-
SOFTCAT PLC
Arctic Wolf delivers fully managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response.
-
CHESS ICT LIMITED
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
SOFTSERVE SYSTEMS LTD
SoftServe's Managed Service Desk offers comprehensive L1 Support 24/7/365, ensuring exceptional user experience and satisfaction while driving measurable results towards your business and strategic goals. Our service is underpinned by SLAs, built upon the ITIL framework, and can be tailored to meet your specific business requirements.
-
Creative Networks
Laravel PHP web development offers efficient creation of dynamic web applications using the Laravel framework. It enables developers to utilise features like routing, controllers, authentication, and real-time communication, ensuring scalable and maintainable solutions for diverse business needs.
-
Gradian Systems Ltd
Concentric Semantic Intelligence uses sophisticated machine-learning technologies to autonomously scan and categorise data. Our solution discovers and categorises all your data, from financial to PII/PHI/PCI to intellectual property to business confidential information. The MIND™ deep learning-as-a-service capability, you always have the latest AI models for fast, accurate discovery and categorisation.
-
UNILINK SOFTWARE LIMITED
Unilink's IP telephony solution facilitates secure communication for inmates, enabling them to call approved contacts. The service is managed through an administrative portal, offering comprehensive analytics, account management, and robust security monitoring features. This helps maintain inmate well-being while ensuring regulatory compliance and operational oversight.
-
ITHQ LTD
ITHQ provides uSecure's Training and Awareness Platform which focuses on reducing the Human Risk Factor in cybersecurity through integrated policy management, breach intelligence, phishing simulations, and comprehensive reporting for compliance. It educates employees, reinforces policies, and tests readiness, equipping a well-prepared workforce to combat evolving cyber threats.
-
CDW LIMITED
CloudGuard CDR Pro is Check Point's Cloud Security Threat Defense Analytics platform. With CloudGuard CDR Pro customers can detect and mitigate threats to their cloud environments as well as analyze activity and leverage user and entity behavior analytics (UEBA) algorithms to fend off cloud attacks.
-
PHOENIX SOFTWARE LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
INTRAGEN LIMITED
Intragen's IAM consultants provide end-to-end professional services for the following solutions:
Identity Governance & Administration (IGA)
Access Management, Single Sign-On & Multi-Factor Authentication (SSO & MFA)
Privileged Access Management (PAM)
Customer Identity and Access Management (CIAM)
-
NETWORK INTEGRATION TECHNOLOGIES LTD
Recorded Future is the most comprehensive and independent threat intelligence cloud platform. We enable organizations to identify and mitigate threats across cyber, supply-chain, physical and fraud domains; and are trusted to get real-time, unbiased and actionable intelligence to reduce risk.
-
JUMPING RIVERS LTD
With over 25 million users worldwide and counting, Anaconda
solves unique problems associated with conducting open-source
data science in businesses across all industries, at scale.
Anaconda empowers users of all levels to achieve their data
science goals by making it easy to search and install thousands
of Python/R packages.
-
LRQA
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response.
-
SOFTCAT PLC
Sophos MDR Complete offers 24/7 threat hunting, detection, and full incident response delivered by an expert team as a fully managed service.
You control how and when potential incidents are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
IRIS INTELLIGENCE LIMITED
IRIS Environmental, Social, and Governance Management System (IRIS-ESG) helps organisations align ESG activity based on international standards such as SASB, GRI, TCFD etc. The system covers initial activity planning, automated reminders to ensure progress and management dashboards providing real time data both online and via export to custom PowerPoint templates.
-
PHOENIX SOFTWARE LIMITED
In addition to the Free and P1 features, P2 also offers Azure Active Directory Identity Protection (risk-based Conditional Access), Privileged Identity Management to help discover, restrict, and monitor administrators and their access to resources and to provide just-in-time access when needed, and Identity Governance
-
COOLSPIRiT, a Databarracks company
Complete security for Microsoft365: Barracuda Email Protection is a perfect solution for organisations that want to protect their businesses, brands, and people against the most advanced email-borne threats, Barracuda Email Protection is a comprehensive, easy-to-use solution that delivers gateway defence, API-based inbox defence, incident response, data protection, and compliance capabilities.
-
CDW LIMITED
Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data.
-
MetaCompliance Ltd
MetaLearning Essentials combines creativity, expert knowledge and innovative software to deliver effective and engaging cyber security awareness eLearning content that helps businesses stay secure and compliant. Using stories, realistic scenarios and narratives for context, MetaLearning Essentials provides animated and lifelike eLearning courses.
-
SOFTCAT PLC
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
BEYOND HOLDINGS LIMITED trading as Evouchers/Wonde
Secure Schools Online Cyber Security Policy, Training and Phishing Simulation Platform enables schools and academy trusts to build and review their cybersecurity policies. This service contains an e-learning module that provides schools and trusts with the capability to deploy customised cybersecurity awareness training and coaching to staff and board members.
-
Creative Networks
Cisco Meraki provides cloud-managed networking and security solutions for businesses. Offering wireless access points, switches, security appliances, and mobile device management tools, all centrally managed through a user-friendly dashboard, Meraki delivers simplicity, scalability, and enhanced security for organisations of all sizes.
-
SCG CORPORATE LIMITED
Provide 24x7 extended threat detection and response, Endpoint Protection is an endpoint-based malware detection and response (MDR) solution that detects and stops malicious files and processes (known as malware or ransomware).It is backed by the SKOUT Security Operations Centre to continuously monitor for major infections and to identify infection sources
-
VIABLE DATA LTD
Cloud-based facial recognition services for performing business critical functions such as security checks, personnel identification, watch-listing operations and digital travel credentials for immigration, borders, law enforcement and access control functions. Our scalable intelligent identification software platform includes the ability to integrate with existing biometric algorithms.
-
Grey Monarch Limited
Pathlock Cloud AAG provides cross application Identity and Access Security Governance, Risk and Compliance (GRC) allowing you to monitor and cleanse system access and authorisations, detect and manage Segregation of Duties (SoD) violations, detect fraud, and automate joiner, mover, leaver processes and privileged (emergency) Access.
-
Mimoto
Doormouse is a cloud hosted network registration portal designed with University Halls of residence in mind. It provides a straight forward interface for students to register their devices for use with the network from within their room.
-
CANTARUS LIMITED
Secure access service edge, or SASE, is a cloud-based security model that provides network security functions and software defined networking delivered from a single service provider. Kalani have partnered with Cloudflare to provide their best in class Zero-Trust platform with full identity-based security controls.
-
SCG CORPORATE LIMITED
3CX hosted by SCCS is a modern, IP-based alternative to a traditional PBX system and works by transferring voice/video data over internet lines(VoIP). 3CX works using SIP Trunks, provided by SCCS’ independent carrier grade network, as a 3CX Certified SIP Trunk Provider, to make and receive calls over the internet.
-
SAPPHIRE TECHNOLOGIES LIMITED
Our Profile™ SaaS solution guides you through the process of collaborative information gathering, reporting and auditing against compliance frameworks and standards including NCSC's Cyber Assessment Framework (for GovAssure and NIS Directive), HSE's OG86 and IEC/ISA 62443.
-
INTEGRITY360 LIMITED
Proofpoint Email Fraud Defense protects your employees, customers, and business partners from cyber criminals who spoof trusted email domains. It makes email authentication easy and reliable so you can stop email fraud before it reaches the inbox.