LogPoint’s modern SIEM with UEBA provides advanced analytics and AI-driven automation capabilities that enable you to securely build, manage, and transform your businesses. The flat licensing model, drastically reduces the cost of deploying a SIEM solution on-premise, in the cloud or as part of the NGS Managed SIEM Service.



Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments.


Check Point Software Technologies

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Check Point offers a multilevel security architecture, “Infinity Total Protection with Gen V advanced threat prevention”, this combined product architecture defends an enterprises’ cloud, network and mobile devices.



Barracuda Networks is the worldwide leader in Security, Application Delivery and Data Protection Solutions. Barracuda provides an innovative AI-based solution to protect against phishing and business email compromise attacks. Customers praise Barracuda’s innovation, O365 integration, and customer support.


Palo Alto Networks

Palo Alto Networks is shaping the cloud-centric future with technology that is transforming the way people and organisations operate. Helping to address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. 



ExtraHop delivers cloud-native network detection and response that helps you build your security the way you’re building your business: cloud-first. Rise above the noise of alerts, organisational silos, and runaway technology so you can secure your future in the cloud.



Censornet delivers integrated web security, email security, CASB and multi-factor authentication to provide security focused visibility and control of an organisation’s assets. By combining traditional security controls with granular cloud application control and adaptive multi-factor authentication, Censornet allows access while controlling outcomes.

Juniper Networks

From Juniper’s first release, the ground-breaking M40 router, to today’s end-to-end advancements in network security, automation, performance, and scale,  Juniper drive to move beyond the constraints of complexity has expanded the reach of networks everywhere. They’ve enabled their customers to connect to everything and empower everyone in ways that have literally changed the world.



SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organisations secure their assets with speed and simplicity. SentinelOne unifies prevention, detection, response, remediation and forensics in a single platform powered by artificial intelligence.



Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access. Thycotic is one of the world’s fastest growing IT security companies because we provide customers with the freedom to choose cloud or on premise software solutions that are the easiest to implement and use in the industry.



Focused on the inside threat, Pcysys’ automated penetration-testing platform mimics the hacker’s attack – automating the discovery of vulnerabilities and performing ethical exploits, while ensuring an undisrupted network operation. Detailed reports are produced together with proposed remediations, one step ahead of tomorrow’s malicious hacker.



ZIVVER is a user-friendly solution for secure email and file transfer, straight from your familiar email programme. This enables you to prevent human errors, encrypt your data against hackers and keep control of the information sent.



Connecting People, Apps and Devices, My1Login is a European leader in protecting against enterprise cyber security threats through its Identity and Access Management solutions. My1Login’s IAM solution works across cloud, mobile and legacy desktop applications enabling control of user identity and access while delivering a return on investment.

netwrix logo


Netwrix solutions empower you to accurately identify sensitive, regulated and mission-critical information and apply access controls consistently, regardless of where the information is stored. By reducing the exposure of sensitive data, promptly detecting policy violations and suspicious user behaviour, you can minimise the risk of data breaches and ensure regulatory compliance.



Bitdefender delivers robust security you can rely on. With a global security delivery infrastructure protecting half a billion users, visionary solutions, and a wealth of awards, we have been a trusted security provider since 2001. Bitdefender works with government organisations, large enterprises, SMEs and private individuals across more than 150 countries.



Proofpoint protects your people, data and brand against advanced threats and compliance risks. Built on the cloud and the world’s most advanced intelligence platform, our solutions help you effectively detect and block targeted attacks and respond quickly to suspected compromises.


Kenna Security

Kenna is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna automates the correlation of vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches so that InfoSec teams can prioritize remediations and report on their overall risk posture.



Powered by all-source intelligence collection and deploying sophisticated technology and analytical capabilities, Orpheus provides predictive and actionable intelligence – enabling customers to anticipate, prepare for and respond to the cyber threats they face. 




Snyk is a developer-first security company that helps software-driven businesses develop fast and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Snyk’s solution is built on a comprehensive, proprietary vulnerability database, maintained by an expert security research team in Israel and London. With tight integration into existing developer workflows, source control (including GitHub, Bitbucket, GitLab), and CI/CD pipelines, Snyk enables efficient security workflows and reduces mean-time-to-fix.



The leading provider of phishing threat management for organisations concerned about human susceptibility and response to advanced targeted attacks. Cofense’s intelligence-driven solutions empower employees to be an active line of defense and source of attack intelligence by enabling them to identify, report, and mitigate spear phishing, malware, and drive-by threats. Their phishing incident response platform and phishing threat intelligence enables SOC and IR teams to respond faster to real threats – decreasing the risk of data breaches.



LMNTRIX specialises in threat detection and response to address advanced and unknown cyber threats that bypass perimeter controls. Be the hunter, not the prey. LMNTRIX thinks like the attacker and prize detection and response. Continuous everything is the key. Hackers never stop and neither do we.



Since 2007, MobileIron has been the leader in mobile enterprise security. Their mobile-centric, zero trust approach goes beyond traditional MDM, identity, and gateway solutions by validating the user, device, applications, networks, and potential threats before granting secure access to the device. Creating the intersection between high-grade security, mobile, and the way people want to work — so you can free your people to be productive without limits and passwords.



Cloudflare is the foundation for your infrastructure, applications, and teams. Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. It protects your internal resources such as behind-the-firewall applications, teams, and devices. And it is your platform for developing globally scalable applications.

cloud gateway logo

Cloud Gateway

The cloud has brought a lot of new opportunities, but it’s also added a lot of complexity. Cloud Gateway’s mission is to remove this burden and enable you to harness the power and flexibility of hybrid cloud but with greater control, pace and visibility.

See our solution Areas