AI SecurityArtificial IntelligenceAsset Management & SecurityCloud SecurityCloud StorageCybersecurityDataData AnalyticsData Loss Prevention (DLP)Data QualityDigital TransformationDisaster Recovery and Business ContinuityGDPR / Data ProtectionGovernance, Risk and ComplianceHybrid CloudHybrid WorkingInfrastructure as a ServiceISMSIT ArchitectureIT Cost/Risk ManagementIT InfrastructureLegacy SystemsMigrationPlatform as a ServiceRansomwareSoftware as a ServiceStorage
AI SecurityCybersecurityDataGDPR / Data ProtectionGovernance, Risk and Compliance
Delinea
Information Security
Service Offerings:
Access ControlAI SecurityApplication SecurityCloud SecurityCybersecurityGovernance, Risk and ComplianceIdentity and Access Management (IAM)Infrastructure and Network SecurityInsider ThreatsIT Cost/Risk ManagementPhishingPrivileged Access ManagementSoftware as a ServiceThreat Intelligence
Dorset Software
Information Technology
Service Offerings:
AnalyticsAPIApplication and Web DevelopmentArtificial IntelligenceBlockchainBusiness ContinuityBusiness/Process AutomationCloud ComputingCommunications / Unified CommsCRMDataData AnalyticsData ArchitectureData QualityDevOpsDigital TransformationEnterprise Resource PlanningHybrid CloudIoTIT ArchitectureIT InfrastructureLegacy SystemsMachine LearningMigrationMobile / Mobile PlatformsMobile Device ManagementNetwork Infrastructure/EngineeringProfessional Development & TrainingProject ManagementSoftware Configuration & Integration
Dragos
Information Security
Service Offerings:
CybersecurityGovernance, Risk and ComplianceIncident Response and Forensic AnalysisInfrastructure and Network SecuritySecurity ArchitectureThreat Intelligence
DXC Technology (Cybersecurity Services)
Information Security
Service Offerings:
Huntress Labs
Information Security
Service Offerings:
Access ControlArtificial IntelligenceCloud SecurityCyber FusionCybersecurityCybersecurity AwarenessEmail SecurityEndpoint Security / EDRIncident Response and Forensic AnalysisMalware ProtectionSecurity ArchitectureSIEMTraining and Qualifications
Infinidat
Information Technology
Service Offerings:
Business ContinuityCybersecurityData Loss Prevention (DLP)Disaster Recovery and Business ContinuityHybrid CloudIT ArchitectureIT InfrastructurePrivate CloudRansomwareStorage
LevelBlue
Information Security
Service Offerings:
AI SecurityApplication SecurityArtificial IntelligenceCertificationsCloud SecurityCybersecurityData Loss Prevention (DLP)DDoSDigital TransformationDisaster RecoveryDisaster Recovery and Business ContinuityEmail SecurityFirewallsGovernance, Risk and ComplianceIncident Response and Forensic AnalysisInfrastructure and Network SecurityInsider ThreatsInternet SecurityIntrusion DetectionIoTIT InfrastructureMachine LearningPenetration TestingPhishingRansomwareSOCsSupply Chain SecurityThreat IntelligenceVulnerability Management
Nasstar
Information Technology
Service Offerings:
Access ControlAI SecurityAPI SecurityApplication and Web DevelopmentApplication SecurityArtificial IntelligenceAutomationBig DataCloud ComputingCloud SecurityCybersecurityCybersecurity AwarenessData Loss Prevention (DLP)DDoSDevOpsDigital TransformationDisaster RecoveryDisaster Recovery and Business ContinuityEdge ComputingEmail SecurityEndpoint Security / EDRFirewallsGovernance, Risk and ComplianceHybrid CloudHybrid WorkingIdentity and Access Management (IAM)Infrastructure and Network SecurityInfrastructure as a ServiceInsider ThreatsInternet SecurityIntrusion DetectionIoTIT ArchitectureIT Cost/Risk ManagementIT InfrastructureLegacy SystemsNetwork Infrastructure/EngineeringPenetration TestingPlatform as a ServiceRansomwareSecure DevOpsSecure Software DevelopmentSIEMSOARSOCsSoftware as a ServiceSoftware Configuration & IntegrationThreat IntelligenceUnified Communications
Nasstar/Microsoft
Artificial Intelligence
Service Offerings:
Access ControlAI SecurityAntivirus SoftwareArtificial IntelligenceAutomationBusiness ContinuityCloud ComputingCloud SecurityCommunications / Unified CommsCybersecurityCybersecurity AwarenessDataData AnalyticsData ArchitectureData Loss Prevention (DLP)Data QualityDevice InventoryDevice ManagementDevOpsDigital TransformationDisaster RecoveryDisaster Recovery and Business ContinuityEmail SecurityEndpoint Security / EDRHybrid WorkingIdentity and Access Management (IAM)Infrastructure as a ServiceIT ArchitectureIT Cost/Risk ManagementIT InfrastructureMaintenance and Support / Service DeskMigrationMobile / Mobile PlatformsMobile Device ManagementMobile SecurityMonitoringNetwork Infrastructure/EngineeringPhishingPlatform as a ServiceProject ManagementPublic CloudSecurity ArchitectureSIEMSOARSOCsUnified CommunicationsVulnerability Management
Netskope
Information Technology
Service Offerings:
AI SecurityAPI SecurityApplication SecurityCloud ComputingCloud SecurityCybersecurityData Loss Prevention (DLP)Endpoint Security / EDRFirewallsIdentity and Access Management (IAM)Infrastructure and Network SecurityInsider ThreatsInternet SecurityIT InfrastructureMobile SecurityNetwork Infrastructure/EngineeringSecurity ArchitectureSoftware as a ServiceThreat Intelligence
Notion
Information Technology
Service Offerings:
Artificial IntelligenceGenerative AIMachine Learning / Deep LearningMaintenance and Support / Service Desk
Ontinue
Information Security
Service Offerings:
AI SecurityArtificial IntelligenceAutomationCybersecurityIoTPhishingSOCsVulnerability Management
Ping Identity
Information Security
Service Offerings:
AI SecurityCloud ComputingCloud SecurityCustomer Experience (CX)CybersecurityDemand GenerationDigital MarketingDigital TransformationEvent MarketingIdentity and Access Management (IAM)Lead GenerationPrivileged Access ManagementPublic Relations (PR)Software as a Service
Resilience
Information Security
Service Offerings:
CybersecurityGovernance, Risk and ComplianceIT Cost/Risk Management
Riot
Information Security
Service Offerings:
AI SecurityEmail SecurityGamificationGovernance, Risk and ComplianceHybrid WorkingPhishingSituational AwarenessSocial EngineeringTraining and Qualifications
Rubrik
Information Security
Service Offerings:
Cloud SecurityCybersecurityRansomware
Suada
Information Technology
Service Offerings:
Above the Line (ATL) MarketingAccount-based Marketing (ABM)AdvertisingAffiliate MarketingAgency benchmarkingAgency relationship managementAgency roster strategy/rationalisationAI & CreativityAI AssistantAI Ethics & Responsible AIAI for Climate & EnvironmentAI Governance & RegulationAI Hardware & AccelerationAI Security & PrivacyAI Visual Search (Computer Vision)Approval Workflows / HubAppsArtificial Intelligence (AI)Artificial Intelligence Theory & AlgorithmsAugmented/Virtual Reality (AR/VR)Behavioural / NeuroscienceBelow the Line (BTL) MarketingBig DataBrand MarketingBrand ReputationBrand templates / StudioBrick and Mortar MarketingBusiness IntelligenceBusiness to Business (B2B) MarketingBusiness to Consumer (B2C) MarketingBusiness to People (B2P) MarketingCall Centre MarketingCampaign planningChannel MarketingCloud AI PlatformsCloud MarketingComputer VisionConsent ManagementContent Management SystemsContent MarketingConversational MarketingCreative RecruitmentCreative SolutionsCRM, Loyalty and AdvocacyCross-Media MarketingCustomer Experience (CX)Customer Lifecycle ManagementCustomer Loyalty & RetentionCustomer ReviewsData & AnalyticsData Engineering & Data Science PlatformsData GovernanceData MiningData ModellingData SecurityData StorageData VisualisationDatabase SystemsDeep LearningDemand GenerationDigital Asset GovernanceDigital Asset ManagementDigital MarketingDigital RecruitmentDigital Rights ManagementDirect MarketingDisplay AdvertisingEdge AI / On-device AIEducation & EdTechEmail MarketingEmail SignaturesEmployer Branding / Recruitment MarketingEvent MarketingExplainable AI (XAI)Fairness, Bias & TransparencyField MarketingFinance & FinTechFirst-Party DataGenerative AIGlobal MarketingHealthcare & Life SciencesHuman-AI InteractionIn housing strategy/auditingInbound MarketingInternal MarketingLarge Language Models (LLMs)Lead GenerationMachine LearningMachine Learning / Deep LearningManufacturing & Industrial AutomationMarketing Capability DesignMarketing CommunicationsMarketing OperationsMarketing PermissionsMarketing RecruitmentMaster Data ManagementMedia Publisher (CDN / Media Delivery Cloud)Media StrategyMLOps / Model Deployment & MonitoringMobile MarketingMultimodal AINative MarketingNatural Language Processing (NLP)Net Promoter Score (NPS)Omnichannel MarketingOnline MarketingOpen Source AI DevelopmentOrganisational DesignPay-Per-Click (PPC)PersonalisationPredictive ModellingProduct Asset ManagementProduct MarketingProximity MarketingPublic Relations (PR)Quantum Machine LearningRecruitment MarketingReinforcement LearningRetail & E-commerceRobotics & Autonomous SystemsROI ManagementSearch Engine Marketing (SEM)Search Engine Optimisation (SEO)Smart Cities & IoTSocial Impact of AISocial Media MarketingSpeech & Audio ProcessingTransportation & MobilityUniversal Consent & Preference ManagementUnstructured DataVideoViral MarketingWebsite LocalisationWebsite Re-Development
ThreatLocker
Information Security
Service Offerings:
CybersecurityData SecurityEndpoint Security / EDRInfrastructure and Network SecurityMachine LearningMalware ProtectionRansomware
TryHackMe
Information Security
Service Offerings:
CybersecurityProfessional Development & TrainingTraining and Qualifications