibility into asset usage across multiple sites, improving your ROI.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Sales Management Solution streamlines property sales processes, offering a user-friendly portal for buyers and sellers. Our system facilitates seamless transactions, from property browsing to contract signing, ensuring efficiency and customer satisfaction at every step.
-
COGNITAS GLOBAL LIMITED
View360global is a multilingual training platform using mixed reality to create immersive learning environments for in person or online delivery of facilitated training and exercising across all sectors. Scenarios can be customised to deliver unique training based on organisational and operational needs. Its also widely used for crisis management exercising
-
METERIAN LTD
Meterian security suite for enterprise applications continuously protects against vulnerabilities in open source components, stability and licensing risks, while validating the underlying digital infrastructure. Thanks to its unique ingestion algorithms, Meterian ensures unparalleled coverage and precision.
-
JBi Digital
JBi Digital has years of experience designing and developing both online and offline mobile applications.
JBI’s user-focused (UX) applications are built securely using industry best practices. The result is an intuitive, engaging and seamless mobile app that supports your goals and caters to your users’ specific needs.
-
PHOENIX SOFTWARE LIMITED
CyberArk workforce Identity is an IDaaS that offers full featured identity lifecycle & access management; it includes adaptive MFA/SSO and unique extra controls such as a Password Manager, adaptive Workstation MFA, Secure Browser and Web session protection
-
COMPUTACENTER (UK) LIMITED
IBM Security Verify is a comprehensive cloud-native platform of IAM capabilities. It includes SSO functionality to securely connect users with resources, MFA functionality to conveniently and safely authenticate users, and AI-driven dynamic adaptive access to continuously risk-assess user sessions to keep your resources safe.
-
SOMERFORD ASSOCIATES LIMITED
Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.
-
Focus Group
Focus Group are a Tier-1 Cloud Solutions Provider (CSP) allowing your organisation to benefit from license consultancy, procurement of services such as M365 licenses, Microsoft software licenses and Azure subscriptions as well as support, underpinning these services by leveraging Microsoft Premier Support.
-
VE3 GLOBAL LTD
Quickly find relevant data and respond efficiently for a variety of requests including litigations, investigations, and privacy regulations
-
KICK ICT GROUP LIMITED
We provide solutions including Power BI and Jet Analytics to support Microsoft Dynamics users with powerful reporting, ranging from a suite of month-end reports to highly customisable/shareable dashboards.
We also provide solutions from Infor, Qlik and Power BI to enable the right decisions with accurate analysis and reporting.
-
Professional Data Management Services Limited
MARIS is an enterprise, browser-based online system covering the business functions of a ship registry. Services include: vessel management, inspections and surveys; seafarer management and certification. Supported by workflow management; document management; financial fees & invoicing; reporting; digital certification. Our ship registry solution also includes online and offline service options.
-
CYBIT LIMITED
F5 Distributed Cloud Services are SaaS-based security, networking, and application management services that enable customers to deploy, secure, and operate their applications in a cloud-native environment wherever needed–data center, multi-cloud, or the network or enterprise edge.
-
Datopian (Viderum Ltd trading as)
CKAN is the leading data management software. It is usable both ‘out of the box’ and as a powerful framework for creating more tailored systems. CKAN’s combination of open-source codebase and enterprise support make it uniquely attractive for organizations looking to build customized, enterprise- or government-grade solutions.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Open APIs empower contractors with seamless access and integration capabilities. Contractors can initiate repairs, access data, and upload documentation securely. Features include comprehensive API documentation, authentication, scalability, and developer support. This fosters enhanced contractor engagement, improves operational efficiency, encourages innovation, and cultivates ecosystem partnerships.
-
INTEGRITY360 LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
BYTES SOFTWARE SERVICES LIMITED
CloudGuard Network provides advanced threat prevention and automated cloud network security through a virtual security gateway, with unified security management across all your public cloud and private cloud environments. Supported platforms include: Azure, Amazon Web Services, Google Cloud, VMware, Nutanix, Hyper-V, AliCloud, Oracle and more. bssgc
-
ITogether
Check Point Playblocks is a modern cyber security training and simulation platform designed to enhance the security skills of IT teams. This innovative tool leverages gamification to create engaging and realistic cyber threat scenarios, helping teams to practice and improve their response strategies in a controlled environment.
-
SOFTCAT PLC
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
TOTAL ENTERPRISE SOLUTIONS LIMITED
Microsoft Gold Partner providing Power Platform services and license management. Power Automate creates automated workflows across apps/ services to synchronize files, get notifications and collect data. PowerApps creates Mobile Apps, operating across Android, iOS, Windows – and with almost any Internet browser using a low code no code approach.
-
INTEGRITY360 LIMITED
Galaxkey Enterprise Cloud Plus - Hybrid provides pure end-to-end Email encryption, file
encryption, Secure Workspace collaboration and Digital Document Signing. All based
on CPA certified encryption through the NCSC. Features: email revocation,
classification, notifications, geofencing, digital signatures, secure collaboration and file
sharing capabilities. Centrally managed with complete white labelling capabilities
-
SECTIGO LIMITED
Sectigo Certificate Manager is a cloud platform to manage the lifecycle of digital certificates to secure human & machine identity across enterprise,from a single interface.It can automate issuance & management of Sectigo certificates, alongside other publicly trusted Certificate Authorities & private CAs: Microsoft AD CS,Google Certificate Authority Service,AWS Private CA
-
NEO TECHNOLOGY LIMITED
Propsys360 streamlines every stage of the repairs lifecycle, from logging faults and triaging priorities to scheduling operatives, tracking progress and analysing data, ensuring faster first-time fixes, reduced downtime and happier residents. Automated workflows, mobile apps and intuitive dashboards unite teams, optimise parts usage, drive compliance and protect long-term asset value.
-
APPLIED NETWORK SOLUTIONS LIMITED
247lib.com is a secure library asset and online resource management system. 247lib.com is a library management system, which allows prisons to manage their collections easily and efficiently. All applications are backed by full training, migration, implementation and support services.
-
CEOX SERVICES LTD
Ceox’s HR Ticketing solution uses Microsoft Power Platform to deliver a highly customizable system for employees to raise enquiries with Human Resources (HR) or other corporate teams from any device. HR can manage incoming tickets through various lists and customizable filters. HR Teams have access to an integrated knowledge base.
-
ITogether
Tufin Enterprise elevates your network security program to a highly evolved state, in which, network and cloud security processes are integrated, policy is managed and implemented via zero-touch automation, and everything is administered via a central control plane that delivers unmatched scalability and extensibility