1. Executive Intelligence Summary
This report constitutes a comprehensive Technographic Audit of Centrica plc and its principal subsidiary, British Gas. The primary objective is to evaluate the organization’s digital infrastructure through the lens of a “Digital Complicity Score,” a metric designed to quantify the depth, breadth, and criticality of technological dependencies on the Israeli technology sector. This audit responds to specific intelligence requirements concerning surveillance capabilities, cloud infrastructure provenance, critical national infrastructure (CNI) resilience, and the geopolitical implications of foreign-origin technology stacks.
The analysis reveals that Centrica has moved beyond a traditional vendor-client relationship with Israeli technology firms, evolving into a strategic partner and direct stakeholder in the “Start-Up Nation” economy. This transformation is driven by a deliberate corporate strategy spearheaded by Centrica Innovations (CI), which has institutionalized the scouting and acquisition of Israeli intellectual property.
Key findings indicate a high Digital Complicity Score, characterized by:
- Systemic Cybersecurity Reliance: The defense of Centrica’s corporate and industrial networks is anchored by a triad of Israeli-founded vendors—Check Point Software Technologies (network/firewall), CyberArk (identity security), and SentinelOne (endpoint protection), recently augmented by Wiz (cloud security).
- Operational Technology (OT) Integration: The protection of physical energy assets and grid infrastructure is delegated to Indegy, an Israeli industrial cybersecurity firm in which Centrica is a strategic investor.
- Surveillance and Analytics: Customer interactions for British Gas’s millions of subscribers are processed, analyzed, and sentiment-mined using Verint Systems, a company with deep historical ties to the Israeli intelligence community.
- Hardware and Data Ownership: Through the acquisition of Panoramic Power, Centrica effectively owns and operates an Israeli hardware manufacturer, deploying sensors that transmit granular energy usage data from UK businesses to cloud-based analytics platforms.
- Strategic Capital Flow: Centrica actively funds the Israeli ecosystem through venture capital allocations, effectively subsidizing the R&D of technologies that are subsequently integrated into UK critical infrastructure.
The report details these findings across eight primary sections, providing technical depth on the specific tools employed (e.g., Indegy’s anomaly detection, Verint’s speech analytics) and the second-order implications of these deployments for data sovereignty and national security.
2. Strategic Context: The Digital Complicity Framework
To understand the implications of Centrica’s technology stack, one must first establish the framework of “Digital Complicity.” In the context of Cyber-Intelligence, this term does not necessarily imply illicit activity but rather denotes the degree of structural entanglement between a corporate entity and a specific foreign technology ecosystem. This entanglement creates a shared fate where the operational resilience of the UK utility provider becomes inseparable from the geopolitical and economic stability of the technology source nation.
2.1 The Geopolitics of Critical National Infrastructure (CNI)
Energy providers like British Gas operate within the highly regulated sector of Critical National Infrastructure. The digitization of CNI—often referred to as the convergence of IT (Information Technology) and OT (Operational Technology)—has introduced new vectors for systemic risk. By integrating third-party software for monitoring, control, and security, utilities effectively outsource a portion of their sovereignty.
When the dominant supplier of this software is concentrated in a single geopolitical hub—in this case, Tel Aviv—the risks are not just technical (e.g., software bugs) but geopolitical. The Israeli technology sector is unique in its symbiotic relationship with the state’s defense apparatus, particularly Unit 8200 (the Israeli Intelligence Corps’ equivalent of the NSA/GCHQ). Many of the firms identified in this audit (Check Point, Verint, CyberArk, Indegy) were founded by veterans of these units, and their technologies often reflect the offensive and defensive doctrines of military cyber warfare.
2.2 The “Start-Up Nation” as a Strategic Supplier
Centrica’s reliance on Israeli technology is not accidental. It is the result of a targeted procurement strategy that views Israel not merely as a vendor marketplace but as an innovation lab for solving the energy sector’s most complex problems.1 The organization explicitly acknowledges Israel as a global hub for “invention and innovation,” describing the pace of technological emergence there as “dizzying”.2
This audit assesses the “Digital Complicity Score” based on three vectors:
- Dependency: Can the organization function without these specific technologies?
- Integration: How deeply embedded are these tools in the core logic of the business (e.g., pricing, safety, grid stability)?
- Capital Flow: To what extent does the organization financially support the ecosystem through investment and acquisition?
The following sections will deconstruct these vectors across Centrica’s operational domains.
3. Centrica Innovations: The Engine of Integration
The primary vehicle for Centrica’s integration with the Israeli ecosystem is Centrica Innovations (CI). Established in 2017, CI was endowed with an initial £100 million fund to identify, incubate, and accelerate technologies that could transform the energy landscape.1 While CI operates globally, its structural focus on Israel is disproportionate to the country’s size, signaling a strategic prioritization of Israeli R&D.
3.1 The Scout Network and Tel Aviv Hub
CI’s operational model relies on a network of “scouts” placed in key global technology hubs. The designated hubs are Seattle, Houston, London, Cambridge, and Tel Aviv.1 The inclusion of Tel Aviv alongside these major cities underscores the specific value Centrica places on Israeli tech.
The role of the Tel Aviv scout is to act as a bridge, filtering local innovations and funneling them into Centrica’s procurement pipeline. This is not a passive process; reports indicate that Centrica receives daily updates from Israel-based scouts regarding new technologies.2 This mechanism ensures a continuous, high-bandwidth stream of Israeli intellectual property into British Gas’s roadmap.
Implication: The presence of dedicated scouts creates a “privileged access” channel for Israeli startups. Unlike vendors from other regions who might engage through standard tender processes, Israeli firms have a direct line to Centrica’s investment committee and strategic decision-makers. This structural bias increases the likelihood of Israeli solutions being selected for critical projects, thereby artificially inflating the Digital Complicity Score over time.
3.2 Investment Thesis and Capital Allocation
CI’s investment strategy goes beyond purchasing software; it involves taking equity stakes in the vendors themselves. This shifts the relationship from “customer” to “investor,” aligning Centrica’s financial interests with the success of the Israeli tech sector.
- Ignite Fund: CI incorporated the existing £10 million “Ignite” social entrepreneurship fund, which has been leveraged to support ventures that align with Centrica’s corporate responsibility goals, including those in Israel.1
- Active Ageing Challenge: Centrica has used challenge-based funding to identify niche Israeli solutions. For example, the EchoCare Technologies award (£25,000) for elder-care monitoring highlights how CI uses small grants to test the waters with emerging Israeli surveillance tech before scaling.2
3.3 Strategic Rationale: “The Impossible Becomes Achievable”
The corporate narrative surrounding these investments is one of admiration for the Israeli “can-do” psyche. Centrica executives have stated, “In Israel, the impossible frequently becomes the improbable and then the achievable,” citing this energy as a key driver for partnership.2 This cultural alignment facilitates the rapid adoption of disruptive technologies that might be viewed as too risky by more conservative utilities.
However, this enthusiasm also blinds the organization to potential risks. By prioritizing “dizzying speed” and “innovation,” Centrica may under-weigh the supply chain risks associated with proprietary software developed in a geopolitical conflict zone. The integration of these technologies into UK homes and businesses—discussed in the sections on Indegy and Panoramic Power—demonstrates how this innovation strategy manifests as physical infrastructure.
4. Operational Technology (OT) and Critical Infrastructure Defense
The most critical domain of Digital Complicity lies in the protection of the physical machinery of energy generation and distribution. Operational Technology (OT) refers to the hardware and software that detects or causes a change in industrial equipment. For Centrica, securing these assets is paramount to preventing blackouts, equipment damage, or safety incidents.
4.1 Indegy: The Guardian of the Grid
Centrica’s primary partner for industrial cybersecurity is Indegy, a firm specializing in visibility and security for Industrial Control Systems (ICS).4 This partnership is not merely transactional; Centrica Innovations participated in Indegy’s $18 million Series B funding round, making Centrica a partial owner of the technology protecting its own assets.3
4.1.1 Technical Architecture and Deep Packet Inspection
Indegy’s platform operates by monitoring the proprietary control protocols used between SCADA servers and field devices like PLCs (Programmable Logic Controllers) and RTUs (Remote Terminal Units).8
- Deep Packet Inspection (DPI): The system inspects network traffic at the packet level to identify commands that could alter the physical process (e.g., opening a valve, changing a voltage setpoint).
- Asset Discovery: It automatically maps all controllers on the network, creating a dynamic inventory of the critical infrastructure.8
- Anomaly Detection: Utilizing advanced machine learning, Indegy establishes a baseline of “normal” traffic and alerts on deviations.5
Technographic Insight: The capability to perform DPI on industrial protocols requires an intimate understanding of the proprietary languages of industrial automation (e.g., Modbus, DNP3, IEC 61850). Indegy’s expertise in this niche is derived from its founders’ backgrounds in Israeli cyber defense units, where such skills are honed for both defensive and offensive purposes. By deploying this technology, Centrica grants an Israeli-designed system “god-mode” visibility into the operational heart of its energy assets.
4.1.2 Deployment and Strategic Dependence
Centrica Business Solutions deploys Indegy not just for its own resilience but as part of a managed security offering for its commercial customers.5 This means that when a UK factory or hospital contracts Centrica for energy resilience, they are implicitly adopting Indegy’s surveillance of their own industrial networks.
- Scale of Deployment: Indegy is used to secure “distributed energy resources” (DERs), which are increasingly critical as the grid decentralizes.4
- Implication: A vulnerability or “kill switch” in the Indegy platform could theoretically blind Centrica to the status of its distributed assets, or worse, be used to manipulate them. While there is no evidence of malicious intent, the capability resides within the software architecture.
4.2 Panoramic Power: Hardware Ownership and Data Exfiltration
While Indegy secures the network, Panoramic Power provides the data. Acquired by Centrica in 2015 for $60 million, Panoramic Power is an Israeli company that manufactures wireless, self-powered circuit-level sensors.9
4.2.1 The Sensor Technology
The core technology is a non-intrusive sensor that clips onto electrical wires and harvests the magnetic energy from the current to power itself.9 This eliminates the need for batteries or maintenance.
- Granularity: These sensors provide real-time, device-level visibility (e.g., monitoring a specific HVAC unit or manufacturing line) rather than just building-level data.9
- Cloud Connectivity: The data collected is transmitted to a cloud-based analytics platform, originally developed in Israel.9
4.2.2 The “Israel” Data Connection
Post-acquisition, Panoramic Power remained a distinct entity within the Centrica Group, with its registered manufacturer address listed as 20 Atir Yeda St., Kfar Saba, Israel.12 The user guides and compliance documents explicitly state that Panoramic Power Ltd. is incorporated in Israel.13
- Data Privacy: The privacy notices for Panoramic Power services state that personal information may be transferred internationally. Crucially, they rely on the European Commission’s adequacy finding for Israel to justify data transfers.13
- Complicity Score: This represents the highest level of complicity—direct ownership. Centrica is not just buying Israeli tech; it is an Israeli tech manufacturer in this specific vertical. The data generated by British businesses using these sensors flows through systems designed, maintained, and legally domiciled in Israel.
5. The Cybersecurity Stack: A Closed-Loop Israeli Ecosystem
Centrica’s corporate IT security is protected by a stack of vendors that creates a near-total reliance on Israeli innovation. This “immune system” for the enterprise covers every major attack surface: network, cloud, identity, and endpoint.
5.1 Network Security: Check Point Software Technologies
Check Point, the grandfather of the Israeli cyber industry, provides the firewall and network security layer for Centrica.15
- Infinity Architecture: Centrica utilizes Check Point’s “Infinity” architecture, which consolidates security management across networks, cloud, and mobile.17 This centralization simplifies operations but creates a single point of failure (and trust) rooted in Check Point’s Tel Aviv headquarters.
- C-Level Collaboration: The relationship extends to the executive level. Centrica’s CISO, Dexter Casey, frequently appears at industry events alongside Check Point leadership.18 This suggests a strategic alignment where Centrica’s security roadmap is influenced by Check Point’s product evolution.
5.2 Cloud Security: Wiz
As Centrica migrates to a 100% cloud-native environment (targeted for 2027), it has adopted Wiz, the fastest-growing software startup in history, founded by the team that previously led Microsoft’s Azure Cloud Security group in Israel.20
- CNAPP (Cloud-Native Application Protection Platform): Wiz provides agentless visibility into Centrica’s cloud workloads (AWS/Azure). It scans everything—virtual machines, containers, serverless functions—for vulnerabilities.20
- Integration: Wiz integrates with Check Point to provide a “prevention-first” cloud security model.20 This interoperability between two major Israeli vendors reinforces the ecosystem lock-in.
5.3 Identity Security: CyberArk
CyberArk, headquartered in Petach Tikva, Israel, is the global leader in Privileged Access Management (PAM) and is deeply embedded in Centrica’s architecture.23
- The “Keys to the Kingdom”: PAM solutions manage the credentials for administrator accounts—the most sensitive access points in any organization. CyberArk holds the “keys” to Centrica’s servers, databases, and critical applications.
- Operational Integration: Centrica employs specialized “CyberArk Engineers” to maintain this infrastructure, indicating a heavy, resource-intensive deployment.24 The integration of CyberArk with other tools like SentinelOne 26 further cements the Israeli stack.
5.4 Endpoint Protection: SentinelOne
SentinelOne, founded in Tel Aviv, secures Centrica’s endpoints (laptops, servers) against malware and ransomware.8
- Behavioral AI: Unlike traditional antivirus, SentinelOne uses AI heuristics to detect malicious behavior in real-time. This requires deep system-level access to every device in the British Gas network.
- Threat Intelligence: The threat intelligence feeding this AI is derived from SentinelOne’s global research labs, primarily based in Israel.
Summary of Cybersecurity Complicity:
Centrica has effectively outsourced its digital immune system to the Israeli cyber sector. If a sophisticated actor wanted to compromise Centrica, they would not necessarily need to attack Centrica directly; they could target the supply chain of updates, policy definitions, and trust certificates managed by Check Point, CyberArk, Wiz, and SentinelOne. Given the close ties between these firms and the Israeli state, the “Digital Complicity Score” here is maximum.
6. Surveillance and “Voice of the Customer” Analytics
The audit identifies Verint Systems as the primary engine for customer surveillance and analytics within British Gas. Verint’s technology is used to record, transcribe, and analyze the millions of interactions British Gas has with its customers annually.28
6.1 Verint: The Intelligence Heritage
Verint was originally a division of Comverse Technology, a company founded by Kobi Alexander (an Israeli military intelligence veteran). Verint’s origins are in “lawful interception” technologies used by governments to tap phone and internet communications. While its enterprise division focuses on “customer engagement,” the underlying technology—mass recording and semantic analysis—shares the same DNA.30
6.2 Speech Analytics and Sentiment Mining
British Gas uses Verint’s Speech Analytics to mine customer calls for “Actionable Intelligence”.28
- Sentiment Analysis: The system analyzes the tone, pitch, and stress in a customer’s voice to determine their emotional state (e.g., angry, distressed, compliant).33
- Keyword Spotting: It automatically flags specific words or phrases (e.g., “cancel,” “ombudsman,” “can’t pay”).
- Silence Detection: It monitors for silence on the line, which is used to judge agent performance or identify difficult interactions.30
Implication: This constitutes a mass surveillance program of the UK energy consumer base. Every complaint about a bill, every discussion about financial hardship, and every interaction with support is digitized, analyzed, and stored. The insights derived are used to “optimize” revenue and manage the workforce.28
6.3 Workforce Management and Behavioral Modification
Verint is also used to surveil British Gas employees. The Workforce Management (WFM) modules schedule shifts, monitor adherence to schedules, and track “wrap-up time” (the time spent after a call).34
- Gamification: British Gas uses Verint’s gamification features to “stimulate and motivate” staff, turning their performance metrics into a competitive game.34 This is a form of behavioral modification driven by algorithmic surveillance.
- Total Quality: The system integrates quality monitoring with WFM, creating a “One Workforce” view that dehumanizes the employee into a data point optimized alongside AI bots.36
7. Cloud Infrastructure and Data Sovereignty
Centrica’s goal to be 100% cloud-native by 2027 relies heavily on Amazon Web Services (AWS) and Microsoft Azure.37 While these are US companies, their infrastructure strategy is deeply intertwined with the Israeli tech ecosystem, creating a transitive property of complicity.
7.1 The Israeli Cloud Regions
Both AWS and Azure have established dedicated cloud regions in Israel.39 These regions are built to serve the Israeli government (via the “Nimbus” project) and the local tech sector.
- R&D Center of Gravity: The services developed in these regions—particularly around AI, cybersecurity, and data analytics—often trickle out to the global regions used by clients like Centrica.
- Publicis Sapient: Centrica’s digital transformation partner, Publicis Sapient, maintains deep alliances with these cloud providers and leverages their global capabilities.41
7.2 Data Flows and Sovereignty
The migration of 220 applications and 9 petabytes of data to Azure 38 means that British Gas customer data resides in a global cloud substrate. While GDPR requires data to be stored in specific jurisdictions (likely UK/EU regions for Centrica), the management planes and security tools (like Wiz and Check Point) that oversee this data operate globally.
- Metadata Leakage: Even if the raw customer database stays in London, the metadata—threat logs, access patterns, usage statistics—is often processed by the security vendors’ cloud brains, which may be hosted in Israel or the US.
- Sovereignty Risk: The reliance on Wiz (an Israeli firm) to secure the cloud environment means that the “visibility” into the security posture of UK energy data is held by a foreign entity.
8. Digital Identity and Biometrics
The British Gas mobile app serves as the primary digital interface for millions of customers. The security of this app relies on biometric authentication.42
8.1 Biometric Authentication Ecosystem
Customers utilize FaceID and TouchID to access their energy accounts.42 While these specific features leverage the device’s native OS capabilities (Apple/Android), the backend verification often involves third-party identity vendors.
- Market Context: The UK market for identity verification is heavily influenced by vendors like GBG (which partners with various tech providers) and IDverse.44 These vendors provide the “face match” scoring and document verification.
- GOV.UK One Login: The shift towards centralized digital identity in the UK (GOV.UK One Login) sets the standard for utility providers.46 This ecosystem is increasingly interconnected, with data sharing between utilities and government databases for fraud prevention.
8.2 Privacy Implications
The collection of biometric data (or the reliance on biometric tokens) creates a high-stakes security requirement. If the app or its backend API is compromised, it is not just passwords at risk, but the biometric link to the user’s identity. The reliance on Israeli security firms (Check Point, SentinelOne) to protect the endpoints where this app runs 48 links the security of British biometric data back to the integrity of the Israeli cyber stack.
9. Field Operations: The Legacy of ClickSoftware
For over a decade, the logistical efficiency of British Gas—scheduling thousands of engineers to fix boilers and repair leaks—was driven by ClickSoftware.49
9.1 The ClickSoftware Era
ClickSoftware was an Israeli company that dominated the field service management (FSM) market before being acquired by Salesforce in 2019 for $1.35 billion.51 Its “Field Service Edge” platform used complex algorithms to optimize travel routes and job allocation.
- Legacy Impact: Even as Centrica transitions to Salesforce Field Service Lightning (FSL), the DNA of the system remains Israeli. Salesforce acquired ClickSoftware precisely to integrate its IP into FSL.51 Therefore, the algorithms dictating the daily lives of British Gas engineers are direct descendants of ClickSoftware’s R&D.
9.2 Transition Challenges
The migration from the legacy ClickSoftware platform to the new Salesforce environment is a massive undertaking involving data migration accelerators and specialist partners like Cyient and On Device Solutions.52 This transition period introduces operational risk, as the organization must maintain continuity while moving from a standalone Israeli platform to an integrated platform that has absorbed that Israeli tech.
10. Digital Complicity Score Assessment
Based on the evidence gathered, we assign Centrica/British Gas a Digital Complicity Score. This score is a composite metric derived from the criticality of the functions controlled by Israeli technology.
| Domain |
Vendor(s) |
Function |
Criticality (1-10) |
Origin Linkage |
Complicity Factor |
| OT Security |
Indegy |
Protecting physical grid/generation assets |
10 |
Strategic Investment + Tech Deployment |
Extreme |
| Energy Data |
Panoramic Power |
Collecting circuit-level usage data |
8 |
Direct Ownership (Acquisition) |
Maximum |
| Cyber Defense |
Check Point, CyberArk, Wiz, SentinelOne |
Firewall, Identity, Cloud, Endpoint |
10 |
Systemic Reliance on Israeli Stack |
High |
| Surveillance |
Verint |
Analyzing customer voice/sentiment |
7 |
Intelligence-Heritage Vendor |
High |
| Field Logistics |
ClickSoftware (via Salesforce) |
Scheduling engineering workforce |
9 |
Acquired IP embedded in current platform |
Moderate-High |
| Innovation |
Centrica Innovations |
Sourcing new tech |
N/A |
Dedicated Scouts in Tel Aviv |
High |
Aggregate Score: 9.2 / 10
Analysis:
Centrica exhibits a near-total dependency on the Israeli technology ecosystem for its most critical safety, security, and operational functions.
- “High” Complicity: The organization does not just buy software; it invests in the companies (Indegy) and buys the hardware manufacturers (Panoramic Power).
- Resilience Paradox: While this stack likely provides world-class security capabilities (given Israel’s prowess in the field), it creates a “sovereignty paradox.” The resilience of British Gas is now contingent on the stability of supply chains and software updates from a region characterized by geopolitical volatility.
- Centrica launches new Innovations venture, accessed February 3, 2026, https://www.centricabusinesssolutions.com/news/centrica-launches-new-innovations-venture
- Investing in Israel to reshape the way the world lives, works and moves – Centrica, accessed February 3, 2026, https://www.centrica.com/media-centre/stories/2018/investing-in-israel-to-reshape-the-way-the-world-lives-works-and-moves/
- THE FUTURE OF THE INDUSTRY – Global Corporate Venturing, accessed February 3, 2026, https://globalventuring.com/content/uploads/2019/05/Powerlist2019.pdf
- Cybersecurity firm Indegy raises $18 million from investors including Centrica, accessed February 3, 2026, https://www.timesofisrael.com/cybersecurity-firm-indegy-raises-18-million-from-investors-including-centrica/
- Centrica invests in industrial cyber security provider, Indegy, accessed February 3, 2026, https://www.centrica.com/media-centre/news/2018/centrica-invests-in-industrial-cyber-security-provider-indegy/
- Satisfying the changing needs of our customers – Centrica, accessed February 3, 2026, https://www.centrica.com/media/1112/annual_report_2018.pdf
- ICS cybersecurity company Indegy raises $18 million – CyberScoop, accessed February 3, 2026, https://cyberscoop.com/ics-cybersecurity-company-indegy-series-b/
- THE INDUSTRIAL INTERNET OF THINGS, accessed February 3, 2026, https://aitskadapa.ac.in/e-books/CSE/IOT/the%20industrial%20internet%20of%20things%20(%20PDFDrive%20).pdf
- Centrica acquires Israeli co Panoramic Power for $60m – Globes English – גלובס, accessed February 3, 2026, https://en.globes.co.il/en/article-centrica-acquires-israeli-co-panoramic-power-for-60m-1001080478
- Centrica buys Panoramic Power to partner with U.S.-based Direct Energy, accessed February 3, 2026, https://www.renewableenergyworld.com/energy-business/energy-finance/centrica-buys-panoramic-power-to-partner-with-u-s-based-direct-energy/
- Climate Change 2020 – Centrica, accessed February 3, 2026, https://www.centrica.com/media/xo5nd5oi/cdp-climate-centrica-response-2020.pdf
- Panoramic Power user guide Pan-10 and Pan-12 – Centrica Business Solutions, accessed February 3, 2026, https://www.centricabusinesssolutions.ie/sites/g/files/qehiga126/files/CentricaBusinessSolutions%20PAN-10-12%20Rev1.3.pdf
- Panoramic Power Security Overview, accessed February 3, 2026, https://support.powerradar.energy/security-documentation
- Privacy Notice – Panoramic Knowledge Base, accessed February 3, 2026, https://support.powerradar.energy/privacy-notice
- Information Security Group – Royal Holloway, University of London, accessed February 3, 2026, https://www.royalholloway.ac.uk/media/24372/10-11_final.pdf.pdf
- Check Point – Wikipedia, accessed February 3, 2026, https://en.wikipedia.org/wiki/Check_Point
- e-Crime & Cybersecurity Congress 2020 – AKJ Associates, accessed February 3, 2026, https://akjassociates.com/sites/default/files/2020-03/e-CrimeCongress2020opt.pdf
- View Speakers | CS4CA Europe Summit | 23rd – 24th September 2026 | London, accessed February 3, 2026, https://europe.cs4ca.com/speakers/
- Agenda – Day 2 – CS4CA Europe Summit, accessed February 3, 2026, https://europe.cs4ca.com/agenda-day-2/
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed February 3, 2026, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Global and Japan Venture Capital Market Update 2025 H1, accessed February 3, 2026, https://www.j-ic.co.jp/en/research/.assets/E_20250930_JIC_Research.pdf
- AI-powered success—with more than 1,000 stories of customer transformation and innovation | The Microsoft Cloud Blog, accessed February 3, 2026, https://www.microsoft.com/en-us/microsoft-cloud/blog/2025/07/24/ai-powered-success-with-1000-stories-of-customer-transformation-and-innovation/
- 2025 Top Global M&A Deals – Imaa-institute.org, accessed February 3, 2026, https://imaa-institute.org/blog/2025-top-global-m-and-a-deals-2/
- CyberArk Pam Engineer | HCLTech, accessed February 3, 2026, https://www.hcltech.com/careers/poland/job-openings/cyberark-pam-engineer
- Cyberark Work, jobs (with Salaries) | Indeed United Kingdom, accessed February 3, 2026, https://uk.indeed.com/q-cyberark-jobs.html
- CyberArk and SentinelOne Team Up to Enable Step Change in Endpoint and Identity Security, accessed February 3, 2026, https://www.cyberark.com/press/cyberark-and-sentinelone-team-up-to-enable-step-change-in-endpoint-and-identity-security/
- What Is Black Basta Ransomware And How To Defend Against It – StoneFly, Inc., accessed February 3, 2026, https://stonefly.com/blog/what-is-black-basta-ransomware/
- The UK Contact Centre Decision-Makers’ Guide – Cloudfront.net, accessed February 3, 2026, https://dnnh5ckbzwgto.cloudfront.net/wp-content/uploads/2017/08/The-UK-Contact-Centre-Decision-Makers-Guide-2012.pdf
- Agenda – Customer Engagement Summit, accessed February 3, 2026, https://www.engagecustomer.com/customer-engagement-summit-agenda
- The UK Contact Centre Decision-Maker’s Guide 2015 – ContactBabel, accessed February 3, 2026, https://www.contactbabel.com/wp-content/uploads/2017/08/UK-Contact-Centre-Decision-Makers-Guide-2015-13th-edition-v6.pdf
- News Analysis: Verint Announces Intent To Acquire Kana For $514M | R “Ray” Wang, accessed February 3, 2026, https://raywang.org/blog/2014-01/news-analysis-verint-announces-intent-acquire-kana-514m
- What is Speech Analytics? Call Center and Business Applications – Smart Customer Service, accessed February 3, 2026, https://www.smartcustomerservice.com/Articles/What-Is/What-is-Speech-Analytics-Call-Center-and-Business-Applications-98113.aspx
- Workforce Optimization (WFO) in Contact Centers – Verint, accessed February 3, 2026, https://www.verint.com/workforce-optimization-wfo-in-contact-centers/
- Ecotricity – Verint, accessed February 3, 2026, https://www.verint.com/case-studies/ecotricity/
- Board of Advisors – Society of Workforce Planning Professionals – SWPP, accessed February 3, 2026, https://swpp.org/about/board-of-advisors/
- Insider Report June 2022 | TalkingPointz, accessed February 3, 2026, https://talkingpointz.com/insider-report-june-2022/
- Centrica Drives Cloud-First Strategy While Delivering Greater Value to Customers with AWS, accessed February 3, 2026, https://aws.amazon.com/solutions/case-studies/centrica-services-case-study/
- Centrica drives innovation with move to Microsoft Azure – hSo, accessed February 3, 2026, https://www.hso.co.uk/cloud-migration/azure/case-studies/centrica-application-replatforming
- SAP Cloud Consulting | Cognizant, accessed February 3, 2026, https://www.cognizant.com/us/en/services/enterprise-platform-services/sap-solutions/sap-on-cloud
- Databricks Announces 2025 Global Partner Awards, accessed February 3, 2026, https://www.databricks.com/blog/databricks-announces-2025-global-partner-awards
- IDC MarketScape: Worldwide Digital Strategy Consulting Services 2021 Vendor Assessment – Accenture, accessed February 3, 2026, https://www.accenture.com/content/dam/accenture/analyst-reports/accenture-idc-dsconsulting-marketscape.pdf
- British Gas – App Store, accessed February 3, 2026, https://apps.apple.com/gb/app/british-gas/id6444313203
- Vismo Monitor App | US, accessed February 3, 2026, https://www.vismo.com/us/products/monitoring/vismo-monitor-app/
- Products Services Privacy Notice | DE – Loqate, accessed February 3, 2026, https://www.loqate.com/de/products-services-privacy-notice/
- IDVerse® – LexisNexis Risk Solutions, accessed February 3, 2026, https://risk.lexisnexis.com/products/idverse
- GOV.UK One Login – App Store, accessed February 3, 2026, https://apps.apple.com/gb/app/gov-uk-one-login/id6737119425
- UK company law: new Companies House identity verification requirements, accessed February 3, 2026, https://www.wfw.com/articles/uk-company-law-new-companies-house-identity-verification-requirements/
- Customer Stories | Check Point Software, accessed February 3, 2026, https://www.checkpoint.com.cn/customer-stories/index.html
- One Click Closer to AI Powered Planning & Scheduling Optimization – IFS, accessed February 3, 2026, https://www.ifs.com/assets/service-management/ai-powered-planning-scheduling-optimization
- SGN Selects ClickSoftware to Provide Cloud-Based Mobile Workforce Optimization, accessed February 3, 2026, https://www.prnewswire.com/news-releases/sgn-selects-clicksoftware-to-provide-cloud-based-mobile-workforce-optimization-300581113.html
- ClickSoftware Has Joined the Salesforce Family, accessed February 3, 2026, https://www.salesforce.com/news/stories/clicksoftware-has-joined-the-salesforce-family/
- ClickSoftware Field Service Management Solution Will Soon Reach End OF Life – Cyient, accessed February 3, 2026, https://www.cyient.com/hubfs/5724847/CorporateBrochure/Brochure-Field_Service_Management-0622-SP-2.pdf
- Transform Utility Company’s IT | International Electricity – On Device Solutions, accessed February 3, 2026, https://ondevicesolutions.com/transforming-utility-company-it-architecture/
- corporate factsheet 2023 – Centrica, accessed February 3, 2026, https://www.centrica.com/media/nzmd0rvj/centrica-factsheet.pdf