Security Vendors

Access world-class Microsoft-centric security solutions

Speak to an expert

What We Do

We partner with some of the leading cybersecurity suppliers in the world, to offer a range of best-in-class complementary security solutions for your Microsoft environment.

Carbonite – Backup for Office 365

Carbonite Backup for Office 365 picks up where native tools leave off. Carbonite Backup for Office 365 captures changes in Office 365 applications and replicates them to a secondary instance in Microsoft Azure. The solution runs automatically up to four times per day, or every six hours.

When it’s time to recover, you can perform granular and full fidelity restore of Office 365 content. Use simple search to recover content from Teams (channels, conversations and content), SharePoint, Email, Calendar and OneDrive. Restore based on owner, subject line, content type and more.

Databarracks – Business Continuity

There are lots of independent companies in the UK that offer a Data Backup and Restoration Service. There are only a very small handful, that have built their entire businesses around data integrity, recovery and continuity.

Since 2003 Databarracks have offered a comprehensive 24/7/365 data backup, restoration and continuity service, utilising enterprise-grade Software and a military-grade underground data centre. Softwerx has been working with Databarracks for ten years.

READ MORE

Duo – Multi-Factor Authentication

For organisations of all sizes that need to protect sensitive data at scale, Duo’s trusted access solution is a user-centric zero-trust security platform for all users, all devices and all applications.

There’s no easier way to use multi-factor authentication. Designed for the modern workforce and backed by a zero-trust philosophy, Duo is the user-friendly, scalable way to keep your business ahead of ever-changing security threats.

Exonar – Data Discovery

Exonar’s world-leading data discovery software Reveal builds a powerful index of information of all types that is instantly accessible in a single pane of glass. This extends the data ‘scanning’ capabilities that Microsoft solutions offer.

The additional capacity and scope of visible data in Exonar Reveal provides an opportunity to harness and protect data like never before.

Fortinet – Next Generation Firewalls

FortiGate next-generation firewalls (NGFWs) utilise purpose-built security processors and threat intelligence security services from AI-powered FortiGuard labs to deliver top-rated protection, high performance inspection of clear-texted and encrypted traffic.

Next-generation firewalls reduce cost and complexity with full visibility into applications, users and networks and provides best of breed security.

F-Secure – Vulnerability Scanning

F-Secure Radar is a turnkey vulnerability scanning and management platform. It allows you to identify and manage both internal and external threats, report risks, and be compliant with current and future regulations (such as PCI and GDPR compliance).

It gives you visibility into shadow IT – to map your full attack surface and respond to critical vulnerabilities associated with cyber threats.

READ MORE

Ironscales

Ironscales is a self-learning Email security platform that sits within the mailbox to detect, prevent, and remediate phishing e-mails at the mailbox level. IronScales is a comprehensive phishing mitigation solution designed to protect your enterprise from cyber attacks. Based on a gamified training program and a unique crowd-wisdom approach, the IronTraps automatic mitigation response is immediately executed when a phishing attack is reported by employees.

IT Governance

IT Governance is a leading global provider of IT governance, risk management, penetration testing, and compliance solutions, with a special focus on cyber resilience, data protection, PCI DSS, ISO 27001, GDPR, and cyber security.

KnowBe4 – Security Awareness Training

Most cyber-attacks still rely on your employees inadvertently opening or downloading malware to your network. A formal approach to security awareness training (SAT) as part of your “human firewall” should therefore be an integral part of your Cyber Security posture.

Classroom-based security training is largely expensive and ineffective. In the Forrester Wave™: Security Awareness And Training Solutions, Q1 2022 KnowBe4 is recognised as the highest for its strength of strategy and strength of current offering (access the full report here).

READ MORE

Mimecast – Email Security for Office 365

Mimecast’s Advanced Email Security with Targeted Threat Protection uses multiple, sophisticated, detection engines and a diverse set of threat intelligence sources to protect email from spam, malware, phishing, and targeted attacks delivered as a 100% cloud-based service.
The Mimecast services defend against email-borne impersonation attempts, malicious URLs and attachments, threats that are internal to the organisation, as well as attacks from the inside destined for external recipients.

READ MORE

PatchMyPC

Extend Microsoft Configuration Manager to deploy and patch an extensive list of third-party applications with PatchMyPC. Their solutions automate the task of packaging, testing, troubleshooting, and deploying applications in your environment. This streamlines the creation and patching of third-party applications. It also allows you to configure automatic deployment rules for complete automation and control over third-party patch management in your enterprise.

SecurEnvoy – Data Loss Prevention for Office 365

SecureIdentity DLP provides the identity of the user, the device, and the data they are working on so you can prove exactly who is doing what at any time. The intelligence will provide detailed context and behavioural analysis of the user, the device, and the data they interact with.
This ensures compliance with the corporate policy, reduction of risk of fines, and protection of your vital intellectual property and business assets.

Webroot – Endpoint Protection

Webroot business endpoint protection was the first next-generation, fully cloud-based endpoint security solution to harness the power of machine learning to continuously monitor and adapt endpoint threat detection, protection, and prevention.

It defends many different types of physical and virtual systems and their users against modern, multi-vector threats. By taking a predictive, adaptive, multi-layered approach to stopping attacks in real time, Webroot business endpoint protection offers a faster and significantly more effective alternative to traditional business antivirus solutions.

Zscaler – Internet Access for Office 365

Zscaler Internet Access is a Secure internet and Web Gateway delivered from the cloud. Offered as a service from the world’s largest security cloud, Zscaler Internet Access provides a full security stack with all the in-depth protection you’ll ever need.

Zscaler enables direct-to-cloud access for Microsoft Office 365. This is achieved by enabling organizations to send traffic directly to application servers over the internet, instead of backhauling traffic over costly MPLS circuits.

READ MORE