-
S8080 LIMITED
ISO27001 certified open source, cloud-hosted CMS for digital services and websites. S8080’s GDPR compliant open source CMS platforms securely handle multilingualism, CRM, integrations, single sign-on, forms and workflow. Open-source Drupal and Umbraco content management systems are easy to use, yet powerful. Mobile and accessible CMS, designed around your user’s needs.
-
Barrier Networks
Falcon Complete is a managed detection and response solution designed to proactively stop breaches across endpoints, cloud workloads and identities. Falcon Complete is powered 24/7 by an elite team of security experts in monitoring and management with human threat hunting, AI-driven threat intelligence and end-to-end, hands-on surgical remediation.
-
SCG CORPORATE LIMITED
Today, your employees are frequently exposed to sophisticated phishing and ransomware attacks. KnowBe4 as a service is the world’s most popular integrated platform for awareness training combined with simulated phishing attacks and complete outsourced management makes SCCS a leading provider in cybersecurity awareness training.
-
BROOKCOURT SOLUTIONS LIMITED
DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.
-
Barrier Networks
Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.
-
CYBANETIX LIMITED
Varonis is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation.
-
INTEGRITY360 LIMITED
The XM Cyber platform continuosly and safely runs attack simulations across Hybrid-Cloud environments, identifying misconfigurations, vulnerabilities, lack of segmentation, over permissioned users-user-behavior that can allow an attacker to laterally move /compromise critical assets.
XM Cyber then prioritises the issues/devices/accounts that put the most amount of critical assets at risk.
-
ENTRUST (EUROPE) LIMITED
nSaaS is a subscription-based solution for generating, accessing and protecting cryptographic key material, separately from sensitive data, using dedicated FIPS 140-2 nShield Connect HSMs. This cloud-hosted model gives organisations the option to either supplement or replace HSMs in their data centers while retaining the same benefits as owning the appliances.
-
ODYSSEY EDUCATION LTD
Acronis provides schools with comprehensive cyber protection that helps them comply with the guidance from the Department for Education (DfE) and the National Cyber Security Centre (NCSC), addressing the threat posed by ransomware.
Covering Backup, Ransomware, Immutability, Asset, Patch and Vulnerability Management, alongside Endpoint Protection.
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt
-
ODYSSEY EDUCATION LTD
A leading provider of cloud-based education products that connect educators and students with their classroom, curriculum and each other in richer, more powerful ways. As advocates for open data standards, we offer instant access to apps/files with single sign-on, streamline class rostering, automate account provisioning, and provide actionable analytics.
-
SOFTCAT PLC
Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption
-
BYTES SOFTWARE SERVICES LIMITED
InsightCloudSec secures your public cloud environments from development to production with a modern, integrated, and automated approach. bssgc
-
Barrier Networks
Falcon Cloud Security is the industry’s only unified agent and agentless platform for code to cloud protection, integrating pre-runtime, runtime protection, and agentless technology in a single platform.
-
IBM UNITED KINGDOM LIMITED
IBM Security® Randori Recon is attack surface management SaaS. It monitors external attack surfaces for unexpected changes, blind spots, misconfigurations and process failures
-
CDW LIMITED
Email Fraud Defense stops email based identity deception. Access to a reporting portal and regular meetings with a Proofpoint consultant help to implement DMARC. Risky suppliers can be identified. SPF and DKIM can be hosted by Proofpoint and there is a Secure Email Relay option.
-
Oyster Information Management Solutions Limited
OneTrust GRC and Security Assurance is a modular GRCPrivacy Management Software solution to help all organisations: map, measure and manage risk; manage third-party risk and centrally manage and streamline the execution of compliance audits.
-
PHOENIX SOFTWARE LIMITED
"The service offers a password vault for business users to store any secrets such as (business) personal usernames and passwords to unconnected (non federated) services and any secrets including file attachments.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
TMC3 LIMITED
OneTrust GRC empowers public sector entities to streamline cyber security compliance and governance. Our integrated cyber security compliance and governance platform enhances operational risk management, ensures regulatory alignment, and supports proactive threat mitigation with cutting-edge AI insights and robust policy management tools.
-
UK ALLIED ASSOCIATES LIMITED
Hypnos is a software product to perform mediation---the encapsulation of lawfully intercepted(LI) network traffic and its delivery to a Law Enforcement Agency(LEA) compliant with ETSI and other delivery standards. The software activates warranted intercepts at the authorised time, delivers intercepted traffic to LEAs, and deactivates when authorised time elapses.
-
CHESS ICT LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
UNILINK SOFTWARE LIMITED
SafetyNet is a cloud-based solution for partnership working. It aims to reduce crime and ASB using information-sharing portal with Integrated Case Management (ICM) and a Neighbourhood Management System (NMS). This cost-effective tool monitors interventions and tracks offender progress to reduce re-offending while also improving care for victims and vulnerable adults.
-
SOFTCAT PLC
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
-
CHESS ICT LIMITED
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
SOFTSERVE SYSTEMS LTD
SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.
-
Creative Networks
Laravel PHP web development offers efficient creation of dynamic web applications using the Laravel framework. It enables developers to utilise features like routing, controllers, authentication, and real-time communication, ensuring scalable and maintainable solutions for diverse business needs.
-
Gradian Systems Ltd
Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.
-
UNILINK SOFTWARE LIMITED
Unilink's IP telephony solution facilitates secure communication for inmates, enabling them to call approved contacts. The service is managed through an administrative portal, offering comprehensive analytics, account management, and robust security monitoring features. This helps maintain inmate well-being while ensuring regulatory compliance and operational oversight.
-
ITHQ LTD
ITHQ provides uSecure's Training and Awareness Platform which focuses on reducing the Human Risk Factor in cybersecurity through integrated policy management, breach intelligence, phishing simulations, and comprehensive reporting for compliance. It educates employees, reinforces policies, and tests readiness, equipping a well-prepared workforce to combat evolving cyber threats.