-
INTEGRITY360 LIMITED
WALLIX Bastion is a leading PAM solution that delivers robust security and
oversight over privileged access to critical IT infrastructure.
Through your digital transformation, WALLIX Bastion can be
seamlessly deployed from on-premise to private and public cloud
infrastructures.
-
Wizard Cyber
Provide a SaaS Hosted threat detection & response platform for M365 and/or AWS
-
IBM United Kingdom Ltd
IBM API Management solution provides organisations with the tools to Create, Run, Manage, Secure and Analyse APIs with complete lifecycle management for enterprise grade workloads. An award-winning API Portal for developers from B2B/B2C enables easy API onboarding and fantastic consumer experience. Advanced analytics provide insights to better manage APIs.
-
iProov Limited
iProov Face Verifier uses Genuine Presence Assurance to securely authenticate a person’s face against a pre-enrolled biometric template. Assuring it is the right person (and not an imposter), a real person (using liveness detection), authenticating right now (using a one-time biometric). Contactless cloud-based solution, no requirement for specific hardware.
-
IRIS Intelligence Ltd.
IRIS Asset Management Software (AMS) provides organizations with an intuitive and easy-to-use platform to effectively manage equipment and inventory. Assets can be tracked from procurement to sunset across categories and business units. IRIS-AMS is fully customisable to fit your organisational needs in managing your assets throughout their life cycles.
-
Softcat Limited
Cloud-delivered, powered by over 250 million global sensors, Trend Micro One discovers dynamic attack surface, assesses risk, helps you respond with the right security at the right time. Built-in support for a Zero Trust strategy and executive risk dashboards enable you to be more confident in security strategy, all-in-one solution
-
Trustmarque Solutions Limited
Forcepoint Data Guard delivers zero trust, bi-directional, automated data and file transfers between physically separated networks. Data Guard leverages a trusted operating system and security policies enforcing role and process separation/isolation for automated, byte-level content inspection and sanitisation, with customisable rules handling the most specialised data types and protocols.
-
MICRO FOCUS
Real-time threat detection and response with open and intelligent SIEM (Security Information and Event Management). Real-time correlation to detect and escalate known threats. Threat intelligence feeds, distributed correlation, customisable rulesets, layered analytics, community content, and the Activate framework. Scalably address any SIEM use case your organization faces.
-
GLANTUS UK LIMITED
Delve reconciles vendor statements to AP transactional data and enables the digital capture of statements in paper, PDF, or Excel formats. It creates an automated side-by-side comparison of supplier invoices and payment activity to customer AP transactions.
-
INTEGRITY360 LIMITED
ZT CDR is a novel technology that stops malware. Previous techniques rely on detecting the malware to stop it, an approach eventually defeated by attackers finding better ways to hide it. ZT CDR assumes all data is bad, extracts the business information and builds brand new safe data to deliver.
-
Cubelus Limited
Observatory is a fully audited Internet Intelligence and Investigations platform. It provides disposable secure infrastructure and tools which allows LEA and HMG investigators to collect OSINT securely, anonymously and to evidential standards. It allows users to create and use multiple bespoke digital footprints to prolong the lives of social-media profiles.
-
Elemendar - AI for Cyber Threat Intelligence (CTI)
Elemendar supplies an AI analyst for Cyber Threat Intelligence (CTI), the information that tells cyber defence analysts which threats to defend against. Our AI makes this intelligence written for humans machine-readable so that organisations can instantly defend against new cyber threats.
-
Bytes Software Services
Advanced eDiscovery reduces your eDiscoverycosts by using machine learning to analyse relevant data, to allow more efficient document review and data reduction decisions. You can work with data stored in Exchange Online, SharePoint Online, OneDrive for Business, and Teams for Business. bss13
-
Specialist Computer Centres plc
4me is the Complete Service Management platform enabling departments, like IT&HR, to work together seamlessly, including external service providers where services are outsourced. Automate requests from customer or citizens to interact with the right service providers within your organisation. 4me supports ITIL and fully integrates knowledge-management, time-tracking and project-management capabilities.
-
Experian
Investigator Online is a secure web service product to enable the Police and Law Enforcement agencies to investigate crime
-
INTEGRITY360 LIMITED
A cloud-based vulnerability management solution
-
INTEGRITY360 LIMITED
Netwrix StealthINTERCEPT alerts you to suspicious or risky changes, authentications and other events in real time, so you can prevent them from turning into full-fledged breaches that land your organization in the headlines.
-
SecurityHQ
Our service provides round-the-clock monitoring of your IT Infrastructure to detect, investigate, notify & respond to incidents & potential threats affecting your organization. Using SIEM as a Service, SecurityHQ provides MDR, powered by IBM QRadar & Microsoft Sentinel with real-time log analytics, threat hunting and advanced SOAR technology.
-
Bytes Software Services
Customer Lockbox gives customers explicit control over in the very rare instances when a Microsoft engineer may need access to customer content to resolve a customer issue. This is in addition to in-built Role Based Access Control (RBAC) Lockbox process that provides just-in-time, limited and time-bound authorised access. bss13
-
PACE-XL LTD
Discover, analyse, consolidate and migrate enterprise email, files, and collaboration from on-premises or cloud-based Legacy systems, file shares, previous SharePoint versions, Exchange, and more into Office 365.
-
Orpheus Cyber
Orpheus' platform delivers continuous monitoring of cyber risk in your Third Parties and Supply Chain. We use accredited Threat Intelligence and award-winning Machine Learning to continuously monitor and assess each of your Third Parties' cyber risk. We alert you to severe vulnerabilities in your supply chain likely to be exploited.
-
Cantarus
CyberSmart - A platform to continuously monitor your Cyber Essentials compliance and help protect your business from cyber attacks.
-
Barrier Networks
We have selected industry leading, next generation endpoint solutions that combine traditional endpoint protection with endpoint detection and user behavior analysis. This allows us to configure use cases aligned to your business whether you are concerned with compromised devices, malicious users or negligent users.
-
MEDICARE NETWORK LIMITED
Next-generation vulnerability management and world’s first CREST certified automated penetration testing platform performs around-the-clock penetration testing and predicts attack path scenarios. Low network footprint, discovery of vulnerabilities, testing many attack scenarios in a very short time ensuring an undisrupted network operation. Detailed reports together with proposed remediations of attack vectors.
-
Bytes Software Services
BeyondTrust Password Safe unifies privileged password and privileged session management, providing secure discovery, management, auditing, and monitoring for any privileged credential, enabling complete control and accountability over privileged accounts. bss13
-
QUADRIS LIMITED
Mimecast DMARC Analyzer is a 100% SaaS solution that reduces the time and complexity of enforcing DMARC authentication.
-
QUADRIS LIMITED
Quadris and Datto work together to provide an industry leading hybrid on-premise and cloud DR and backup solution. An on-premise backup appliance backups up locally, but also syncs this data to a different data centre, this same backup job can be booted live in a DR event.
-
INTEGRITY360 LIMITED
Proofpoint Threat Protection Suite is made up of Email Protection and Targeted Attack Protection (TAP). Email Protection (SEG Secure Email Gateway) includes AV antivirus, spam detection and authentication (SPF, DKIM and DMARC). TAP includes sandboxing attachments and URLs as well as URL rewritting and BEC Business Email Compromise detection.
-
Frazer-Nash Consultancy LTD
VIMA provides WithSecure Elements Collaboration for M365 to:
Protect your business from advanced email threats
Easy deployment with the highest possible detection rate for business security, complements the email security capabilities of Office 365 to bring you a comprehensive protection against the most sophisticated phishing, malicious content, and targeted attacks.
-
FRAMA (UK) LIMITED
Frama Rmail is an email encryption service that plugs-in to your existing Outlook or Gmail solution. It allows you to encrypt sensitive or confidential information with a click, and ensures GDPR compliance in the dissemination of important data. It has a wealth of features designed to keep your data safe.