-
RAZOR THORN SECURITY LTD
Incapsula is a cloud-based application delivery service enabling organisations of all sizes to enjoy enterprise-grade website security, performance and availability. Incapsula includes best-of-breed web application firewall; comprehensive DDoS protection; global content delivery network and an application level load balancer, which are available as standalone services or as an integrated solution.
-
Creative Networks
Gamma Horizon is a cloud-based business communication service offering features like voice calls, conferencing, and messaging. It boosts productivity and connectivity by providing accessible tools for collaboration across devices, aiming to streamline and enhance communication within organisations.
-
INTEGRITY360 LIMITED
Secure user inboxes, adopt a proactive security posture, and save time on email security operations. Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks. With deep integrations into Microsoft and Google environments and workflows.
-
Communication-STEM Ltd
iboss is a Zero Trust Edge. iboss utilises a cloud architecture allowing customers to easily migrate from legacy appliances, whilst maintaining 100% dedicated IP address space in the cloud. This allows for PDNS integration, and admin created GDPR Zones with dedicated UK datacentres. Packages include Filtering, Malware detection and DLP.
-
Bright Cyber (Voodoo technology LTD)
DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain names, DNS and related data for cyber threat intelligence.
-
Barrier Networks
DNS Detection and Response solution, detects threat activity and stops attacks occurring, using DNS threat intelligence, disrupting attacker supply chains. AI-driven analytics focuses analysts and provides insights reducing MTTR, raise ROI of existing security tools, and elevate SecOps efficiency. Domain Monitoring/Domain Takedown services enable brand protection and combat emerging threats.
-
Brookcourt Solutions
DomainTools helps IT Security analysts assess threat levels of unknown domains, profile attackers and quickly enumerate associated internet assets in order to stop attacks early, saving time and money. DomainTools has the most comprehensive data on domain name, DNS and related data for cyber threat intelligence.
-
Barrier Networks
Infoblox provides critical network and security services through scalable integrated DDI, Automation, Discovery, DNS Security, and Threat Intelligence. Manage your network from a unified UI, eliminating downtime, reducing operational inefficiencies and provide unmatched performance and protection. Infoblox can be delivered as a SaaS managed, Hybrid/Multi-Cloud or On-Premise solution subscription model.
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
Softcat Limited
Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Akamai's Protective DNS Service, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.
-
Creative Networks
Cisco Meraki provides cloud-managed networking and security solutions for businesses. Offering wireless access points, switches, security appliances, and mobile device management tools, all centrally managed through a user-friendly dashboard, Meraki delivers simplicity, scalability, and enhanced security for organisations of all sizes.
-
Performance Networks Ltd
The Performance Networks Managed Wi-Fi service offers support, monitoring and management for both existing and new public WiFi and private WiFi networks, offering a guest WiFi registration captive portal, data capture, content filtering and monitoring. GDPR compliant data collection, marketing and analytics. Our service works with most WiFi vendors.
-
Xalient Holdings Limited
Based on a Zero-trust Framework that gives our clients digital identification. Our products offer a complete Identity and Access Management (IAM) platform that integrates Privileged Access Management (PAM) and Identity Governance Administration (IGA), two essential components of AM. Strong partnerships with BeyondTrust, Okta, SailPoint, CyberArk, and Saviynt
-
Softcat Limited
Netwrix Change Tracker enables organizations of all sizes to enhance their security posture by hardening configurations, monitoring changes, and delivering superior forensic capabilities that minimize the time and effort needed to identify the cause and scope of a security breach.
-
Ve3 Global Ltd
We build, deploy, maintain, support, and host cost-effective iOS and Android mobile apps, hosted on a SAAS model. We offer hybrid and native mobile application development. Our user-centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop, and deliver on time and within budget.
-
Gradian Systems Ltd
Forcepoint Advanced Malware Detection leverages proven technology to detect zero-day and other advanced malware. Using Deep Content Inspection technology, AMD emulates an entire host, interacting with malware to expose and observe a malicious object's possible actions. Integrates with Forcepoint NGFW, CASB, Web and Email security solutions.
-
Cloudflare, Inc.
Secure user inboxes, adopt a proactive security posture, and save time on email security operations.
Our cloud-native email security platform crawls the Internet to stop phishing, Business Email Compromise (BEC), and email supply chain attacks.
With deep integrations into Microsoft and Google environments and workflows.
-
Safenames Ltd
Managing a portfolio of domain names can be both time consuming and challenging. The Safenames’ International Domain Portal (IDP) is a platform that enables you to register and manage thousands of domains names with great efficiency and effectiveness.
-
Softcat Limited
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
Phoenix Software Ltd
Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.
-
Nine23
UK Sovereign Private Cloud Hosted ZTNA Gateway, delivered as a managed service. People-Defined Security, deliver fast, Zero Trust access connections for your users everywhere to the resources they need anywhere. Can be used for connectivity to public sector networks such as LECN, PSN, HSCN and Internet/Public Cloud services.
-
Rowden Technologies Ltd
Rowden's Self-managed TAK Server offers a foundational, cost-effective cloud solution on AWS or Hybrid platforms with custom security design, Docker-based deployment and basic PostgreSQL database features. Perfect for teams requiring straightforward, secure communication with minimal support.
-
Creative Networks
Cloud Security Posture Management (CSPM) ensures the security of cloud infrastructure through continuous monitoring, automated remediation, policy enforcement, risk assessment, and reporting. It identifies and resolves misconfigurations, vulnerabilities, and compliance issues, providing visibility and prioritisation to safeguard against threats and maintain regulatory compliance.
-
Specialist Computer Centres plc
Effortlessly integrate PSTN calling into Teams across desktop and mobile. Our comprehensive solution, including SIP, contact centre, call recording, and devices is designed to replace outdated PBXs and ISDN reliance. Enjoy ongoing management automation, referenceable deployment, expert support and innovative integration for a seamless transition to cloud communications.
-
Focus Group
Focus Group are a Cloud Solutions Provider allowing your organisation to benefit from license consultancy and procurement of Cisco Meraki services including cloud-controlled wired and wireless networking, SD-WAN, network security, Wireless Access Points, LAN switches and SD-WAN through our fully managed cloud dashboard
-
INTEGRITY360 LIMITED
Sophos Firewall provides a true next-gen platform to tackle the modern encrypted internet and evolving threat landscape. It identifies hidden risks, protects against threats, and responds to incidents without taking a performance hit. Xstream Architecture utilizes a packet processing architecture that delivers extreme levels of visibility, protection, and performance.
-
EntServ UK Ltd part of the DXC Technologies Group
Management of Secure ERP solutions for Local and Government clients. Provides full stack of managed cloud services for Oracle applications. Delivered via secure cloud or hosted in secure DXC UK-based data centre.
-
Clarity Tech Ltd
Clarity Tech supplies cloud-based technologies that provide access to information through various applications and systems. Our ICT services include Development of Service Strategy, Service Design, Service Transition, Operations Management, and Continuous Service Improvement. Technical management, Application Management, Incident, and Problem Management.
-
Kick ICT
Disaster recovery as a service is a backup model that uses cloud resources to protect applications and data from disruption caused by a disaster. It also provides a total system back up that allows business continuity in the event of system failure.