-
ITHQ LTD
Netskope Intelligent Security Service Edge (SSE) consolidates business critical security services within the Netskope One platform, ensuring secure access to the web, cloud services, and private apps from any location. Intelligent SSE empowers enterprises to safely enable their hybrid workforce by applying a cloud-delivered and AI-powered data-centric approach to security.
-
NEXUS FUSION LIMITED
Nexus Fusion provides Droplet NeverTrust™ containers cloud technology to ensure secure delivery of x86 apps to supported OS on any cloud. With trust in none, all inbound traffic is blocked, safeguarding clients' app layers and achieving top cyber accreditation, even with outdated software.
-
Central Networks and Technologies Ltd
Darktrace leverages AI to detect and respond to emerging cyberthreats in real time across the entire digital estate.
-
Barrier Networks
Leveraging FortiWeb VM, Container and SaaS based technologies to protect hosted web applications from attacks that target known and unknown exploits. Using AI enhanced multilayer and correlated detection methods, FortiWeb defends applications from known vulnerabilities and from zero-day threats, along with providing DDoS and Load-balancing capabilities for applications.
-
Rowden Technologies Ltd
Rowden's ML Platform revolutionises data processing with Data Augmentation and Diversity, improving training sets for stronger model building. It supports cost-effective, precise experimentation, and faster iterations, enhancing accuracy. Prioritising secure development enables thorough validation and bias reduction, safeguarding data privacy. The outcome: swift development, scalable testing, and trustworthy ML models.
-
Trustmarque Solutions Limited
Trustmarque SIP Trunks provide a flexible alternative to ISDN and are compatible with leading IP PBX brands in the UK.
Compared to ISDN, SIP Trunks are cheaper, more flexible, and offer a robust business continuity service.
They deliver enhanced features including; automatic fail-over, flexible SIP channels and inbound call control.
-
Barrier Networks
Barrier Networks provide a Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defence against threats on the internet. Deployed in minutes, our managed service provides immediate intelligence, visibility and protection.
-
TRYHACKME LTD
TryHackMe offers online Cyber Security and Cloud Security training to government and educational organisations. Users can expand their Cyber Security skills with gamified real-world scenarios, available 24/7.
-
INET
Our team provides a structured review of your key assets, unique threats to them and likely means of compromise. Comprising a review of your cloud environments’ security design, architecture, configuration and governance, we produce detailed threat profiles addressing your operational fingerprint to enable tactical and strategic evolution of your posture.
-
Cisilion Limited
Cisilion provide customers with a range of services including cloud consultancy, professional services and ongoing support or managed services for the deployment and support of Cisco collaboration solutions.
-
CHESS ICT LIMITED
Forcepoint Advanced Malware Detection integrates with Forcepoint NGFW as an additional defense against zero-day and other advanced, evasive malware. Forcepoint NGFW can deploy, monitor, and update thousands of firewalls, VPNs and IPSs from a single console – cutting network operating expenses up to 50%.
-
WR LOGIC LIMITED
The Application Development Teams work in squads to develop next generation cloud-based applications. Specialising in integration with PaaS services, the team develop responsive and feature rich applications that utilise the best technologies the cloud has to offer. Including PowerApps, PowerPlatform supporting the common data platform Dynamics 365
-
Softcat Limited
Avoid security breaches and business disruptions by enabling
administrators to quickly revert entire AD objects or just a single attribute to a known good state, without downtime.
This comprehensive solution handles AD objects, attributes, group memberships, DNS entries, Group Policy objects
(GPOs)— overcoming key limitations of the AD Recycle Bin
-
Brookcourt Solutions
Threat Intelligence platform providing visibility into real-time malware threats targeting customers. Alerts about high-risk vulnerabilities and supporting patch management. Visibility into threat actors mentioning organizations in illicit communities. Identification of high-value credentials coming up or being sold by illicit threat actors. Steady stream of high fidelity IOC’s and malicious infrastructure.
-
Kick ICT
An experienced and trusted provider of datacentre services, we made a significant investment to upgrade our datacentre in 2019, delivering a state of the art, fully managed Nutanix hyper converged infrastructure hosting solution for our customers, with all the security and accessibility benefit this brings.
-
CDW Limited
"XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN."
-
FullProxy Ltd
FullProxy can provide AWS/ Azure for F5 products/services which are already available on AWS Marketplace. These offers can give customers access to discounted prices on the list prices for these services. FullProxy can ensure maximum ROI by additionally providing consultancy to design, configure and maintain these new customer services.
-
NG Bailey IT Services Limited
NG Baileys Network Management service delivers network management tools from configuration and traffic profiling to performance monitoring and network topology mapping
An integrated, multi-vendor approach that’s easy to use, extend, and scale to keep the network optimised
Working with providers such as: Solarwinds
-
Ve3 Global Ltd
VMWare Workspace ONE empowers enterprises with secure app management. Integrating access management and endpoint control, VE3 modernizes IT operations for mobile-cloud dynamics.
-
Chess CyberSecurity Ltd
XGS Firewall integrates the essential SDWAN features and capabilities such as flexible ISP and WAN connectivity,
as well as redundancy and failover, robust VPN orchestration, unique application control and visibility. Application routing over preferred links via firewall rules or policy-based routing is also one of key feature for SDWAN.
-
INFRASYS LIMITED
Infrasys provide enterprise-class cloud-hosted applications and services. Infrasys ensure (where appropriate) the structured migration of applications from on-premises to the cloud (or cloud-to-cloud), the commissioning of new cloud-based services and applications, and the ongoing support of cloud-hosted applications.
-
Softcat Limited
Netwrix Privilege offers organizations a comprehensive solution to manage, monitor, and secure privileged access, including Just-in-Time (JIT) provisioning. With JIT, it enables on-demand access, ensuring users have temporary privileges only when needed, enhancing security by minimizing exposure. This approach strengthens cybersecurity defenses while maintaining operational efficiency and regulatory compliance.
-
Cinos
Gain insights into your digital infrastructure with our Full Stack Observability (FSO) service. Delivers real-time visibility across applications, infrastructure, and networks, empowering proactive monitoring and rapid issue resolution. Seamlessly integrate logs, metrics, and traces for comprehensive performance analysis. Elevate your operations with actionable insights and enhanced reliability.
-
Exponential-e Ltd
Single-Vendor Secure Access Service Edge (SASE) solutions are tailored for public sector organisations seeking to enhance their network security and operational efficiency. This service integrates essential security functions such as SSL inspection, advanced malware protection, and intrusion prevention with cutting-edge network management technologies, leveraging a cloud-native platform.
-
Red Sift Ltd
Stop brand abuse, fraud, and lookalike attacks by discovering and monitoring lookalike domains imitating your legitimate brand. Automatically discovers known, unknown, and lookalike domains. Provides deep intelligence using WHOIS data, certificate data, web snapshots, DNS signals, and live spam data. Identifies sites abusing your brand with machine-vision powered logo detection.
-
Through Technology Limited
NodeZro Command Centre automates the discovery, mapping, monitoring, vulnerability management and supply chain risk analysis for Internet DNS Namespaces. It provides customers with an efficient automated process to understand and secure your external digital footprint while reducing the risk of domain hijacking and phishing attacks. The leading Namespace Security Tool.
-
Kick ICT
We provide a multi layered cyber security solution with firewalls, anti-virus, ransomware protection, multi-factor authentication, email protection and network security.
We are also able to provide Cyber Essentials support, enabling you to achieve full accreditation.
-
Phoenix Software Ltd
Flowmon allows you to pinpoint the root cause of network problems, giving you complete network visibility and helps spot security threats such as Ransomware early in the attack chain with ease thanks to its AI-engine and unmatched flexibility - for on-premise, cloud and hybrid environments.
-
Brookcourt Solutions
Leveraging Fortigate Virtual Machine (VM) technology to provide Software-Defined Wide Area Networking (SD-WAN) and Software Defined Networking (SDN) with security functionality, including; Unified Threat Management (UTM), Sandboxing, Email Security, Machine Learning, Network Access Control (NAC), Authentication, Remote Access Services and Web Application Filtering (WAF).
-
WR LOGIC LIMITED
Azure Deep Learning Studio caters to organisations needing advanced deep learning solutions in domains like NLP and computer vision. Leveraging Azure's GPU clusters, it efficiently trains complex models. With TensorFlow, PyTorch, and MXNet, it enhances predictive capabilities, driving innovation in various domains.