-
LEIDOS INNOVATIONS UK LTD
Leidos provides internal vulnerability management as a service, using the latest technologies and our experienced cyber analysts. They deliver assurance that your internal infrastructure is secured and any vulnerabilities identified quickly, reducing attack surface and mitigating risk of compromise. The service is delivered using either physical or virtual appliances.
-
VIABLE DATA LTD
Viable Data offer cloud-based identity assurance solutions, leveraging cloud-based solutions and tailoring our in-house intelligent identity verification solution, LearnID®, to meet your organisation’s specific identity assurance needs. Utilising our expertise in biometrics and security controls, we offer biometric and identity solution design, build and implementation.
-
Pontus Vision
System of records for a register of processes and activities (RoPA), Data Sources, Risks, and Mitigations. Enables customers to create a data catalogue about all Personal Data within an Organization.
-
Interneuron Ltd
Interneuron's robotic process automation technology (RPA) and launchpad provides a reliable way to automate your user provisioning and leaver capabilities. Our robots can iterate through your systems to setup and create users, manage access levels and revoke access when they leave. We can also integrate with your HR systems.
-
Gradian Systems Ltd
Broadcom offers the first CASB mirror gateway, a unique and more secure, resilient method to enforce in-line visibility, data security, and threat
protection over the use of any sanctioned cloud app from unmanaged
endpoints
-
Content Formula
Xoralia is easy-to-use policy and procedures management software built for SharePoint, Teams and Office365. Xoralia manages the whole policy lifecycle: policy creation, policy dissemination, gathering acknowledgements, quizzes and policy reviews. Xoralia is unique because it enables you to store your policies and controlled documents inside your own SharePoint environment.
-
BYTES SOFTWARE SERVICES LIMITED
Netwrix Auditor is a powerful platform designed to enhance security and compliance by providing comprehensive visibility into IT infrastructure changes and data access. It enables real-time monitoring, auditing, and reporting across a variety of systems, applications, and files, helping organizations ensure data integrity and regulatory compliance. bssgc
-
MTI TECHNOLOGY LIMITED
Trend Micro Cloud App Security protects incoming and internal emails from Microsoft 365 and Gmail™ against advanced malware and other threats. It also enforces compliance on other cloud filesharing and collaboration services, including Box, Dropbox, Google Drive™, Microsoft SharePoint online, Microsoft OneDrive for business, and Microsoft Teams.
-
BT PLC
CrowdStrike Falcon for IT, a module of the leading AI-native CrowdStrike Falcon platform, enables IT and security teams to query their entire IT estate across endpoints, servers and cloud workloads, get quick and accurate answers, and take decisive action.
-
SAPPHIRE TECHNOLOGIES LIMITED
Dot™ conducts asset discovery and vulnerability management to generate a comprehensive picture of your operational technology networks. Through the use of security-by-design and safety-critical scanning technology, our solution supports both modern and legacy networks, and leverages exclusive active scanning software.
-
SOFTCAT PLC
Proofpoint has the only CASB solution that meets the needs of security people serious about cloud threats, data loss prevention and time-to-value. Proofpoint CASB extends our people-centric security from Email to cloud apps. With people-focused threat protection, data security and cloud app governance,
-
PHOENIX SOFTWARE LIMITED
Simple, scalable and automated vulnerability scanning for web applications.
-
Espire Infolabs Ltd
Espire helps companies to re-engineer their application landscape for seamless interoperability and interaction between disparate systems. Espire provides effective strategies and solutions against security and compliance challenges based on the industry's standards and all cloud platforms (IaaS ,SaaS, and PaaS environment). Espire provides SOC Consulting, Implementation and Managed services.
-
Barrier Networks
Qualys Cloud Platform consists of a suite of IT security and compliance solutions delivered via SaaS deployment model that leverages shared and extensible core services. The solution allows customers to continuously monitor their hybrid environments for Vulnerabilities, compliance, misconfigurations, automate remediation with the aim of reducing organisational risk.
-
CDW LIMITED
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Zero Trust strategy and executive risk dashboards enable you to be more confident in your security strategy.
-
SOFTCAT PLC
As appetites continue to grow for more ways to work digitally, IT operations models have been turned on their head. Organizations continue to use traditional support models for solutions like Microsoft 365, forcing IT to re-evaluate how they support the organization now and in the future.
-
Gradian Systems Ltd
Extends data loss prevention across the enterprise, detects insider risks, and protects critical information from exfiltration
-
CYBER SECURITY DEFENCE CONSULTANTS LIMITED
The platform provides individuals or teams of up to 12 persons working together to analyse a simulated attack in a variety of virtual networks using industry standrad tools such as Splunk Enterprise Security Edition, Palo Alto firewalls etc.
-
SOMERFORD ASSOCIATES LIMITED
Okta is a leading identity and access management solution providing single-sign on, multi-factor authentication and provisioning capabilities for all applications.
Okta is the foundation for secure connections between people & technology. Using identity information to grant access to applications on any device at any time, enforcing strong security protection.
-
RPOST UK LIMITED
RMail® harmoniously integrates into any existing security stack, complementing it with enterprise-grade privacy, security, and compliance functionalities. Our flexible deployment options allow organizations to automate feature combinations at the server level, as well as in the inbox, with out-of-the-box integrations for common business tools like Microsoft Outlook, Salesforce, and more.
-
PHOENIX SOFTWARE LIMITED
AvePoint Policies makes it easy to automate common rules for access, settings, and other Microsoft 365 configurations. Set white/black list policies, rules for external sharing, and more. When AvePoint Policies finds configuration drift, you can notify and revert the change automatically. Securing collaboration in Teams, Groups, Sites, and OneDrive.
-
XPERTEX LTD
Cortex Xpanse is an Active Attack Surface Management (ASM) solution that helps your organization actively discover, analyse and respond to unknown risks in all connected systems and exposed services.
Cortex Xpanse provides complete, current, and accurate visibility into your public-facing infrastructure without any manual intervention from your security teams.
-
KTSL Limited
Efecte offers a comprehensive suite of cloud-based solutions, including IT and Enterprise Service Management, Identity and Access Management and conversational IT.
-
Computacenter (UK) Ltd
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
BYTES SOFTWARE SERVICES LIMITED
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents. bssgc
-
MTI TECHNOLOGY LIMITED
MTI's Anti Malware Solution combines Trend Micro's market leading, next generation server and endpoint protection with MTI's 30 year experience of protecting UK Public Sector. The solution is delivered from our UK based 24*7*365 operations center and based around Trend Cloud One Workload Security and Endpoint Protection suites.
-
MISCO TECHNOLOGIES LIMITED
Information and communications technology (ICT)
-
INTEGRITY360 LIMITED
ID Plus is part of the AI-powered RSA Unified Identity Platform. The platform combines automated identity intelligence, authentication, access, governance, and lifecycle into one cohesive solution, to protect the gaps and blind spots that result from combining multiple point solutions.
-
BYTES SOFTWARE SERVICES LIMITED
Harmony Endpoint is a complete endpoint security solution built to protect the remote workforce from today’s threat landscape. Preventing the most imminent threats to endpoints such as ransomware, phishing or drive by malware, while quickly minimizing breach impact with autonomous detection and response. bssgc