Search results

549 results found in Cloud software in the category Secure content and threat management

Apply filters

Clear filters
Cloud deployment model
Supplier type
User support
Using the service
Metrics reporting
Connected public sector networks
Data protection between buyer and supplier networks
Data protection within supplier network
Data storage and processing locations
User authentication
Management access authentication
Security certification
Security governance standards
Datacentre security standard
Staff security clearance
Minimum government security clearance
Pricing options
549 results found

ServiceNow

Engage ESM

ServiceNow offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades

CTI Cyber Threat Intelligence Supreme

Research Series Limited

CTIS utilises the largest World's first open threat intelligence community of over 80,000 participants in 140 countries to fuss over 19 million threat indicators (IOCs) daily, available on open automated standards, e.g. OTX, STIX, CybOX and TAXII for sharing, and correlating threat intelligence against SIEM to enhance Cyber Situational Awareness.

Digital Managed Services

Panlogic Limited - Digital Engineering

Hosting (physical vs. virtualised vs. cloud; shared vs. dedicated) Infrastructure support Application support Maintenance Digital infrastructure audit Disaster Recovery (DR) & 'hot'/'warm'/'cold' High availability (managing demand) Managed Services audit (investigation), migration (taking on third-party services) and Business As Usual (BAU)

Microsoft Advanced Threat Analytics

Think S3 (S3 Consulting Ltd)

Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline. See https://www.microsoft.com/en-gb/cloud-platform/advanced-threat-analytics

Blue Lights Decypher Communications Data Processing

Blue Lights Digital

DECYPHER creates a single point of interaction to streamline the process of communications data analysis turning complex, unstructured data into standardised, automated, evidentially robust outputs focusing on the critical issues faced in criminal and commercial investigations.

MTI - Trend Micro Cloud App Security

MTI Technology Ltd

Trend Micro Cloud App Security protects incoming and internal Office365 email from advanced malware and other threats, and enforces compliance on other cloud file-sharing services. Cloud App Security integrates directly with Office365 and other services using APIs.

Reporting Server as a Service (VRSS) GC10-SAS-RSS1

Viewdeck Consulting Limited

Enterprise class Reporting Service, designed to pull together Management Reports, Operational data and presentation information, Offline, Online and in Dashboards. Works across a wide range of standard data sources. Simple and efficient BI, OLAP, Reporting and Dashboards for wide business use.

DLP End Point (Endpoint) security services on ForcePoint

HIVE LOGIC LIMITED

EndPoint (or End Point) protection is aimed at protecting all our devices all of the time even when we are mobile. Controlling access and encouraging safe usage. Applies to laptops, PCs, tablets, mobile phones (of all flavours). Management and Monitoring also available

Azure Information Protection P2

Think S3 (S3 Consulting Ltd)

Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data. See http://www.microsoft.com/en-us/cloud-platform/azure-information-protection-features

Alert Logic Enterprise

Alert Logic UK Ltd

Always-On Defenses with Experts Included. Alert Logic Enterprise gives you a managed WAF and assigned SOC analyst. Receive premium cybersecuirty benefits and access to specialists at the right cost for your business.

GeDaP Printix Microsoft Preferred Cloud Based Print Management Solution

TeamLogic Systems Ltd

Cloud based systems and printing are often at opposite ends of an organisation's information management infrastructure. Printix has been written to provide an SaaS solution managing documents and their secure release across the Enterprise. A specific version for Azure and 365 using its authentication, certified by Microsoft is available .

Netsweeper Web filtering

Netsweeper Inc.

Netsweeper provides cloud-based advanced web-filtering and threat protection for users and data as well as exceeding UKGov law. Netsweeper customers experience the peer-to-peer benefits of premium cloud-based categorisation capabilities; through an intuitive easy to use interface enabling administrators to effectively deal with illicit web content on their networks

ServiceNow (ITSM/ITOM/CSM) - Blueprint Implementation - by SCC

Specialist Computer Centres plc

Deliver IMPACT to your business with SCC’s ServiceNow (ITSM/ITOM/CSM) BluePrint solution. SCC’s customer first approach to Enterprise Service Management(ESM) ensures our customers get a high quality service delivered on a best of breed technology via our ever growing ServiceNow Practice. From ITSM and beyond, we have the solutions for you.

Blue Lights Discovery - Digital Training Platform

Blue Lights Digital

The next-generation training and resource solution delivering concept to delivery around the evolving challenges of digital investigation. This platform delivers interactive, immersive multimedia led training courses, continual professional development and resources optimised for smartphones, tablets and the web enabling access to professional knowledge, Procedure, Policy and Intelligence anytime, anywhere.

Alert Logic Security Services

The Server Labs Ltd.

Alert Logic delivers Security-as-a-Service combining cloud-based software and threat analytics with experts to defend your critical applications and workloads in cloud, hosted, on-premises and hybrid environments. Alert Logic protects your full application and infrastructure stack against attacks without the cost and time required to build and staff your own SOC.

Symantec SEP Mobile

Caretower Ltd.

SEP Mobile offers the most comprehensive, accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s uses a layered approach that leverages crowdsourced threat intelligence, in addition to both device- and server-based analysis.

Armor Anywhere: Virtual Machine Security Solution

Armor Defense Ltd.

Armor Anywhere is a managed, scalable, virtual machine security solution that protects instances hosted on any infrastructure. Armor Anywhere's OS agent is powered by our Intelligent Security Model and managed by our experienced security operations team (SOC) – providing real-time visibility into your security posture and actionable cyber threat intelligence.

Office 365 Enterprise E5

Insight

Office, Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management plus Cloud-PBX call management, PSTN-Conferencing, Business Intelligence, PowerBI, Delve Analytics, Personal-Org Analytics, cybersecurity, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery.

4Secure SOC Tier 3

4Secure

The 4Secure SOC Tier 3 service gives you affordable manned SOC coverage 9-5 everyday, with automated alert outside of those hours. This service stills combines powerful security information and event management (SIEM), as well as full log management capabilities but for those organisations looking to work to tight budgets.

Anomali Enterprise

Anomali Inc

Anomali Enterprise collects log data from security information and event management (SIEM) products and reads the data looking for five kinds of potential indicators of compromise (IOCs). The data is correlated against Anomali's vast library of known IOCs. Matches (true-positives) are pushed into SIEM analysis workflows as critical prioritized events.

Secure File Transfer Diode (Elevated)

MDS Technologies Limited

The File Transfer Diode Service provides application level security preventing data loss and malware infection when sharing information. The service protects structured data, web service and filesharing communications and ensures one-way communication. Policy tailoring meets an organisation’s specific sharing needs, supporting user compliance and managing information sharing risks.

EnSilo

Armadillo Managed Services

enSilo's Automated Endpoint Security Platform defends in real time against any type of breach, at any stage of the attack, under any circumstances.

Mobile Device Management - Enterprise Mobility Management - FLEX

Nine23

Mobile device management incorporating multiple EMM technologies providing endpoint management platform. Deployed on-prem, from public cloud, or secure private cloud, and managed as a service for you to administer devices from a single console, or have the service fully managed for you. Secure remote mobile working - secure voice calls.

CS2 Cyber Security Consultancy Service

Research Series Limited

CS2 is a service to develop and manage Cyber Programmes for SMEs and Government Departments. Ranging from Bids, Business Cases, Programme Management, Cyber Thought Leadership, Advisory, to Continuous Vulnerability Management, Active Risk Management and Implementation of appropriate countermeasures. Offering consultancy in Cyber Situational Awareness, Cyber Security and Cyber Risk Management.

Citrix Cloud Workspace Services

I-KONIC LIMITED

Citrix Cloud Workspace Services combines the benefits of application and desktop virtualisation, mobility management, file sync and sharing, and network services to deliver secure digital workspaces. The service offers an integrated workspace-as-a-service to enable secure access to apps, desktops and data from anywhere.

Cloud Enterprise Service Bus as a Service GC10-SAS-CSC1

Viewdeck Consulting Limited

An enterprise scale SOA solution for non-stop mission critical messaging. Based on Apache ServiceMix or RabbitMQ, provides reliable messaging across domains/environments, messaging, routing and Enterprise Integration Patterns. With a wide range of supported protocols and patterns, delivers scalable, distributed application processing, and system integration.

Total Digital Engagement

Congruis Limited

Total Digital Engagement solutions serve the trusted interaction needs of employees, customers and partners - with data and processes, with conversations and directories - in business and voluntary communities - massive, medium and small; closely or loosely knit; local, regional, national or global.

Zscaler Security from BT

BT PLC

Zscaler cloud security provides an architectural approach to secure IT transformation, in which software-defined policies, not networks, securely connect the right user to the right app or service. It provides real-time scanning of inbound/outbound web traffic from all users with comprehensive security, access control and data leakage prevention services.

Barrier Networks F5 Silverline (DDoS) Protection

Barrier Networks

Barrier Networks Security DDoS is a service designed to protect websites and critical assets from Layer 3 - Layer 7 DDoS attacks

iOS and Android Cybercrime Protection

Netcraft

The great majority of victims of phishing fall for the attacks while using devices such as phones and tablets. Netcraft's mobile apps for iOS and Android protect your employees against Phishing and Web Based Malware when they are using mobile devices.

SSL Certificate Management

Safenames Ltd

Purchase and manage your SSL certificates from all the leading data encryption providers; Symantec, Digicert, Rapid SSL, GeoTrust, Comodo, Thawte and GlobalSign.

CDW VMware Workspace ONE

CDW Limited

VMware Workspace ONE is the secure enterprise platform that delivers and manages any app on any device. By integrating app access management, unified endpoint management, and real-time application delivery, Workspace ONE engages digital employees, reduces the threat of data loss, and modernizes traditional IT operations for the mobile-cloud era.

IBM MaaS 360 Mobile Security

Caretower Ltd.

IBM MaaS360 simplifies Enterprise Mobility Management with rapid deployment and comprehensive visibility and control that spans across mobile devices, applications, and documents. It allows organisation to manage and safeguard their content with a flexible solution that enable users to be productive, while maintaining data security and personal privacy.

BreachAlert

RepKnight

RepKnight's a UK cybersecurity company with a difference - we think you should be looking after your data, not just your network. Our automated Dark Web monitoring tool, BreachAlert, gives companies reassurance that if their sensitive data appears on the Dark Web they'll be alerted within minutes of it appearing.

Akamai Enterprise Threat Protector

Akamai Technologies Ltd

Built on the Akamai Intelligent Platform™ and Akamai’s AnswerX™ carrier-grade recursive DNS, Enterprise Threat Protector (ETP) proactively identifies and blocks targeted threats such as malware, ransomware, DNS data exfiltration, and phishing. Unified security and acceptable use polices can be enforced in minutes for all employees.

Secure Cross Domain Guard Service

Deep-Secure Limited

The Secure Cross Domain Guard Service provides application level security preventing data loss and malware infection when sharing information. The service protects email, web service, web browsing, file sharing and network management communications. Policy tailoring meets an organisation’s specific sharing needs, supporting user compliance and managing information sharing risks.

Microsoft 365 E5

New Signature UK Limited

Cloud Productivity & Security. Licensing suite for Office 365 Enterprise E5, Enterprise & Mobility Suite E5 and Windows 10 Enterprise E5. https://www.microsoft.com/en-gb/licensing/product-licensing/microsoft-365-enterprise.aspx

Document Management as a Service (VDMS) ​​​​​​GC10-SAS-DMS1

Viewdeck Consulting Limited

The Viewdeck Document Management service VDMS uses a leading open source document management/enterprise content platform. The service provides secure and controlled access to documents, images, and metadata across the organisation. It improves efficiency with powerful storage, search and filtering features, as well as advanced capabilities for structured and unstructured artifacts.

Data Protection & Data Governance

Avepoint UK Ltd

Automate the process of evaluating and reporting the privacy implications of enterprise IT systems. Scan data across enterprise systems against regulatory policies and your specific needs.

cyber threat intelligence

Orpheus Cyber

We provide understanding of cyber threats to clients, including protective monitoring. We collect information from a wide range of sources, including deep and dark web, and fuse to provide organisations of the intent and capabilities of cyber adversaries to target them.

VPlatform & VCode by VST Enterprises Limited

VST Enterprises Limited

VCode® represents the next generation of code scanning technology – an evolutionary leap past traditional barcodes and QR Codes. Utilised to authenticate and deliver bespoke, permission based content and to protect against fraud in many sectors, from document verification, end-to-end supply chain management, interactive charitable giving transactions and content delivery.

Trusted Certificate Service

Airbus Defence and Space Limited

Trusted Certificate Service ensures confidentiality through encryption and Integrity of users, devices and data. It simplifies the trusted user experience whilst making system penetration more complicated and difficult. The implementation pattern aligns with the UK government recommendations from GDS and is the only UK certificate service that has NCSC accreditation.

Cyber Forensic Analysis Service

SecureCloud+ Limited

Cyber Forensic Analysis Service available at OFFICIAL with a handling caveat of SENSITIVE, SECRET, (including NATO and MISSON) and TOP SECRET delivers active cyber defence management and network forensic analysis. The aim is to contain and mitigate the impact of cyber incidents and prevent future attacks.

Pontus Vision Open Source GDPR

Pontus Vision

Support for our Open Source GDPR platform, helping customers automatically extract and track their data to comply with the legislation. Includes Privacy Impact Assessment, and Subject Access Requests, all fully audited. Platform provides a sustainable data management model that automatically maintains compliance after the 25th May

Office 365 Advanced Threat Protection

Insight

Protect your email in real time against unknown and sophisticated attacks, through automatic analysis and detonation of suspicious content and unsafe URL links, when included in emails. Gain insights who is being targeted and the category of attacks, including blocked message investigations and URL trace capabilities. See https://products.office.com/en-gb/exchange/online-email-threat-protection

Anomali Threatstream Threat Intelligence Platform

Anomali Inc

Threatstream collects, curates and provides threat intelligence data from 230 open source and numerous paid threat intelligence feeds. Data is normalized and de-duplicated for false-positive reduction so it can be explored and made strategic, tactical, operational and technical. Provides indicators of compromise (IOCs), attacker techniques/methodologies, and high level risk information.

Microsoft Secure Productive Enterprise E5

Bechtle direct Ltd.

Cloud Productivity, Desktop, Mobility & Security. Licensing suite for Office 365 Enterprise E5, Enterprise Mobility + Security E5 and Windows 10 Enterprise E5. Includes Office, Exchange, Skype, SharePoint, Yammer social, Teams, Cloud-PBX, PSTN-conferencing, Business Intelligence, PowerBI, cybersecurity, eDiscovery, Azure Active Directory, Azure Information Protection, Threat Analytics, MDM. https://products.office.com/en-gb/secure-productive-enterprise

Cloud Direct Enterprise Mobility and Security (EMS)

On Direct Business Services Limited

Empower your employees to work on their favourite devices and apps, while you maintain control over who has access to your business resources and over which devices – with peace of mind that your business data is protected at all times.

Microsoft Cloud App Security

Civica UK Limited

Enterprise-grade security for cloud apps - both approved and unapproved - for deeper visibility, comprehensive controls, and enhanced protection against cloud security issues. Via Civica. See https://www.microsoft.com/en-gb/cloud-platform/cloud-app-security

McAfee Web Gateway Cloud Service

Bytes Software Services

This service delivers web security from the cloud enabling security teams to gain the same benefits of advanced threat protection as on-premises appliances, but without the cost of hardware or the resources used to maintain it. It also provides flexible and secure connectivity to users. bsscloud

Office 365 Exchange Advanced Threat Protection

Civica UK Limited

Protect your email in real time against unknown and sophisticated attacks, through automatic analysis and detonation of suspicious content and unsafe URL links, when included in emails. Gain insights who is being targeted and the category of attacks, including blocked message investigations and URL trace capabilities. Via Civica. See https://products.office.com/en-gb/exchange/online-email-threat-protection

RiskTree

360 Defence (UK) Ltd

RiskTree Real World Risk Management in your business language. RiskTree provides a clear and concise agile approach using attack trees focussing on how your assets could be attacked supported by bespoke Software-as-a-Service risk tools. A systematic way of capturing and prioritising the risks including countermeasures providing a real-time risk profile

Microsoft Azure Information Protection P1

Bytes Software Services

Classify and label data at the time of creation - protection (encryption + authentication + use rights) can then be applied to sensitive data. See http://www.microsoft.com/en-us/cloud-platform/azure-information-protection-features bsscloud

Intelligent Automation and Service Management - Intuition

Celerity Limited

Intuition provides end-to-end visibility of your IT infrastructure and business services via a single pane view. The tools perform initial discovery to build an inventory of all elements with intelligent automation, provisioning, updating, patching, alerting and reacting to events to prevent service disruption.

Splunk Software

apto solutions limited

Apto provide SaaS for Splunk that monitors and analyzes machine data from any source to deliver Operational Intelligence to optimize your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs.

CA tools as a Service

WIPRO HOLDINGS (UK) LIMITED

CA Technologies provides Tool-as-a-Service offering that can help you stay on top of secure and rapid cloud adoption and transformation. The Continuous Delivery, API and Security solutions enable a seamless user experience through SaaS based Performance Engineering, Microservices Management, Cloud Infrastructure Management, App Security Testing and App Experience Analytics.

My1Login Enterprise Identity Management Solution

My1Login Ltd.

My1Login’s Identity & Access Management (IAM) solution enables organisations to manage access to applications for internal and external users. My1Login's a wholly UK-Based Identity Provider offering Single Sign-On (SSO) to Web, Mobile and Thick-Client, Legacy Applications, Privileged Password Management, User Provisioning, Self-Service Password Reset, Multi-Factor Authentication and Reporting underpinning compliance.

Customer Relationship Management (CRM) Service (VCRM) GC10-SAS-CRM1

Viewdeck Consulting Limited

The Viewdeck VCRM solution provides an enterprise scale configurable CRM solution supporting a wide range of business needs including Account management, Contacts, Calendar, Case management, email integration, campaign management, Inbound and outgoing calls scheduling and task allocation. Includes advanced Report Generator, Workflow and Billing, and Mobile Devices.

System Migration

Pulsion Technology Limited

We offer system migration services for all popular technologies. The key aim of our service is to ensure a risk-free migration, which provides a long-term system migration solution.

Mobile App design & build

Createful Ltd

We specialise in the design and development of bespoke mobile applications for both iOS and Android. Our user centric approach allows our dedicated, in-house team to work closely with you to rapidly design, develop and deliver on time and within budget. All work undertaken from our studio in Bournemouth, Dorset.

CDW Sophos Central Intercept-X (CIX)

CDW Limited

Central Intercept-X (CIX) is a security agent running on each computer, managed by a Cloud Software control + report interface (Sophos Central). Next-Generation Endpoint Security providing Exploit Prevention, Ransomware Protection + Recovery, Sophos Clean (Advanced Remediation + restoration), Root Cause Analysis to provide detail source of infection information + visualisation

MTI - Forcepoint (previously Websense) Web Security Cloud

MTI Technology Ltd

Forcepoint Web Security provides robust protection through content aware defenses and cloud app discovery and monitoring, reducing risks to sensitive data for both on premise and mobile users. Forcepoint Web Security easily integrates with other Forcepoint solutions for single, consistent security controls that can protect against inbound and outbound threats.

SEP Mobile

Symantec (UK) Ltd

SEP Mobile offers the most comprehensive, accurate and effective mobile threat defense solution, delivering superior depth of threat intelligence to predict and detect an extensive range of existing and unknown threats. SEP Mobile’s uses a layered approach that leverages crowd-sourced threat intelligence, in addition to both device- and server-based analysis.

Proofpoint Essentials

Caretower Ltd.

ProofPoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defense and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep busines communications up and running at all time.

Version Control Server (GIT) Service ​​​​GC10-PAS-VCS1

Viewdeck Consulting Limited

Private distributed version control service for software and DevOps development and configuration management . Provides a fully distributable secure private GIT service, suitable for agile, rapid delivery of digital services.

Data Visualisation

Pulsion Technology Limited

We create data visualisation tools that enhance business intelligence and improve public services. Our data visualisation software provides real-time and historic tracking, which can be presented and reported on in a host of popular formats.

Armour Mobile

Nine23

A UK based organisation providing CPA certified encryption for secure communications (voice, video, messaging, group chat and data) on iOS and Android smartphones and tablets. Supplying Governments, MOD with cost-effective, easy to use technology combined with advanced security techniques to deliver cloud-based - on-premises solutions up to UK SECRET.

LogRhythm Hosted SIEM Security Monitoring Platform

Comtact Limited

Comtact's cloud-based LogRhythm Hosted SIEM Security Monitoring Platform provides real-time intelligence of cyber threats, whether penetrating the perimeter, or from security breaches within - across your entire infrastructure - within a single dashboard view. Supported 24x7x365 from Comtact's UK SOC, LogRhythm provides end-to-end threat management in a unified enterprise-class platform.

ProfileTailor™ Dynamics

Grey Monarch Limited

ProfileTailor™ Dynamics provides continuous security monitoring, audit and controls of your SAP systems. Cleanse authorizations, sensitive activity and Segregation of Duties (SoD) violations. Control SAP access. Detect potential fraud, data theft (GDPR) and cyber attack. Automate security processes such as Joiner, Mover, Leaver and Emergency Access.

Arena Compliance Management

Hicom Technology Ltd

Market-leading compliance management system enabling multi-site/multi-asset organisations to manage essential business practices, inter-company communications and reporting processes ensuring compliance with established regulations. Currently used by over 200,000 users in 12,000+ sites across the UK, Arena is a modular solution providing business with a powerful tool that helps reduce business risk.

Probation Self-Service Portal – Direct2probationer

Core Systems

Probation self service portal, Direct2probationer is the leading software for Community Rehabilitation Companies. It allows users on probation to access communications, information, and services. It’s the perfect tool for probationer reintegration. It can integrate with biometrics and other types of verification apps or hardware.

Consumer Identity and Access Management

Janrain, Inc.

The Janrain Identity Cloud provides management, security and activation solutions that enable seamless and safe customer experiences across their digitally connected world, while providing enterprise organizations with deep customer insights. Founded in 2002, Janrain pioneered Customer Identity and Access Management (CIAM).

Protected DNS RPZ Generation, Analysis and Reporting Service

Nominet UK

Nominet provides an end to end, RPZ creation, analysis and reporting capability for the Protected DNS Resolver Service.

cloud authentication services

United Security Providers UK Ltd

Web Access Management.

Prolinx Hosted Platform (PHP) - Security Incident and Event Management (SIEM) as a Service

Prolinx Ltd

SIEM as a Service from Prolinx provides 24/7 proactive management for your operational business. Reducing risks associated with today’s complex Cyber threat landscape. This service is tailored to meet your organisational requirements, available across all security classifications, Prolinx use an approved product with highly experienced security cleared staff.

GeDaP KISS (KeyTalk Secured IoT Sensors)

TeamLogic Systems Ltd

KISS strengthens the security of Edge Devices on a network, automating the creation and exchange of short-lived digital certificates at frequent intervals. With its automatic authentication (device identity) and robust encryption KeyTalk provides the security of PKI without the bureaucracy. Highly scalable objects can be readily connected and secured .

Modelworks

D-RisQ Ltd.

Modelworks is a software tool which automatically verifies that a software design can only represent the behavioural requirements of the systems design. It provides absolute assurance of behaviour through the application of Formal Methods mathematics and is an add-on to existing design tools (e.g. Simulink, Stateflow & SysML).

CDW ProofPoint Threat Protection Suite

CDW Limited

Proofpoint Email Protection stops malware and non-malware threats and granular filtering to control SPAM. Targeted Attack Protection detects and blocks advanced threats, including ransomware. We detect known threats never-before-seen attacks that use malicious attachments and URLs.

AI.PROTECT

Automated Intelligence Limited

AI.PROTECT provides attribute based security for SharePoint. Organisations can have security on any information element based on it's metadata in real-time. Changes in security policy can be implemented instantly through business based decision and actions rather than through IT led activity.

Microsoft Office 365 Advanced Threat Protection

Bytes Software Services

Protect your email in real time against unknown and sophisticated attacks, through automatic analysis and detonation of suspicious content and unsafe URL links, when included in emails. Gain insights who is being targeted and the category of attacks, including blocked message investigations and URL trace capabilities. See https://products.office.com/en-gb/exchange/online-email-threat-protection bsscloud

CA Identity Service (IDaaS)

CA Limited

CA Identity Service facilitates rapid and secure adoption of cloud applications by providing SaaS based identity lifecycle management, user provisioning and SSO for cloud applications. Integration capabilities reduce the risk of over-privileged, rogue and orphan accounts that can be used inadvertently or maliciously to gain access to critical resources.

DXC Technology ServiceNow

EntServ UK Ltd part of the DXC Technologies Group

DXC Technology's ServiceNow Run offers a portfolio of robust cloud-based applications that automate and manage enterprise services. Our applications have the advantage of being built on a single service automation platform with one user interface, one code base, and one data model, delivering easy, automated upgrades

MTI - Forcepoint CASB - Cloud Access Security Broker (Previously Imperva Skyfence)

MTI Technology Ltd

Forcepoint Cloud Access Security Broker (CASB) automatically discovers cloud application use, analyzes the risks and enforces appropriate controls for SaaS and production applications. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need.

Viewdeck Single View of Data as a Service (VSVS) GC10-SAS-VSV1

Viewdeck Consulting Limited

Service to support the presentation of business data, structured/unstructured from internal and external sources, providing a picture of your data for detailed discovery. Its leading cloud based design avoids the need to move large data sets or create staging environments, enabling additional data to be added quickly and efficiently.

Mimecast - Email Security, Targeted Threat Protection and Email Business Continuity Service

Six Degrees Technology Group Limited

Our Mimecast service extends traditional gateway security with Targeted Threat Protection that addresses ransomware, impersonation, spear-phishing and other advanced threats. Continuity keeps employees sending/ receiving email even if your email system or Office 365 exchange, has an outage. Our security services eliminates the infrastructure and management requirements for on-premises solutions.

Continia Expense Management for Microsoft Dynamics NAV

Total Enterprise Solutions

The only solution on the market that lets you streamline the registration and approval of travel activities just by using your smartphone, a Web browser and Microsoft Dynamics NAV.

Cortana Analytics Services on Azure - Big Data and Analytics

Incremental Group

Incremental Group offers fully managed big data and advanced analytics services that enable the transformation of data into intelligent action. Our Cortana Analytics services enables core analytics scenarios such as real-time recommendations, customer churn forecasting, fraud detection, predictive maintenance and many more. unlock the potential hidden in your big data.

Microsoft Exchange Load Balancer

edgeNEXUS

EdgeNEXUS Load balancers offer outstanding feature and performance whilst still being Very easy to use. As a Microsoft Gold partner we have significant experience of load balancing Microsoft products such as Exchange, Skype, Sharepoint. Available in Azure, AWS, VMware, Hyper-V, HPE supported Appliance. We offer free migration from other products.

Secure Web Based Map Service ​​​​​​GC10-SAS-SWM1

Viewdeck Consulting Limited

A secure OSM Map service for the provision of UK, EU and global maps to web and Mobile applications. Web connected or isolated secure solution to provide mapping for applications. Includes regular map updates and the ability to update/augment or enhance with your own data.

Managed Print Services

Softstream Solutions Limited

As more and more organisations utilise the benefits of a cloud methodology, Softstream Solutions allows the print process to remain future proof as cloud and digital transformation of workflows are adopted. A Managed Print Service will enable cost saving, workflow optimisation and enhanced security for any organisation.

Cybercrime Countermeasures

Netcraft

Netcraft's countermeasures service is a highly automated solution for having malicious content removed from the internet. We can handle a wide range of attack vectors, including phishing URLs, malware, fraudulent social media accounts, and e-mail addresses being used to conduct fraud.

Microsoft Advanced Threat Analytics

Civica UK Limited

Provides a simple and fast way to understand what is happening within your network by identifying suspicious user and device activity with built-in inteligenve and providing clear and relevant threat information on a simple attack timeline. Via Civica. See https://www.microsoft.com/en-gb/cloud-platform/advanced-threat-analytics

GDPR Data Scanning

Six Degrees Technology Group Limited

The Risk Intelligence Scan provides a point in time scan of unstructured data within an organisation. This includes but is not limited to Word documents, Excel documents, Notepad documents and Outlook PST and OST files. Risk Intelligence provides a scanning technology to assist in the GDPR Data Mapping exercise.

Data Loss Prevention Cloud Service Connector for Cloud Access Security Broker (CASB)

Symantec (UK) Ltd

The Symantec Data Loss Prevention Cloud Service Connector is a Symantec Data Loss Prevention detection service deployed in the cloud that enables you to monitor content and identify information policy violations in cloud applications.

NQM Data Sharing Platform

NquiringMinds Ltd

The NQM Data Sharing platform can share data on a transactional or streaming basis between different organisation. The data sharing platform is based on NQM TDX peer to peer security model. It has been market proven in health, social care, financial and defence markets. It integrates with AI analytics

Office 365 Enterprise E5 Suite

Civica UK Limited

E3 (Office apps and Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management) plus Phone System call management, PSTN-Conferencing, Business Intelligence, PowerBI-Pro, Delve Analytics, Personal-Org Analytics, Advanced Threat Protection, Advanced Security Management, Customer Lockbox, Advanced eDiscovery.

CGI - Security Operations Centre (SOC)

CGI

A Real Time Protective Monitoring Services which provides a shared managed service to organisations to collect, detect and alert on security incidents within their Cloud and where required, their wider IT and applications infrastructure. This is the baseline service upon which the optional services can be supported

Microsoft Office 365 Enterprise E5

Bytes Software Services

Office, Exchange, Skype for Business, IM, voicemail, video dial-in conferencing, SharePoint collaboration and team sites, OneDrive, Yammer, enterprise social networking, Encryption, DLP, Rights Management plus Cloud-PBX call management, PSTN-Conferencing, Business Intelligence, PowerBI, Delve Analytics, Personal-Org Analytics, cybersecurity, Advanced Threat Protection, Advanced Security Management, Customer Lockbox. See https://products.office.com/en-gb/secure-productive-enterprise bsscloud

Cloud Security (CASB) on ForcePoint

HIVE LOGIC LIMITED

The cloud security service, or Cloud Access Security Broker (CASB), secures all monitored cloud usage. It analyses the risks and enforces appropriate controls through a wealth of constantly updated controls. With Forcepoint CASB, users get the apps they want and IT staff gets the control they need.

Cloud Security, Threat Intelligence & Web Filtering (Umbrella / OpenDNS)

NOC365 LTD

Cisco Umbrella (formerly OpenDNS) is a cloud security platform that provides the first line of defence against threats on the internet wherever users go. Umbrella uses the internet’s infrastructure to block malicious destinations before a connection is ever established, and provides visibility with reporting in a single pane of glass.