Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

19119 results found

19119 results found in Lot 3: Cloud Support in the category Security services

  • OCI (Oracle Cloud)

    ZAIZI LTD

    Zaizi's "secure by design" approach to secure, efficient Oracle Cloud landing zones integrates with native AI tooling for transformative insights and automation. Our solutions prioritise: -high performance -scalability -data integrity -compliance With expertise in cross-domain networking, we ensure secure, interconnected operations, enhancing decision-making and operational efficiency.

  • Salesforce App Development

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions specializes in Salesforce App Development, crafting custom applications tailored to the unique needs of government departments. Our solutions enhance operational efficiency, improve citizen engagement, and leverage the power of cloud technology to deliver innovative, secure, and scalable applications for the public sector.

  • Accenture 6Point6 Cloud DevOps Scaled Cloud Automation Services

    ACCENTURE (UK) LIMITED

    DevOps Scaled Automation Service provides a full range of DevOps tools, capabilities and expertise. Enabling quick adoption of DevOps methodologies to solve a large variety of problems including cloud migrations, CI/CD, fully automated testing and deployments. Combined with best-in-class DevOps, cloud and security practices.

  • Cyber Security Testing

    BRICKENDON CONSULTING LIMITED

    Brickendon specialises in comprehensive cybersecurity testing, including penetration testing and vulnerability assessments, enabling organisations to identify and address weaknesses in their digital infrastructure before they are exploited by malicious actors. We help organisations to mitigate risks effectively and protect what matters most in the digital age.

  • Test Data Management Support

    CAPGEMINI UK PLC

    Test Data Management (TDM) is essential for efficient Quality Engineering and testing assurance. Involving the strategic handling of test data to ensure accuracy, confidentiality, and compliance with regulations. Effective TDM accelerates testing cycles, mitigates risks, and enhances data integrity.

  • Avanade Value & Benefits Realisation Services

    AVANADE UK LIMITED

    Avanade’s Advisory practice offers end-to-end Value Realisation services, designed specifically with the modern world of incremental change and continuous transformation in mind. Do the right things in the right order, deliver on your promises and create genuine, sustainable business impact. Tailored specifically for Health / Public Sector organisations.

  • IT Security Architect

    TMC3 LIMITED

    IT security architect by tmc3. Our IT security architect service provides experienced consultants to support digital transformation programmes. Delivering design and support of IT security architecture, throughout the project delivery lifecycle with Public, Hybrid and Private cloud capability. This service provides secure design and information assurance to HMG/NCSC standards.

  • Crisis Simulation Exercise / Training

    CYBEXER (UK) LTD

    This crisis management training enhances team capabilities through scenario-based simulations. Focused on strategy, recovery, and continuity, it offers realistic exercises inspired by past events to improve decision-making and crisis handling in a controlled setting, requiring minimal technical knowledge.

  • Managed Security Service – SbD (Secure by Design)

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    CSDC Offers a cyber secure, Design services with a focus on Secure by Design principles. Our solutions ensure robust risk management, security control implementation, and continuous lifecycle support, aligning with NCSC guidelines and NIST security standards for public sector outcomes. Ideal for projects demanding robust repeatable security integration.

  • CISSP Consultant

    I3SECURE LIMITED

    Our CISSP (Certified Information Systems Security Professional) consultants provide expertise and guidance in various aspects of cybersecurity. They provide organisations with a strategic advantage in managing cybersecurity risks, achieving compliance, and protecting their valuable assets and reputation in an increasingly digital and interconnected world.

  • Data Encryption

    LEFKE IT LIMITED

    Lefke IT specializes in Data Encryption services, offering robust security solutions to government departments. Our advanced encryption techniques protect sensitive information, ensuring data confidentiality and integrity. With Lefke IT, government entities can confidently manage data, safeguarded against unauthorized access and cyber threats, while maintaining compliance with data protection regulations.

  • Front End Development

    SOLIRIUS REPLY LIMITED

    Specialists in creating responsive, accessible and engaging user interfaces ensuring optimal user experience across devices using technologies such as React, Angular, Javascript, TypeScript, NextJS, Tailwind, Razor, Blazer, HTML5, CSS3. We have experience with the GOV.UK Design System and browser testing technologies such as Browserstack and SauceLabs.

  • monday.com Implementation, Configuration, Development and Support Services - enable.services

    ENABLEIT TECHNOLOGIES LIMITED

    Transform your monday.com projects, With over a century of collective experience, enable.services provides tailored solutions for organizations on the monday.com platform, including licensing, hosting, consultancy, migration, training, development, and UK-based support, all managed internally. Elevate your brand and your workflows.

  • Blockchain and Innovation Technologies for the Cloud

    Triad Group Plc

    Our partnership with enterprise blockchain technology platform providers, underpins our delivery of distributed ledger solutions to the public sector. We collaborate to identify, develop and deploy blockchain applications to help you improve operational processes, enhance security and achieve cost optimisation, unlocking ROI.

  • Managed PKI

    GMO GLOBALSIGN LIMITED

    Our secure SaaS-based Managed PKI platform offers unique features and functionality that give you complete control of your PKI certificate needs from one centralized account. APIs, Active Directory integration, and inventory tools make it easy to automate and track certificate deployments.​

  • Managed Extended Detection and Response - Service

    LITTLE FISH (UK) LIMITED

    The Crest Accredited Managed eXtended Detection and Response (M-XDR) service is based on Microsoft’s Sentinel platform and delivers centralised view of information security activity. Littlefish's approach to M-XDR provides a service tailored to your unique environment by leveraging existing technology across the Microsoft Defender XDR platform and other security technologies.

  • Service Asset and Configuration Management (SACM)

    CAPGEMINI UK PLC

    Capgemini provides implementation and optimisation for many services for SACM, ranging from strategy inception to execution. The service comprises four distinct components (Capability Assessment, Operating Model Design, Transformation Roadmap, Business Case) which can be ordered as standalone activities. Capgemini believes the service is most effective when components are combined.

  • Big Data - SThree trading as Computer Futures & Real Public Sector

    STHREE PARTNERSHIP LLP

    SThree Big Data services enable clients to plan, architect, develop, deploy and manage Big Data & data science cloud solutions. We are experts in Hadoop, Apache Spark, Scala & are actively delivering big data solutions into the following sectors: Healthcare/NHS, Local/Central Government, Defence, Education, Bluelight, Transport, Combined Authorities, Devolved Administrations.

  • Cyber Security Services

    PH CONSULTANCY SERVICES LTD

    Full service tailored cyber security services, including (where requested); Penetration Testing Information Assurance On-call Monitoring/Response Security Architecture Security Engineering Services Risk Assessment Cloud Security Audit Threat Intelligence Product Security Assessment Cloud Security Policy Advisory

  • Project Planning Tiger Team

    I3WORKS LTD

    Project Planning Tiger Team are one of the high-quality services that i3Works offers. We provide Project Planning Tiger Team practitioners at all levels, from lead to support. Our experience of Project Planning Tiger Team and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.

  • Cyber Threat Modelling

    TMC3 LIMITED

    tmc3’s Cyber Threat Modelling service allows you to access industry leading skills and expertise, to receive unique and tailored Threat Intelligence, against your organisation, services and/or systems. Whether you want to validate threats/risks, receive training, or need guidance towards appropriate control measures, our experts will help.

  • Cloud and User Connectivity Assessment

    FORDWAY SOLUTIONS LIMITED

    Fordway’s Cloud and User Connectivity Assessment to help organisations transition from traditional networks to borderless internet based connectivity. Reviews, defines and plans how organisations can transition, implement and use Zero Trust Network Access (ZTNA), Secure Access Service Edge (SASE) and Software-Defined Wide Area Networks (SD-WAN).

  • Security Architecture

    KPMG LLP

    KPMGs comprehensive approach covers assessment, design, optimisation, and assurance, ensuring your cloud environment meets industry best practices and regulatory standards. We help you achieve a secure, compliant, and cost-effective cloud posture, giving you peace of mind.

  • Microsoft Defender for Endpoint

    Wavenet

    Secure Configuration and ongoing development endpoint policies in line with best practices to provide protection and detection against lates and emerging threats. All threat alerts are are ingested into out ticketing system and processed accordingly by our trained analysts in accordance with a priority based SLA.

  • Bespoke e-Learning platform

    THE STATIONERY OFFICE LIMITED

    An online platform that may be used to deliver self-paced e-learning courses or a student/instructor resource centre.

  • API and CRM Integrations

    CACI LIMITED

    CACI has been handling systems and API integrations for 15+ years. We advise on systems architecture best-practices for compliance, security and performance of existing or new APIs. We use industry-standard REST APIs to integrate with ERPs, CRMs, and customer engagement solutions such as Acquia, Salesforce, MS Dynamics and others.

  • Implement and integrate pre-built commercial software (COTS) solutions

    Supercharge London Ltd.

    Our service entails the deployment and integration of pre-built commercial software solutions. We handle the seamless incorporation of off-the-shelf software into your existing systems, ensuring smooth operation and compatibility. Let us streamline your processes with our expertise in implementing commercial solutions tailored to your needs.

  • Service Desk

    GOACO GROUP LTD

    Our Service Desk enables your users to request and receive IT and business operational support (BAU). Our service desk covers service management with 24x7 capability, maintaining third party supplier/contacts, assisting with problem management, and business continuity with digital transformation programmes - with user centric, cyber security, and continuous improvement capabilities.

  • Cloud Evolution Strategy & Roadmap

    INFOSECWORLD LIMITED

    InfoSecWorld has been enabling digital transformation of government with scale-up, improve end user performance, sustainability, faster service delivery or simply re-factoring legacy applications for the cloud- with our multi-cloud solutions experts to help build the right cloud for your business and evolve team's culture and skills to embrace the cloud.

  • Bug Bounty

    LRQA

    A unique platform run by LRQA (formerly-LRQA-Nettitude) cybersecurity experts, who abide by the highest ethical code of conduct and world-class industry professionalism. Continuous assurance of internet-facing production systems, e.g. perimeter infrastructure and external web-applications. Bug Bounty is output-oriented – the higher the severity of vulnerability identified, the higher its price.