-
TRUSTMARQUE SOLUTIONS LIMITED
Prisma Access is a cloud-based security service that provides organizations with secure access to applications and data from anywhere. It offers advanced security features like threat prevention, URL filtering, and encryption to protect against cyber threats.
-
Alcidion UK Ltd
Our modular EPR provides hospitals and integrated care systems with a modern, modular electronic patient record that supports clinical and administrative workflows. We orchestrate IT systems across health and care to create a rich data layer that is exposed to our smart technology and any applications our customers need.
-
FLOWBIRD SMART CITY UK LIMITED
The Flowbird Mobility Hub is a kerb side management platform.
Our customers can aggregate data from various mobility providers in order to have consolidated reports and analytical data.
-
MONDAS CONSULTING LTD
Purchase Tenable vulnerability management licences to utilise the Tenable Vulnerability management tool to prioritise and fix vulnerabilities within your cloud and on-prem environments. Tenable will scan your internal and external network to uncover hidden vulnerabilities.
-
FLUIDONE LIMITED
Real time device and circuit monitoring with proactive systems support provided via a suite of management tools. Data is provided on a real time and monthly basis detailing WAN circuit bandwidth usage, device processing and memory usage, IOS/service patch information, event log history and any logged incidents.
-
TRUSTMARQUE SOLUTIONS LIMITED
Cortex XSOAR provides enterprise level, GUI driven Security Orchestration Automation & Response capabilities to organisations focused on increasing efficiency of SOC Operations. Specifically, organisations who want to embark on a SOC transformation journey.
Cortex XSOAR provides advanced playbook driven SOAR functionality underpinned by a marketplace of 1000+ existing content packs.
-
MAZIK GLOBAL LIMITED
The design, documentation and assurance of secure technical architectures used for hosting applications. e.g. the Security Architecture that underpins a Risk Management Accreditation Document Set or equivalent. The mitigation of vulnerabilities. Quality Assurance of existing capability. Use of government standards e.g. Security Policy Framework (SPF).
-
CIRRO LIMITED
Cirro helps to take historic applications, those not originally designed for cloud, to work efficiently as a SaaS application. Additionally the team of developers can help modify (or recode) aspects of your application or design and create (or containerise) secure, resilient and optimal Cloud SaaS applications.
-
MICRO FOCUS
Micro Focus® Operations Bridge (OpsBridge) monitors your IT environment and consolidates data from existing tools. Operations Bridge applies automated discovery, monitoring, analytics, and remediation to data across traditional, private, public, and multi-cloud and container-based infrastructure.
It displays business and IT KPIs for executive stakeholders and
operations staff, providing real-time insight.
-
NEO TECHNOLOGY LIMITED
Neo Technology's Application Revitalisation Solutions help modernise your existing applications, addressing technical and security challenges to enhance digital service flexibility, usability, resilience, and efficiency. By modernising your applications, you can prolong the lifespan of legacy systems, reduce ongoing costs, and expand functionality through application refactoring for decreased technical debt.
-
EXPONENTIAL-E LIMITED
SentinelOne Endpoint Detection & Response (EDR) makes it simple to secure your Windows, Mac and Linux.
SentinelOne EDR will employs artificial intelligence and machine learning to detect, prevent, and respond to cyber threats faced by your organisation.
-
DATASUMI LTD
Discover the revolutionary approach to customer service through AI-enhanced customer Support. Our state-of-the-art AI technology handles routine questions and administrative duties, optimising interactions and increasing efficiency. We enhance response times by incorporating AI-driven tools into your service, ensuring quick solutions for common customer inquiries.
-
Fusion Business Solutions (UK) Limited
BMC Helix Discovery is a cloud-native discovery and dependency mapping solution for visibility into hardware, software and service dependencies across multi-cloud environments - ROI 314%, 95% improvement in IT asset security. Fusion GBS is a Platinum Partner of BMC, reselling BMC Helix Discovery.
-
Logit.io
The Logit.io platform makes logging, metrics and tracing (Observability) easy by building on the best open source technology including OpenSearch, Elasticsearch, Prometheus, OpenTelemetry, Jaeger, Logstash, Kibana and Grafana. Use the Logit.io PaaS service for container monitoring, cloud observability, logging, metrics, APM and much more. All services are ISO27001 certified.
-
INTEGRITY360 LIMITED
Cloud security platform designed to protect data and ensure security across cloud services and applications including Microsoft O365 or Zoom. It offers a range of features including real-time data and threat protection, data loss prevention (DLP), cloud access security broker (CASB) capabilities, and secure web gateway (SWG) functionality
-
SOFTCAT PLC
Sophos Intercept X for Servers delivers robust cybersecurity for server environments. With advanced threat prevention, including deep learning technology and behavioral analysis, it safeguards servers from malware, ransomware, and exploits. Real-time threat intelligence and centralized management ensure comprehensive protection, minimizing downtime and enhancing overall server security.
-
CIRRO LIMITED
IoT for Legionnaires Monitoring, Alerting & Compliance is an advanced IoT application designed to facilitate the efficient lifecycle management of multiple IoT applications and use cases on a single unified IoT platform. With an SDK and API, the applications can be integrated with existing BMS systems or new applications.
-
FUTURE DECISIONS LTD
We augment building control systems with AI cloud based intelligence to optimise operations for energy savings, improved air quality and comfort and a reduced carbon footprint.
-
adappt
Comprehensive automated software testing. Adapptesters.com provides teams of highly skilled and proficient software testing experts, equipped with a broad range of technical expertise to cater to the global demands of organisations. Automated testing ensure repeatable tasks efficiently and with accuracy, delivering better lifecycle outcomes.
-
ITHQ LTD
ITHQ provides a unified cloud monitoring service. This enterprise-grade, cloud-based monitoring platform provides comprehensive oversight of your on-premise and cloud infrastructure. It features advanced capabilities for monitoring, alerting, ticket enrichment, and automated responses, ensuring optimal performance and swift issue resolution for any infrastructure requirements.
-
INGENTIVE LIMITED
Ingentive offers structured solutions designed to help organisations familiarise themselves with the Microsoft Cloud security suite. Harnessing advanced threat detection algorithms and real-time monitoring.
Ingentive empowers organisations to detect and respond to cyber-threats swiftly. Gain comprehensive insights into your cloud environment's security posture and enhance your defence against emerging threats.
-
SOFTCAT PLC
Proofpoint ITDR enables proactive discovery and remediation of the identity risks used in ransomeware and advanced persistent threats. The platform enables active management of the attack surface to remove the risk of privilege escalation and leverages deception technology to detect and respond to attacker lateral movement.
-
NTT DATA Business Solutions (UK) Limited
SAP Identity Management aligns user lifecycle management with key business processes running in the cloud and on-premise. Business managers define role-based, compliant user access rights and identity management across SAP and third-party enterprise applications – whilst IT maintains centralised data, alerts, and reporting needed to maintain control and manage risk.
-
BYTES SOFTWARE SERVICES LIMITED
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN." bssgc
-
MICRO FOCUS
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
R2P Systems UK Ltd
TLP systems allow the user to configure particular junction approaches, tracking vehicles approaching the junctions. This tracking module produces events that can be delivered to other traffic control systems or straight to equipped junction boxes. This produces the request to turn the traffic light green for that vehicle.
-
INTEGRATION360 LIMITED
Turbo360 Business Applications is aimed at trying to make it simpler to manage and monitor solutions developed with Microsoft Azure. At runtime you need highly experienced Azure experts to manage your solution and there are significant benefits if we can democratize the support experience for your cloud solution.
-
4net Technologies Ltd
FourNet's Cloud Delivered Security provides the first line of defence against threats on the internet by blocking malicious destinations before a connection is ever established. It offers DNS-layer security, secure web gateway features and firewall capabilities, all managed from a single dashboard.
-
CHESS ICT LIMITED
Enterprise SD-WAN connectivity and NGFW security for distributed enterprises. Use SD-WAN to replace costly MPLS. Accelerate Office 365 performance, boost resilience without sacrificing security. Defend networks against emerging exploits and malware.
-
MICRO FOCUS
Application Observability provides a cloud-based enterprise service for business application health-status and performance monitoring, including:
• Discovering cloud native business application service and dependency mapping
• Monitoring and reporting usability and performance of business application
• Trace, metric, and log data for root cause analysis
• Statistics and analytical results