-
Motorola Solutions UK Limited
Avigilon Alta Aware is a cloud-based video surveillance solution that brings full AI video analytics and operational insights to your existing cameras and systems. Aware supports Avigilon cloud cameras, select 3rd party video surveillance cameras and integrates with supported API enabled systems such as access control solutions.
-
ITHQ LTD
Netskope Intelligent Security Service Edge (SSE) consolidates business critical security services within the Netskope One platform, ensuring secure access to the web, cloud services, and private apps from any location. Intelligent SSE empowers enterprises to safely enable their hybrid workforce by applying a cloud-delivered and AI-powered data-centric approach to security.
-
Proact IT UK Limited
Proact’s Managed SIEM as a Service (SIEMaaS) provides customers with a Security Information and Event Management protecting monitoring service which includes 24x7x365 monitoring, alerting and incident management support. The service provides remote collection and analysis of logs, using a leading public cloud hosted Security Information and Event Management solution
-
ITHQ LTD
Rapid7 Cloud Risk Complete is an integrated security platform that manages risks across cloud, on-premises infrastructure, and web applications. It provides comprehensive vulnerability management, dynamic application security testing, and automated workflows to enhance security postures efficiently.
-
NEXUS FUSION LIMITED
Nexus Fusion provides Droplet NeverTrust™ containers cloud technology to ensure secure delivery of x86 apps to supported OS on any cloud. With trust in none, all inbound traffic is blocked, safeguarding clients' app layers and achieving top cyber accreditation, even with outdated software.
-
MTI Technology Ltd
MTI Managed SIEM (Security Information and Event Management)/SOAR/SOC Service provides centralised security monitoring, threat intelligence and response service for on-premises, hybrid and cloud environments. Our UK based Security Operations Centre, staffed with SC Cleared SecOps analysts is fully integrated with Microsoft Sentinel and offers 24*7*365 monitoring, response and assurance.
-
Brookcourt Solutions
Proofpoint Insider Threat Management (ITM) takes a people-centric approach to protect your organisation against data loss, malicious acts and brand damage involving insiders. We defend you against authorised users acting maliciously, negligently or unknowingly.
-
Ve3 Global Ltd
Recognized as a market leader in both Enterprise Architecture and Strategic Portfolio Management, Alfabet helps organizations plan and execute their digital transformation by providing insights into the strategic impact of business, IT and change portfolios. Alfabet provides entry solutions that support both low maturity and extremely complex organizations.
-
DATASUMI LTD
Are you seeking a waste management optimisation solution designed explicitly for your UK public sector organisation? You can look no further than Datasumi. Our AI-enhanced service aims to assist you in managing waste efficiently and maximising recycling rates.
-
BOXXE LIMITED
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
-
MONDAS CONSULTING LTD
Purchase KnowBe4 Security Awareness Training licences to upskill your staff by utilising the KnowBe4 AI powered security awareness training and phishing simulations, to protect against Cyber Security threats. The KnowBe4 tool can be purchased in silver, platinum, gold or diamond. Our SOC team can run regular KnowBe4 exercises.
-
Responsiv Solutions Ltd
IBM Cloud Paks provide enterprise container software that is pre-integrated for cloud use cases in production-ready configurations. Quickly build new cloud- native applications deployed to Kubernetes based container orchestration platforms. Modernize/extend existing applications, and deploy middleware in a consistent manner across multiple clouds.
Software installed on Buyer suppler Kubernetes environments.
-
Nicander Limited
AFMS incorporates full asset registration, inventory check and management functionality, optimises the availability and longevity of assets and offers a streamlined working solution.
Users have the choice of interacting with the system through the web or via the phone / tablet app.
-
Barrier Networks
Leveraging FortiWeb VM, Container and SaaS based technologies to protect hosted web applications from attacks that target known and unknown exploits. Using AI enhanced multilayer and correlated detection methods, FortiWeb defends applications from known vulnerabilities and from zero-day threats, along with providing DDoS and Load-balancing capabilities for applications.
-
Intergence Systems Limited
Stratiam connects to all of your organisation's data via our proprietary API connectors. It then securely stores this data in a data warehouse from which this data can be queried. Best-in-class customisable data visualisations and dashboards are built against these datasets. AI machine learning can be layered for predictive analytics.
-
Ada Mode
Ada Mode support industrial asset operators/owners, OEMs and government bodies with the development, adoption and deployment of data science, AI and machine learning to drive industrial decarbonisation. We build bespoke AI and ML applications, served through our Atlas platform, to support efficient, safe and effective decommissioning of legacy assets .
-
CDW Limited
Sophos Intercept X is an advanced cybersecurity solution designed to protect against evolving threats. Combining deep learning technology (AI) with endpoint detection and response capabilities, Intercept X shields organizations from malware, ransomware and exploits. Its proactive approach identifies and neutralizes threats before they can cause harm, ensuring robust digital security.
-
Rowden Technologies Ltd
Rowden's Advance ML Analytics Service streamlines analytics by fusing multiple data sources with ML tools for consistent information via replication and virtualisation. With options for proprietary or pre-built models, our low-code workflows, extensive tools, and an ML Ops pipeline for validation connect seamlessly through APIs.
-
ISL Online Ltd
ISL Online is a trusted provider of secure and reliable remote desktop software solutions for businesses of all sizes. It is designed to make remote support and remote access easier, more efficient and more productive. The subscription includes support, training, concurrent licencing and is firewall friendly with a 99.99% uptime.
-
Rowden Technologies Ltd
Rowden's ML Platform revolutionises data processing with Data Augmentation and Diversity, improving training sets for stronger model building. It supports cost-effective, precise experimentation, and faster iterations, enhancing accuracy. Prioritising secure development enables thorough validation and bias reduction, safeguarding data privacy. The outcome: swift development, scalable testing, and trustworthy ML models.
-
Barrier Networks
This modular offering gives customers the visibility, automation and record keeping they need for the laws and frameworks that matter most to their compliance program
-
Abavus.co.uk
Our Non-Production (Demo/Test) Environment provides clients with a sandbox My Council Services environment to conduct their own quality assurance and testing. Incremental environments are chargeable.
-
Nettitude Limited
Cortex XSIAM unifies best-in-class security operations functions, including EDR, XDR, SOAR, ASM, UEBA, TIP, SIEM, and more. Cortex XSIAM also centralizes all of your security data and uses machine learning data models designed specifically for detecting and stopping known and unknown security incidents.
-
Equine Register Ltd
The service produces and records holding site premises details and can be integrated with CPH and/or other existing systems – it can also generate unique numbers if required. Essential for compliance, biosecurity and traceability.
-
Remarkable
Contentful is a headless content management system (CMS). It lets you create, manage, and edit the content on your website or app without it being directly tied to the design or layout. This allows for greater flexibility and makes it easier to deliver content across different channels.
-
Barrier Networks
Barrier Networks provide a Secure Internet Gateway in the cloud, Cisco Umbrella provides the first line of defence against threats on the internet. Deployed in minutes, our managed service provides immediate intelligence, visibility and protection.
-
Cloud Cover IT Limited
Timely and secure migrations from legacy systems to Office 365 with end to end support covering all aspects of your data migration to ensure a seamless move to the cloud. Our Microsoft Gold Certified experts transfer data between systems and train your users in application changes to reduce business impact.
-
INET
Our team provides a structured review of your key assets, unique threats to them and likely means of compromise. Comprising a review of your cloud environments’ security design, architecture, configuration and governance, we produce detailed threat profiles addressing your operational fingerprint to enable tactical and strategic evolution of your posture.
-
Zoho Corporation Limited
ManageEngine Log360 Cloud is a unified cloud SIEM solution with compliance management and integrated CASB capabilities. Detect, investigate, respond to, and neutralise security threats with effective threat analytics, workflow capabilities, and incident management console. Ease compliance audits with audit-ready templates, violation alerts, and effectievly drive down operational costs.
-
Resulting Ltd
Pathlock Cloud CAC automatically scans SAP
systems for over 4000 security vulnerabilities and
cybersecurity weaknesses at any desired
frequency (e.g. daily, weekly, monthly). In this
way, the SAP systems remain up-to-date with
SAP security notes and patches. Other SAP
security risks are also quickly identified with clear
remediation instructions provided.