We use cookies on this site to help provide the best possible online experience. By using this site you agree to our use of cookies.

Click to view our cookie policy and customize your cookie preferences.

Icon
A notification message..

Choosing products for new Chest Agreements

The following resources are being considered for new Chest Agreements.

We need your input!

With the support of our customers, Chest considers lots of opportunities to add new resources to the Chest Agreement portfolio. These resources are suggested by a member of the academic community, identified by Chest, or are from ad hoc approaches from suppliers. If you are potentially interested in any of the listed solutions below, let us know by emailing us.  If there is enough backing from the community then Chest will start negotiations - there is strength in numbers!

Our selection process is simple. It is driven by demand and the need to provide better value for money and licence terms than can be obtained elsewhere. The resources, both Software and Online Resources*, are presented with most recently added first.  Anything over a year old will be taken down.

Alternatively, if you'd like to suggest a vendor not on the below list, please complete and submit this form as best you can: Suggest a Chest agreement

To express your interest in any of these resources login to the Suggestions page and click the appropriate vote button or email Chest Help.

     Login     

Duskrise

We need your input! Chest have been talking to DuskRise about a potential new Chest Agreement. Interested? Let us know! 

DuskRise's Agentless solution simplifies and extends office-grade security to remote assets and users.

Dogma Device: Hardware module for network protection. 

  • DWi-Fi segregation to prevent lateral movement attacks. 
  • Effective control and prevention filters for cyber threats. 
  • Hardware specifications like System on Chip (SoC), low energy, and no-fan operation 

Dogma App: iOS & Android application for device setup and security monitoring. 

  • User-friendly interface for device setup. 
  • Real-time notifications of security events. 
  • Management of secure remote network credential 

Dogma Dashboard: Web-tool for SOC personnel. 

  • Enables enforcement of company security policies. 
  • Displays detailed information on security events and connected devices. 
  • Provides comprehensive remote network visibility 

Dogma Secure Cloud: Software backend for threat intelligence and analysis  

  • Cloud-based software functionalities using AI and ML algorithms. 
  • Powered by Cluster25's cyber threat intelligence.
  • Offers real-time updates and insights for proactive threat blocking. 

To find out more, visit the DuskRise website or the Higher Education Case Study. 

Any questions please get in touch! 

Added October 2024

___________________________________________________________________________________________________

Gatewatcher

Gatewatcher – Next-Generation Cyber Threat Detection

With expanding IT infrastructure and evolving cyber threats, universities and colleges need real-time network visibility to ensure security at every stage of the attack kill chain.

Gatewatcher provides comprehensive, real-time visibility across IT, Shadow IT, OT, and IoT environments.

  • Identify all users and assets, eliminating concerns about outdated software and Shadow IT.
  • Reduce detection time and minimize alerts by up to 50%.
  • Deploy and detect in 2 hours.

 

To find out more you can, view flyer here, watch a short video, or visit the Gatewatcher website

Added October 2024

________________________________________________________________________________________________

ThreatDown

ThreatDown is a comprehensive endpoint security solution designed to protect organizations from various cyber threats.   

Key features include: 

  • Endpoint Detection & Response: Combat increasing cyber threats on student data with protection for workstations and servers 
  • Managed Detection & Response: Help resource-constrained teams with fully-managed 24x7x365 threat monitoring, investigation, and remediation 
  • Ransomware Rollback: Restore files that were encrypted, deleted, or modified in an attack. Return school devices to a healthy state and prevent ransomware reinfection 
  • Patch Management: Protect your educational institution by patching vulnerabilities before they are exploited, all without adding complexity 

To find out more, visit the ThreatDown resources page or watch this short video. 
Any questions please get in touch! 

Added September 2024

________________________________________________________________________________________________

Ionix

IONIX is a cybersecurity platform designed to manage and secure an organisation’s attack surface.   

Key features include: 

  • Mapping an organisation’s real attack surface, identifying and prioritising the riskiest connections to prevent attacks before they happen. 
  • End-to-End Asset Discovery, including hard to find digital supply chains and old storage buckets. 
  • Risk Assessment and Prioritisation through continuous scans and assessment, ensuring an accurate view of all assets and configurations. 
  • Active Protection against attacks, evaluating attack paths and understanding the operational impact based on asset interconnectivity. 
  • Blast Radius Analysis, to help understand the potential impact of a compromised asset, allowing for better risk management. 

To find out more, visit the Ionix resources page or watch this short video. 

Any questions please get in touch! 

Added September 2024

________________________________________________________________________________________________

StrongDM

The digital world is constantly changing, and so are the threats that come with it.

StrongDM takes on those challenges head-on with a straightforward approach to Zero Trust security. We make sure that the right people get access to the resources they need, exactly when they need them — no more, no less.

StrongDM is a Zero Trust Privileged Access Management (PAM) platform designed to secure and manage access to critical IT resources.

Key Features:

  • Zero Trust Security: It operates on a Zero Trust model, ensuring that users only get access to the resources they need, exactly when they need them
  • Unified Control Plane: All technical users can use a single control plane for managing access across a company’s entire stack, including databases, servers, Kubernetes clusters, clouds, and web applications
  • Policy-Based Access: StrongDM uses a policy engine to create and enforce fine-grained access controls, tailoring who gets access to what and when
  • Frustration-Free Access: Designed for simplicity, it enables users to securely access resources without frustration, improving both security and productivity
  • Complete Visibility: Provides a comprehensive view of who accessed what and when, ensuring transparency and aiding in informed security decisions
  • Just-In-Time Access: Implements workflows that grant access only when needed and revoke it automatically when done, reducing the attack surface
  • Integration: Can be integrated with existing tools and infrastructure without requiring significant changes or recoding.

To find out more you can visit the StrongDM website here, watch some of their webinars here, or listen to their dedicated podcast here.

Added September 2024

___________________________________________________

Raffle.ai

With Raffle you can simply replace your website searches with custom AI, all by yourself.

No coding or AI expertise needed. In today’s competitive academic landscape, students demand quick, accurate answers to make informed decisions. 

Raffle.ai offers a state-of-the-art Search and Chat Assistant engine that delivers precision and performance, making searches 3-4 times more accurate, with over 94% of the top results being accurate.  

The AI-driven solution seamlessly understands and translates any language on the fly, ensuring that both students and investors find exactly what they need—quickly and effortlessly. 

Why Choose Raffle.ai?

  • Super accurate AI-Powered Search with Summary translation feature tailored to institutions and complying with the highest security and GDPR standards.
  • Fast implementation – 1 day!
  • The chat assistant is incredibly accurate, understanding inquiries in any language and providing instant, reliable responses—perfect for international students.

Gain valuable insights into your website’s performance:  

  • Identify content gaps based on real user searches.  
  • Discover popular pages and trending questions.  
  • Track how quickly and effectively issues are resolved.  

Visit https://raffle.ai/industries/education to learn more and watch our short video to see how we can elevate your university’s online presence. 

Added September 2024


Macrium

Macrium logo

As technology continues to advance, ensuring the security and reliability of your institution's data while maximising the use of IT hardware becomes increasingly critical. Macrium Software provides exceptional computer & server backup and recovery solutions for Higher Education (HE) and Further Education (FE) institutions.

Key features and benefits of working with Macrium Software:

  • Reliable Recovery: In the event of a hardware failure, Macrium can quickly recover individual Windows computers or servers to dissimilar hardware (being able to backup on a computer with one spec, onto a computer with another spec).
  • Extend Existing Asset Life: Backup and recovery are critical to safeguarding essential data, ensuring that if hardware fails, the data is protected and available with minimal downtime.
  • Remote Scheduling & Management: Enable IT teams to deploy backup software centrally and schedule backups remotely, equipping them to control multi-campus computing efficiently.
  • Cybersecurity Threat Protection: Protect your data and backups against cybersecurity threats by being able to recover data easily.
  • Ease of Use: Macrium Solutions score 4.6 out of 5 from 4,000 independent reviews on Trustpilot
  • Scalability, Speed, Assurance, and Flexibility: Enjoy the benefits of Macrium’s comprehensive and key features across all HE and FE environments

Learn more about how Macrium works in education: 

Macrium addresses challenges many universities and colleges face, seamlessly integrating into educational institutions to provide secure and reliable solutions.

Added September 2024


Threatlocker

ThreatLocker® – Preventing Threats with Zero Trust Endpoint Security

The digital threat landscape is constantly evolving, with the risk of emerging threats and the consequences of failing to prevent zero-day exploits, unknown malware & living off the land attacks posing many challenges for security teams.

ThreatLocker® is a Zero Trust endpoint protection platform that provides enterprise-level cybersecurity to academic institutions globally. ThreatLocker® blocks everything that is not explicitly trusted and limits actions to only what is needed, helping organizations to:

  • Block untrusted software from running
  • Prevent weaponization of legitimate applications
  • Have dynamic control over network traffic
  • Protect unauthorized access or theft of data
  • Elevate & revoke admin privileges
  • Detect & remediate cyber threats

To find out more you can view the solutions overview, watch this webinar on how to prevent ransomware, or visit the ThreatLocker® website.

Added July 2024


Aventido                  

                                   

Chest has been talking to Aventido about a potential Aventido Chest Agreement, making their Pro-Study and ReadSpeaker TextAid products available with the usual Chest benefits.  

Please have a look at the below, and if an Agreement could be of interest to your institution let us know by emailing us.

Pro-Study and the Pro-Study Assist App streamline student research by simplifying information saving, automatic referencing, and thematic organisation across various sources, enhancing accessibility and productivity, especially for students with diverse learning needs. For more information, please see Pro-Study | Aventido

TextAid is a web-based text-to-speech application offering reading and writing assistance for individuals with dyslexia, ADHD, and concentration-related medical conditions. It features Web Reader for text on educational sites, customisable display options, multilingual voices, and writing aids. Integration with cloud services and admin controls ensure efficient document management and user access. For more information, please see TextAid | Aventido

if you are interested in finding out more about Aventido products, you can see a selection of upcoming webinars on their website here

Added March 2024


Proctorio
Software

logo

Unlock Academic Integrity with Proctorio

Proctorio: Where Innovation Meets Integrity!  In a world where online tests are taking the lead, safeguarding academic integrity is a challenge we all face. Say hello to Proctorio, your trusty sidekick in ensuring honesty in assessments. Proctorio combines recording, verification and lockdown browser settings to ensure a secure exam environment. Their mission? To provide high-integrity within every learning opportunity around the globe. Proctorio’s cutting edge solution makes online test taking easier, more secure and cost-effective.

Why Proctorio Stands Out:

  • Seamless Integration: Proctorio custom integrates with any assessment platform or LMS, utilising Single Sign-On.
  • Accessibility: Proctorio is fully accessible with a verified VPAT 301, Revised 508, and WCAG 2.1 level AA. It's compatible with multiple ARIA-label screen readers.
  • Limitless Scalability: No matter the size or location of your institution, Proctorio's Automated Proctoring adapts to your users’ needs.
  • No Waiting: Proctorio exams are unscheduled, giving users the freedom to take them at any time within the designated testing window.
  • Privacy + Security: Proctorio is the pioneer in online integrity platforms to utilize end-to-end encryption. The exam experience remains confidential between approved institution representatives and test-takers.
  • 24/7/365 Proactive Support

Join the Proctorio community and elevate the quality of education while ensuring the integrity of assessments. To find out more you can watch a short video explainer or visit the Proctorio website.

If you’d be interested to see Proctorio made available through a Chest Agreement, please let us know.

Added November 2023


* Software

Software Agreements cover products widely used in teaching and research. As well as generalist products from Microsoft and Adobe they include subject specific products in GIS, statistics and maths, qualitative data analysis, mind mapping and others.


*Online Resources

Online Resource Agreements include all types of digital resources: from eJournals, eBooks, backfiles, databases, reference materials, standards, to videos… and more.

Join our mailing list for the latest news, event information and resources