-
PLANNED LINK LTD
Embark on the strategic implementation of an ISO 27001 Information Security Management System (ISMS) to elevate your organisation's information security framework from initial scoping to full certification. Our services are designed to support businesses and Organisations that may lack the necessary expertise, or knowledge to undertake this critical project independently.
-
VALCON GROUP UK LIMITED
Security Architecture designs and implements controls to protect assets, systems, and data from cyber threats. It includes risk assessment, policy development, control implementation, access management, monitoring, incident response, and compliance, ensuring confidentiality, integrity, and availability aligned with business objectives.
-
JBi Digital
Headless CMSs provide more flexibility than traditional CMSs by making content available via APIs, allowing for customisation across many devices such as smart watches and IoT devices. We can assist organisations with selecting the proper headless CMS, implementing it across channels, and personalising user experiences through automation and AI.
-
Softcat Limited
The Check Point Ransomware assessment is a cross-functional assessment based on inputs from 3 distinct groups (threat intelligence, red teaming, and compliance). The assessment focuses on a practical and realistic analysis of current protective and detective measures, delivering real-world recommendations for real-world ransomware risk.
-
Trustmarque Solutions Limited
Cyber Security Assessment Service Tailored for leaders who demand clarity and actionable insights, our service offers a comprehensive view of your organization's security posture.
-
Gartner UK Ltd.
Gartner Research Board for Global Heads of IT Sourcing and Supplier Management is a forum for senior individuals within the world’s largest organisations. The Service provides access to Gartner Research and research experts.
-
PEGASUS LABS PTY LTD
Our Cloud Implementation and Support Service offers comprehensive solutions for deploying, managing, and optimising cloud infrastructure. We provide tailored setup, ongoing maintenance, and expert support, ensuring enhanced system reliability, security, and scalability to meet the dynamic needs of government agencies on the G-Cloud framework.
-
Hyper Talent Solutions Ltd
Hyper Talent Solutions provides Salesforce Managed Services, offering ongoing support and maintenance for government departments' Salesforce systems. Our services include system monitoring, updates, customization, and troubleshooting, ensuring optimal performance, security, and continuous improvement of Salesforce solutions in the public sector.
-
ACUTEC LIMITED
Designed to provide complete peace of mind in managing your cloud-based or on premise server and IT infrastructure.
Helping your business to improve efficiency, minimise downtime, maximise security and ensure productivity across your IT infrastructure.
-
Hyper Talent Solutions Ltd
Hyper Talent Solutions Ltd specializes in Project Management Tools and Systems Selection and Implementation. Our expert team evaluates your needs, selects suitable tools, and seamlessly implements them for efficient collaboration, communication, and resource management. Trust us to optimize your project management processes with the right tools and systems
-
Node4
Knowledge and Collaboration Roadmap offers a comprehensive strategy for fostering an inclusive, collaborative environment. It integrates knowledge sharing and technology to enhance teamwork, blending office, meeting room, and home working. This service develops plans for people, processes, and technology to realise this collaborative vision effectively.
-
DAINTTA LTD
Daintta supports senior leaders and practitioners to understand potential future scenarios across the PESTLE landscape. This helps organisations develop appropriate strategies to mitigate threats and take advantage of opportunities. We work closely with the organisation to deliver custom research and insights that can build long term sustainable functions within organisations.
-
SALUS DIGITAL SECURITY LIMITED
Thick client application testing is used to assess the security of an installable application. Applications are typically installed locally to a
system but may also interact with application servers/databases, which can also fall within scope. Testing considers elements like user rights & passwords, applied software updates and running services.
-
Mason Advisory Limited
With customer experience (CX) key, and cloud contact centres booming, a multi-channel strategy and sourcing approach are crucial. Our independent consultants help organisations define personas, map journeys, baseline performance, and build roadmaps to source the right contact centre solution.
-
tmc3 Limited
Business Continuity Consultancy helps organisations to develop comprehensive business continuity and disaster recovery maturity levels, ensuring adequate preparation and expert management of harmful scenarios. tmc3’s business continuity consultants support in the development of business continuity plans, documentation and the initiation of a programme of staff awareness, training and education.
-
ABConsultancy Services
Our Static Application Security Testing (SAST) service empowers organisations to enable white-box security testing using automated tools to perform security code review which flushes out many low-hanging fruits like SQL injection, Cross-site scripting, Deserialization vulnerabilities, and many more. Using open source empowers organizations to meet point-3 of Technology-Code-of-Practice (TCoP).
-
Leidos Innovations UK Limited
Leidos will deploy your cloud platform (AWS, Azure, multi-cloud, hybrid, on-prem) and all migration and management services using automated tooling from validated Infrastructure and configuration as code. Your platform will be rigorously tested and accredited (if required) before it is certified fit for service prior to workload / application migration.
-
Reply Limited
Specializing in Business Outcomes Driven Enterprise Architecture, this service designs, develops, and delivers GDSS-compliant digital architecture across AWS, Azure, Oracle, IBM, and Google Cloud Platform using Dell Boomi. Emphasizes seamless integration with multiple clouds to support a robust Internet First strategy.
-
MMT LTD
Empower your AWS or Azure cloud operations with our observability and monitoring service, featuring SIEM for security, Site Reliability Engineering for stability, and mission control for centralised command. Stay proactive with incident management, application support, and performance monitoring, measuring MTTD and MTTR for continuous optimisation.
-
HITACHI DIGITAL SERVICES UK LIMITED
Hitachi Digital Services introduces the Hitachi Application Reliability Center
(HARC), a comprehensive suite of post-implementation and ongoing support
services designed to ensure the seamless operation and optimisation of cloud
workloads for businesses.
-
Cognizant Worldwide Limited
The Business Intelligence PoC and Pilot Services enable an organisation to demonstrate the feasibility and benefits a cloud based BI solution can bring prior to committing significant investments in a given product or solution. The trial solution will encompass Clinical/Medical use cases that will demonstrate rapid benefits realization.
-
Slalom Consulting
Operate and enhance your critical services while continuously improving them. Reduce cycle times and failure rates while also adding new functionality. Our combined site reliability engineering and new feature development approach brings a true DevOps culture to your services and platforms
-
IAME Ltd
Advisory Services
Implementation Services
Standard technical support
24/7 full managed services of your Ping Identity stack
-
DEFENCE DATASEC LTD
Defence DataSec provide guidance on changes to customer's operating model when moving a workload and applications to the AWS Cloud. Also global 24x7 AWS cloud support services customised to client requirements through on-shore, near-shore and off-shore delivery models with shared and dedicated options.
-
Advent IM Ltd
Our information security/cyber security training tailors security training and mentoring to empower organisations. Ensuring compliance with NHS IA Policy and Guidance, DSPT, NSCS CAF, ISO27001, DPA GDPR and more. Benefit from a best-practice security culture, minimise risks, and enhance data governance/ integrity for confident, compliant, and resilient security strategies.
-
ASPIRE SYSTEMS DIGITAL SOLUTIONS LTD.
Innovative web applications, information systems, software and consultancy. Using Agile methodologies Method4 provides discovery, design, development, support and migration of cloud web based solutions. Microsoft Gold partner: Microsoft .NET Core (MVC, C#), web services, XML, XSLT, HTML5, CSS, JavaScript, TypeScript, React, Angular, JQuery, AJAX, SQL Cloud, SharePoint, Umbraco, Azure.
-
ERGO IDS LIMITED
Ergo provides hybrid and multi-cloud architecture design and build services across public cloud providers AWS and Microsoft (MS) Azure leveraging proven, well architected cloud solution designs and accelerators such as landing zones, Kubernetes and OpenShift platforms. We maintain a vendor-agnostic, customer-approach to solution designs.
-
LA International Computer Consultants Limited
Our Quality Assurance and Testing service is delivered by Non-Functional Testing specialists holding recognised industry qualifications. Quality assurance Non–functional Testing services offer a tailored delivery approach including Digital, Agile (Scrum, Kanban), DevOps, Waterfall. Our QAT service includes tool selection, test planning, execution and management of all Non-Functional Testing.
-
Chakray UK Ltd
Chakray is a vendor-agnostic consultancy that works with customers to link their digital transformation strategy to execution, helping them build a framework for making decisions about integration and selecting the right capabilities and technologies to address the organisation’s needs.
-
Prism Infosec
Using a combination of open source and commercial software (Nipper), Prism Infosec shall provide a breakdown of the firewall rules affected by individual issues and highlight any of significant risk to THE CLIENT , particularly that might allow unnecessary communications or significant data exfiltration.