-
Computacenter (UK) Ltd
Proofpoint-Insider-Threat-Management takes a people-centric approach to protect your organisation against data-loss/malicious-acts/brand-damage, involving insiders. We defend against authorised users acting maliciously/negligently/unknowingly. And correlate user activity and data movement to protect you from insider-led data breaches. Plus, we detect risky behaviour in real-time to give you easy to understand evidence of wrongdoing.
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt
-
Jisc Services Ltd
The Jisc Web Application Firewall (WAF) service is based on Fortinet's FortiWeb WAF, providing a cloud-based service that makes your websites safer, faster and more reliable. The service guards against DDoS attacks and protects against data breaches resulting from malicious cyber-attacks and vulnerability exploits.
-
Computacenter (UK) Ltd
CrowdStrike Falcon® Next-Gen SIEM revolutionizes threat detection, investigation and response by bringing together unmatched security depth and breadth in one unified platform to stop breaches.
-
Telana Limited
Project Shyrka®, the cutting-edge solution that revolutionizes how businesses leverage AI-powered conversations with their data. It harnesses the full potential of Microsoft cognitive services and OpenAI’s ChatGPT 4, all within a secure and controlled environment. Say goodbye to data privacy concerns and hello to a new era of intelligent communication.
-
STERLING COMPUTERS CORPORATION (UK) LTD
Druva is the only 100%-cloud solution that combines snapshots, backup, and DR at enterprise scale. Simplify snapshot orchestration, reduce storage costs by up to 50%, and protect against ransomware with secure, air-gapped backups isolated from your primary AWS environment.
-
PHOENIX SOFTWARE LIMITED
Sophos Email is a cloud-based secure email gateway solution built to integrate seamlessly with popular email platforms (Exchange Online, Google Suite etc..). Sophos Email is engineered to keep businesses safe from email threats such as Malware, Zero Day, Phishing, Spam while also preventing Data Loss and providing Email Encryption
-
Clarity Information Solutions
FastForm Cloud Ticketing is used by police road safety back offices to process and store road traffic offence documents, including camera offence records, officer-issued tickets and collision records. FastForm provides scanning, data capture, document management and workflow features that support efficient and reliable offence record processing and case management activities.
-
MetaCompliance Ltd
MetaPrivacy is a cloud-based privacy lifecycle management system that delivers an automated approach to data privacy compliance. The platform has been designed to increase stakeholder engagement by providing graphically rich, interactive assessments incorporating video instruction, as part of the personal data information gathering phase.
-
BRITANNIC TECHNOLOGIES LIMITED
SIP telephone routing service supporting move from PSTN / ISDN network to next generation SIP / IP calling. Provides cost reduction from line consolidation and replacement of legacy analogue and digital lines with dynamic call routing, enhanced management portal & Live language translation. Supports business continuity and increases efficiency.
-
e2e-assure Ltd
A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.
-
Grøn Sky ApS
Groen Sky (green cloud) has developed the SaaS platform CopenCloud, where we offer climate-smart cloud storage and backup. The platform is climate certified and generates a CO2 report that can be used in the customers' ESG accounts. Likewise, the platform offers security by design and cost efficiency.
-
BYTES SOFTWARE SERVICES LIMITED
Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments. bssgc
-
European Electronique
European Electronique is a specialist provider of Microsoft's Enterprise Mobility and Security (EMS) solutions. We can provide a range of services to take advantage of the benefits mobility brings. EMS offers a suite of integrated solutions which manage user identity, application delivery and data security across cloud and local infrastructures.
-
Reliance High-Tech Ltd
Xprotect is a video surveillance system designed to integrate with multicamera types and connection methods to provide one seamless interface along with a suit of analytics features
-
Melissa Data Ltd
Service checks an individual or organisation against global Watchlists, performs PEP & Adverse Media checks for AML and fraud prevention. Service uses multiple global sanctions data for politicians, prominent leaders, national legislatures and blacklisted individuals around the world. Also checking for adverse media against individuals. Covering 200+ countries and territories.
-
Think Cyber Security
Redflags® from ThinkCyber is a behavioural risk solution that diverts people away from high-risk activity, in the moment, to deliver a measurable reduction in operational risk . By uniquely applying behavioural and learning science to create ongoing, contextual security awareness Redflags delivers meaningful outcomes for its clients.
-
BRIGHT CONSULTING SERVICES LIMITED
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative. As Premier Splunk Reseller and Professional Services Partner BRIGHT brings 16+ years of experience and provide E2E solutions for ITOps, Security, Compliance, RiskManagement, Business analytics.
-
TMC3 LIMITED
Data Protection Impact Assessment (DPIA) and automation by OneTrust. The platform enables organisations to centrally operationalise and demonstrate accountability for UK GDPR DPIA requirements. The DPIA Automation module enables organsiations to enforce governance and remove the reliance on manual processes to reduce cost and simplify data protection compliance.
-
SOMERFORD ASSOCIATES LIMITED
Lacework offers automated anomaly detection providing consistent visibility, context, and security across cloud environments, providing customers with the ability to detect attack activity stemming from known and unknown threats. Lacework uses data and automation facilitating the security of multi-cloud environments, helping customers prioritise risk, so they can innovate with confidence.
-
PLANNED LINK LTD
Our Elastic services range from Elastic, Logstash, and Kibana (ELK) design, through to Elastic Managed Services using Elastic SIEM to provide machine learning based threat detection. Ingest, index, and store disparate logfiles for search and analytics, alerting and reporting, or real-time monitoring across AWS, Azure, GCP, and on-premise.
-
CHESS ICT LIMITED
Central Intercept X Advanced is the industry’s most comprehensive endpoint protection built to stop the widest range of threats. Includes multiple policies, control capabilities (Web, Peripheral, Application, DLP) and threat cases. For virtual environments, a light agent for Windows Desktop VM’s provides off-board scanning and protection.
-
MONDAS CONSULTING LTD
Purchase Crowdstrike EDR licences to utilise the power of the Crowdstrike Falcon Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team can monitor the Crowdstrike EDR for signs of malicious activity on your network.
-
Grove Information Systems
Powered by industry-leading AI, the Enterprise Immune System is a self-learning cyber defense platform capable of detecting and responding to cyber-attacks in real-time. Requiring no set-up, the technology is relied on by organisations to protect their entire digital enterprise, including the cloud, virtualised environments, SaaS applications, and industrial control systems.
-
Innovate IT Ltd
Innovate is a certified Okta delivery partner, delivering Okta WIC and CIC (Auth0). We can help you purchase your licences, whilst offering expert advice on what you need to achieve your business goals. Okta connects any person with any application on any device. It's the market leading (GARTNER) identity platform.
-
Planet IT
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions offers Chrome - Minecraft: Education Edition, an educational variant of the popular Minecraft game. This version specifically supports and promotes learning through play, incorporating lessons in STEM, history, language arts, and more. It fosters critical thinking, collaboration, and creativity in an immersive virtual environment.
-
PHOENIX SOFTWARE LIMITED
This new package includes advanced threat protection services including Microsoft Threat Protection (Azure Advanced Threat Protection (ATP), Windows Defender ATP, and Office 365 ATP including Threat Intelligence), as well as Microsoft Cloud App Security and Azure Active Directory.
-
SOMERFORD ASSOCIATES LIMITED
SecurityScorecard’s Managed Cyber Risk Services bridge the gap between
vendor risk and cybersecurity by helping organizations augment their existing
third-party risk cyber programs with a team of cybersecurity professionals with
experience in incident response to uncover vulnerabilities and improve cyber
hygiene across their vendor landscape
-
CDW LIMITED
Proofpoint's Complete package adds Email Fraud Defence, Secure Email Relay, Supplier Threat Protection, Email DLP & Encryption, Misdirected Email & Email Exfiltration, TAP ATO & ITDR Spotlight to the Core package offerings.