-
MISCO TECHNOLOGIES LIMITED
Acronis Cyber Protect offers a revolutionary approach to cyber protection by integrating data protection with cybersecurity. This integrated method eliminates complexity challenges, delivers better protection against today’s threats, and maximizes efficiency by saving time and money.
Features include Backup, Disaster Recovery, Security, Vulnerability & Patching, email security, data loss prevention
-
VE3 GLOBAL LTD
VE3 offers comprehensive security, governance, and compliance automation tailored for public clouds and Kubernetes environments. Our solution provides continuous visibility and control, empowering organizations to reduce their attack surface and defend against vulnerabilities, identity theft, and data loss within cloud environments.
-
EQUINE REGISTER LIMITED
Identity Verification Data Protection (GDPR) service verifies the identity of users for access to secure Equine Register Services. The service supports Data Protection/GDPR compliance enabling data subjects to exercise their rights under DPA/GDPR. The service is interoperable with our other services including the Digital Stable and Central Equine Database.
-
BYTES SOFTWARE SERVICES LIMITED
oSoSys offers a rich portfolio of security products and features for device control, data loss prevention (DLP), and eDiscovery for Windows, macOS and Linux, as well as the development of applications for portable storage device encryption and enhancement. Endpoint Protector is a dedicated DLP solution with a server/client architecture. bssgc
-
LRQA
Prisma Cloud is the industry’s most complete Cloud Native Application Protection Platform (CNAPP), with the industry’s broadest security and compliance coverage for infrastructure, workloads, and applications, across the entire cloud native technology stack—throughout the development lifecycle and across hybrid and multicloud environments.
-
AMX SOLUTIONS LIMITED
AMX for Street Lighting Asset Management is designed for high-volume, incident-prone street lighting and electrical highway assets with intricate connectivity. The software supports inspection and maintenance programmes, incident management, KPI reporting and data import-export, enabling compliance with CSS, CIPFA, HAMFIG, TR22 and BSCP520. AMX Mobile supports remote and mobile working.
-
TryHackMe Ltd
TryHackMe offers online Cloud Security training to businesses, government and educational organisations. With gamified modules available 24/7, users can expand their cybersecurity skills while enhancing their cloud security expertise. TryHackMe offers these training opportunities for people using a variety of real-world scenarios.
-
COOLSPIRIT LIMITED
Arctic Wolf delivers managed security operations as a concierge service, using our Security Operations Cloud built on Open-XDR - covering on-premises and remote workers, public cloud and SaaS environments. Modules include 24x7 Threat Detection and Response, Managed Risk & Vulnerability, Security Awareness education, and Digital Forensics & Incident Response
-
Gaiasoft International Limited
AI supported transition for portfolio oversight, outcomes delivery, learning and impact:
Performance management, M&E, Monintoring, Evaluation, Reporting, Learning (MERL). PROMIS coordinates Delivery Units. Large scale transition eg to Net Zero, Risk Management, Conflict-Prevention, Cyber-Security, NPPF, National Development, NHS Prevention Programme, Preventive Healthcare Transition, healthspan. Coalitions for Reform (C4R).
-
IDOX SOFTWARE LTD
Icarus is a Real Time Passenger Information (RTPI) system that enables passenger information and fleet management. Users can view the real time location of all vehicles within the fleet and generate reports showing statistics on vehicle operation, timeliness and movements.
-
ITogether
Portnox provides comprehensive network access control solutions designed to secure organisations against cybersecurity threats by managing and monitoring every connected device in real time. It offers visibility, control, and policy enforcement across your network, ensuring secure access and compliance with IT and regulatory standards.
-
DEFENCE DATASEC LTD
"Defence DataSec specializes in Salesforce Mobile App Development, tailored for government departments. Our expert developers create secure, user-friendly mobile apps to enhance government operations, citizen engagement, and data accessibility. We ensure seamless integration with Salesforce, enabling efficient on-the-go functionality for government entities and their constituents.
"
-
BOOMERANG I-COMMS LTD
Boomerang’s RESTful API ensures a secure, functional, high-performance messaging experience. With substantial throughput and redundancy, it meets enterprise needs for instant global messaging. Boomerang's built-in intelligence ensures accurate message matching, empowering developers to create automated conversational workflows seamlessly. ISO 27001, Cyber Essentials, and Cyber Essentials Plus Accredited.
-
ARCUS GLOBAL LIMITED
Arcus Development Monitoring aids Local Authorities to manage activities within the Planning Service in regards to the monitoring of housing, open space and commercial developments. It provides access to information allowing officers and citizens to make decisions based on up to date information.
-
DBAAS LTD
We specialize in cloud software licensing solutions, ensuring compliance and cost optimization. Our skilled team assists in selecting ideal licensing models, managing licenses across various cloud platforms, and maximizing software value.
-
GRADIAN SYSTEMS LTD
Email security service filters unwanted messages and protects your mailboxes from targeted attacks. The service has self-learning capabilities enriched with Symantec intelligence to deliver highly effective and accurate email security. Encryption and data loss prevention help you control sensitive data.
-
Qnetix Ltd
A majority of hacking-related breaches succeed through stolen or weak passwords. Empower employees to generate strong, unique passwords and share them securely whilst keeping all business passwords and other sensitive information in an end-to-end encrypted vault.
-
BEARINGPOINT LIMITED
Cloud-Native Infonova Digital Business Platform (DBP) hosted on AWS and utilizing AWS (serverless) technologies. Infonova DBP enables customers for an ecosystem play; allows to experiment, innovate & test with quick turnaround cycles; brings a marketplace new digital services; is build and provides new technologies and new and innovate business models
-
INTEGRITY360 LIMITED
Okta is a leading identity solution providing single-sign on, multi-factor authentication, access provisioning and lifecycle management for both cloud based and on-premise applications.
-
CDW LIMITED
Proofpoint P0 bundle includes Email Protection, Targeted Attack Protection (TAP) and Threat Response Auto Pull (TRAP). The Secure Email Gateway includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP sandboxes attachments and URLs. TRAP Security Orchestration Automation Response for email removes malicious, delivered messages from inboxes.
-
Madigan Solutions
Madigan Solutions User Management Tool (UMT) is a SaaS delivered platform for administering the lifecycle of users not currently managed within an HR system.
The platform can provide business logic and lifecycle processes to non-employee user types such as Contractors; Consultants; Suppliers/Vendors; Guests; Purchasers; Robots; Tenants; and Custom-Defined User Types.
-
QUADRIS LIMITED
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization
-
UNITY FIVE LIMITED
Moving Traffic by Unity5 revolutionises traffic enforcement management. With seamless integration, tech agnosticism, and cloud-native architecture, it offers unmatched efficiency and adaptability. From school streets to urban areas, customers gain real-time insights and proactive enforcement capabilities.
-
LEXISNEXIS RISK SOLUTIONS UK LIMITED
ThreatMetrix provides best-in-class fraud, identity and authentication services to help digital businesses better distinguish good customers from potential fraudsters in real time, without adding unnecessary friction. Leveraging global intelligence from the Digital Identity Network, ThreatMetrix enables businesses to make more informed fraud and risk decisions.
-
SYPRO MANAGEMENT LIMITED
Sypro RM - Sypro Risk Manager - a solution for identifying and ensuring an organisations' assets/documents and procedures are compliant, managing statutory compliance (inc. asbestos & legionella) and assessing and mitigating risk (assessing likelihood .v. impact) - links to Sypro Contract Manager-Sypro CM, NEC, NEC3, NEC4 contract management, social value
-
EQUINE REGISTER LIMITED
Enables law enforcement, local authority, welfare organisation and biosecurity representatives to manage and report animal welfare incidents in real-time. Check animal registrations from various sources (microchip, UELN, passport) and update the National Animal Registration, Central Equine and Central Canine and Feline Databases. Supports 3rd party interoperability with integrated front ends.
-
COMPUTACENTER (UK) LIMITED
Falcon Data Protection, part of the powerful CrowdStrike Falcon® platform, takes a modern approach to securing your enterprise data from adversaries. The industry’s only AI-native platform for exceptional data protection built on a unified agent and single console.
-
MTI TECHNOLOGY LIMITED
MTI – Managed Palo Alto Firewall Service offers around-the-clock support, deployment flexibility and predictable costs so you can rest assured that your firewall security is in safe hands and is securely configured at all times.
The service provides firewall configuration, administration, monitoring, report generation, support, and on-site installation.
-
KHIPU NETWORKS LIMITED
Tenable One enables you to gain visibility across your attack surface, focus efforts to prevent likely attacks and accurately communicate cyber risk to support optimal business performance.
Enterprise option include tools for breach & attack mitigation and insight into the external attack surface.
Includes other Tenable point products.
-
LEFKE IT LIMITED
LefkeIT excels in Requirement Traceability Matrix (RTM) Creation, ensuring alignment between stakeholders, development, and testing teams. Through meticulous documentation and tracking, we facilitate traceability, verification, and validation of requirements throughout the project lifecycle, ensuring transparency and accountability in project delivery.