-
Cloudflare, Inc.
Cloudflare SASE, Cloudflare One, is a Zero Trust network-as-a-service platform that dynamically connects users to enterprise resources, with identity-based security controls delivered close to users.
Replace expensive, proprietary circuits with a single Anycast global network built for ZTNA with DDoS mitigation, network firewalling, and traffic acceleration.
-
Insight
Your hardware security module (HSM) in the cloud.
-
Phoenix Software Ltd
VMware Tanzu provides a simplified, consistent approach to container
deployment, scaling, and management. Tools, automation, and data-driven insights supports infrastructure and application modernization. Tanzu simplifies multi-cloud Kubernetes deployment, centralizing management and governance for clusters and teams across on-premises, public-clouds, and edge.
Price packages starts with Tanzu Basic Edition
-
Insight
Amazon Macie is a fully managed data security and data privacy service that uses machine learning and pattern matching to discover and protect your sensitive data in AWS. Amazon Macie automates the discovery of sensitive data at scale and lowers the cost of protecting your data.
-
Cloud Gateway
Cloud Gateway offers flexible networking and security solutions that act as a secure transit broker, rapidly connecting you to multiple cloud providers, the HSCN, PSN and internet. We build and manage your bespoke SASE solution.
As a trusted public sector provider we hold Cyber Essentials Plus, ISO27001 and ISO9001 accreditations.
-
COOPERS AND LLOYDS LTD
Coopers&Lloyds offers robust and best in class cloud hosting to develop, test and run your services on secure and cost effective cloud infrastructure. Designed to be flexible, for easy migration of applications and services. We support on-Cloud / Hybrid cloud hosting, Azure, AWS, Google Cloud all in UK data centres.
-
CSI Limited
CSI can build a scalable, resilient, robust and cost-efficient infrastructure solution for backup and recovery. Provisioned in a private, public or hybrid approach we offer; long term archival; fast disaster recovery with pre-defined recovery and restore SLAs; data tiering; air gap, physically isolating your backup data from potential cyber-security threats.
-
Anson Resolution
Cloud Native Access Node provides a flexible method of accessing your cloud. Development, Testing and Production enclaves by using an internet-facing Cloud-Native Zero Trust environment.
-
JUNGLE I.T. LIMITED
Details of Microsoft Azure are available from Microsoft at https://azure.microsoft.com/engb/overview/
-
Integrity360 Ltd
Satisfy fundamental privileged access security requirements by utilizing CyberArk’s expertise to manage the underlying infrastructure. With CyberArk Privilege Cloud, organisations can empower security and IT operations to focus on high-level tasks critical to the organisation’s security posture.
-
Redcentric Solutions Limited
Redcentric’s Secure Remote Access (SRA) service offers a robust, scalable, flexible and secure way for healthcare professionals to access the HSCN network whilst away from their usual work location. Software on the user’s device communicates with the remote access platform across any Internet connection and a secure tunnel is established.
-
Cloud Technology Solutions Ltd
Google Cloud Platform offers many storage services. Google Cloud Storage provides public and private multi regional object storage with a Content Delivery Network (CDN) to serve application traffic at scale. Local SSDs offer unprecedented disk performance with high performance network SSD and HDD options available for virtual machines.
-
XTRAVIRT LIMITED
Secure Access Service Edge (SASE) provides Cloud Web Security (CWS) functionality to protect users while access Web based services and applications. Access to CWS is achieved via SD-WAN and Secure Access (VPN) to provide a consistent secure Internet experience determined by user location and device posture.
-
GOOGLE CLOUD EMEA LIMITED
Cloud Asset Inventory is a metadata inventory service that allows you to view, monitor, analyze and understand all your GCP and Anthos assets across projects and services in one place.
-
CSI Limited
Designed for the needs of complex regulated organisations, Helix Enterprise allows you to out-task to a fully managed service where we manage your data backups in a secure, flexible and compliant way. Utilising advanced reporting, monitoring and analytics of a backup infrastructure with access to our community and knowledge database.
-
Softcat Limited
SASE extends networking and security capabilities beyond where they have typically been available, allowing users, regardless of location, to take advantage of firewall as a service (FWaaS), secure web gateway (SWG), zero-trust network access (ZTNA), and a medley of other threat detection functions.
-
Kimcell
Provision of secure environments on shared hosts in which Customers can develop, test, run and administer Docker or other container-based applications, with Datacenta taking care of infrastructure management functions to enable the rapid porting across divers environments that makes containerization so powerful.
-
GOOGLE CLOUD EMEA LIMITED
The Google Data Loss Prevention API helps you understand and manage sensitive data. It provides fast, scalable classification and optional redaction for sensitive data elements like credit card numbers, names, social security numbers, passport numbers, US and selected international driver's licence numbers, phone numbers, and more.
-
Leicestershire Health Informatics Service
LHIS IaaS provides a fully managed best in class enterprise offering. The service provides fully managed server instances delivered to the customer preconfigured with a range of operating systems, antivirus, critical patches installed and back up routines in place. This is complemented by fast resilient HSCN and internet network links.
-
Exponential-e Ltd
Organisations require Secure Remote Access (SRA) mechanisms connecting users to infrastructure, applications and networks aligning to Government and Industry standards .We provide Remote Access (RAS) Encryption, Identity Management and Data flow controls using;
Encryption, Admission Control, 2 Factor Authentication
Certificate Authority URL verification
Connectivity to Internet, Cloud, WAN and HSCN
-
Cyberfort Ltd
Cyberfort’s Managed Firewall Service draws on our experience and depth of knowledge in perimeter security and is a fully-managed service that ensures best practices are employed in the initial setup and ongoing management of your firewall rules and policies.
-
SMARTER TECHNOLOGIES TRADING LIMITED
Cloud based low-power IoT ORION network delivering secure real time smart building monitoring for assets and sensors, including compliance reporting (legionella, fire, safe place, energy & waste) etc. Works up to 10 miles from a single ORION gateway.
-
BOXXE LIMITED
Cloud-delivered and powered by over 250 million global sensors, Trend Micro One continuously discovers your dynamic attack surface, assesses your risk, and helps you respond with the right security at the right time. Built-in support for a Zero Trust strategy and executive risk dashboards enable you to be more confident.
-
MS INFOTECH LTD.
We provide hosting services for any kind of applications to various cloud solutions like AWS, Azure, Google Cloud etc.
-
INTEGRITY360 LIMITED
Leveraging FortiWeb VM, Container and SaaS based technologies to protect hosted web applications from attacks that target known and unknown exploits. Using AI enhanced multilayer and correlated detection methods, FortiWeb defends applications from known vulnerabilities and from zero-day threats, along with providing DDoS and Load-balancing capability for applications.
-
Just After Midnight
Full specialist Umbraco Cloud Hosting, from DevOps to Managed Cloud, IAAS or PAAS, AWS or Azure, Public, Private or a Hybrid. Consultancy, infrastructure, security, migration, scalability, DR. We can manage everything from design and build to procurement and ongoing management, maintenance and patching including 24 hour "eyes on" monitoring service.
-
SNC Mission Systems UK
Sierra Nevada Corporation’s (SNC) Tactical Radio Application eXtension (TRAX)® Enabled Tactical Radio Integration Kit (TRIK) hardware kit was developed to support C5ISR missions at the Strategic, Operational, and Tactical levels, including non traditional ISR to use for enterprise and austere locations where network extensions are needed to execute the mission.
-
INTEGRITY360 LIMITED
Varonis specialize in software for data security, governance, compliance, classification, and analytics. Varonis detects insider threats and external cyberattacks like ransomware by analyzing cloud data stores and monitoring user behavior, mitigating risk in M365, Teams, Salesforce, Slack, Box and on-premise file servers by locking down sensitive data and remediating access.
-
Redcentric Solutions Limited
Distributed Denial of Service (DDoS) attacks are characterised by the delivery of very large volumes of traffic to the targeted system, overwhelming infrastructure and making it inaccessible. The DDoS Mitigation Service addresses this by filtering out attack traffic while sending as much legitimate traffic to the Customer’s systems as possible.
-
UBDS IT Consulting Ltd
Security boundary protection that mitigates risks of DoS, data exfiltration, enumeration, exploitation. Security protections that can be customised for your environment. Technology based on NCSC principles (ROSA). Ability to integrate with SIEM products such as SPLUNK and ELASTIC.