Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

19531 results found

19531 results found in Lot 3: Cloud Support in the category Security services

  • Application Modernisation

    KPMG LLP

    KPMG offers a comprehensive service, covering both refactoring and rebuild of legacy applications. We provide assessment, migration and build to improve the usability, performance, scalability, and security of existing apps with a focus on enabling application led business transformations.

  • SAP Analytics Services

    Protiviti LTd

    Protiviti helps clients get the right information, to the right people, at the right time. Our methodology provides systematic leading practices approach, allowing clients to maximise their analytics investments, improve Analytics adoption leveraging SAP Products - BW, BW/4, HANA Cloud, BusinessObjects (SAP Analytics Cloud/Digital Boardroom, Lumira, SAP MDG, SAP Datasphere.

  • Cloud Natural Language Artificial Intelligence

    ALPS AGILITY LIMITED

    Elevate your business with Alps Agility’s expert Cloud Natural Language AI consulting and delivery. Our team excels in designing, deploying, and optimising AI-powered language processing solutions. Leverage our cloud infrastructure to unlock powerful AI-driven insights and enhance decision-making with seamless system integration.

  • Dotsquares Security Management Services

    DotSquares Limited

    Dotsquares Security Management Services guarantee data integrity and availability across systems. Our comprehensive approach includes Managed Firewall, Operating System Security, Access Control, Data Encryption, robust Password Policies, Multi-Factor Authentication, Role-Based Access Control, Identity and Access Management, Secure File Transfer Protocol, and Formal Approval Processes for utmost security assurance.

  • Risk, Assumption, Issue, Dependency and Opportunity (RAIDO) Management

    I3WORKS LTD

    Risk, Assumption, Issue, Dependency and Opportunity (RAIDO) Management is one of the high-quality services that i3Works offers. We provide Risk, Assumption, Issue, Dependency and Opportunity Management practitioners at all levels, from lead to support. Our experience of RAIDO Management and capability knowledge has been demonstrated across numerous government clients.

  • Accessibility Testing

    PROLIFICS TESTING UK LIMITED

    Accessibility testing to ensure websites apps conform to modern accessibility standards. Structured accessibility audits against the WCAG 2.2 standard at levels A, AA and AAA, using the latest tools combined with manual techniques to report on compliance and areas for remediation, including provision of accessibility statement and certification level.

  • Civica Advanced Analytics and Data Science Service

    CIVICA UK LIMITED

    Unlock the potential of Data Science, AI, and ML to discover increased value. We prioritise identifying your distinct business outcomes and challenges, tailoring solutions that deliver tangible value. Our approach focuses on incremental delivery, fostering user engagement, and cultivating robust data platforms and in-house expertise for enduring digital transformation.

  • Data Protection Audit Service

    GOACO GROUP LTD

    Ensure compliance and mitigate risks with Goaco's Data Protection Audit service. We assist organisations in aligning with data protection laws and internal policies. Our audits provide expertise on compliance posture, benchmarked against regulatory requirements and the ICO's Accountability Framework. Trust Goaco to safeguard your data and uphold regulatory standards.

  • Cloud Services Audit Health Check

    SLALOM CONSULTING LIMITED

    Slalom offers several services to review the current state of cloud platforms and projects to provide guidance and enhancement suggestions. Our collaborative and product agnostic approach engages your team to reach across all impacted domains of change, people, process, information, applications, security, FinOps and infrastructure of your cloud technology landscape.

  • Cloud Support

    ARROW BUSINESS COMMUNICATIONS LIMITED (Trading under the brand name ARO)

    Arrow provides Cloud Support for: • Setup and migration • Transition management to cloud services, • User management of cloud service • Training of Cloud Services • On-going Support

  • Development Services

    ACUITY APPLIED LIMITED

    Acuity Applied offers comprehensive Microsoft Cloud Support Services, providing a full suite of consultancy services to help your organisation plan, build, implement, adopt, and support Microsoft cloud-based solutions. Our expertise spans platforms such as Microsoft Azure, Microsoft 365, Microsoft Dynamics, and Microsoft Power Platform.

  • User Research

    CreateFuture

    Research and co-design user-centric services with a diverse, representative population of real users. Across qualitative/quantitative, moderated/unmoderated, inductive/deductive, and generative/evaluative dimensions, our UCD practice provides skills to plan, run, and analyse user research. We will help you design user-centred products and services that continuously meet GDS standards.

  • Cloud Programme and Project Management

    CREDERA LIMITED

    Credera manages Cloud project and programmes ranging in scale from £K to £10M. We have deep technical expertise and knowledge of all the key vendors (AWS, Azure and GCP) and their services. Our staff have industry-recognised qualifications across all major cloud vendors and can deliver using Agile or Waterfall methodologies.

  • Mobile App Platform

    THE STATIONERY OFFICE LIMITED

    TSO’s in-house app platform for the fast and cost effective delivery of cross-platform hybrid apps.

  • Data Subject Access Request (DSAR) Support

    CYFOR

    CYFOR Legal Data Subject Access Request (DSAR) service facilitates accurate handling of data subject requests, ensuring compliance with GDPR. We provide comprehensive identification, retrieval, and delivery of personal data, backed by robust security measures, streamlined processes, and expert support to manage responses efficiently within the legal time frame.

  • Research, Design, and Prototyping

    NEXOR LIMITED

    Nexor’s services are built on a successful track record of leading and delivering research projects on behalf of Defence and Security organisations. We work closely with customers to clearly define the problem then research and develop into the ‘art of the possible’ to enable future solution creation and implementation.

  • Cyber Security Skills and Consultancy

    Pionen

    Consultancy services relating to Cyber Security strategy, Security policy, security architecture, Cyber risk management, Cyber capability, Independent Cyber Security Capability identification, cyber training and security awareness. High quality, expert provider with a focus on senior roles: we supplement and support transition to an in-house workforce and provide expert people advisory.

  • Technology Strategy

    WE SHAPE LTD

    We specialise in expert services aimed at accelerating and supporting the implementation of digital strategies. Our comprehensive offerings include maturity assessments, transformation strategies, and identification of key KPIs to achieve desired outcomes. Combining client knowledge with our practical approach ensures effective and pragmatic transformation.

  • Alpha Service

    KERV DIGITAL LIMITED

    Kerv teams are experienced in discreet Alpha phases and full transformations, progressing Government services successfully through Discovery, Alpha, Beta, Live, BAU. Our experts work collaboratively to help accelerate Alpha experimentation, test riskiest assumptions, iterate prototypes with users validating feasibility, desirability and viability. Documenting with high quality artifacts, openly sharing throughout.

  • InfoPad - Customer Insights Setup, Migration, Training and Support

    INFOPAD LTD

    InfoPad's Customer Insights Setup, Migration, Training, and Support service offers tailored implementation, smooth data integration, comprehensive training, and robust support to maximize your utilisation of Customer Insights. Our expert team ensures you harness the full power of data analytics to drive informed business decisions and strategies.

  • OWASP Vulnerability Scanning

    PERICULO LIMITED

    Our professional vulnerability scanning service targets your application or network looking for exploitable vulnerabilities within the OWASP Top 10. We use industry leading tools such as Nessus and Qualys. This service includes a detailed report on findings and recommended remediation measures to ensure you remain secure from external threats.

  • Coaching, Skills Development & Knowledge Transfer

    AVANTIS PERFORMANCE LTD

    Our dedicated Learning & Development (L&D) capability is the golden thread that flows through our Coaching, Skills Development & Knowledge Transfer capability. A proven track record in successfully delivering complex development activities, from 1:1 sessions to facilitating skills development and Knowledge Transfer to a Service Executive within a government organisation.

  • DFIR Incident Response Plan Consultancy

    PEN TEST PARTNERS LLP

    Helping the client to build and develop an effective incident response plan, and supporting processes such as recovery playbooks. IRP development is typically run in combination with Table Top exercises to test and improve base process over time.

  • Accessibility audit, testing, compliance

    KAINOS SOFTWARE LIMITED

    Kainos provides accessibility audit, accessibility testing and accessibility compliance services. We conduct expert manual accessibility reviews, run automated accessibility tests, and deliver accessibility audits that show how you comply with accessibility regulations and standards. We fix accessibility failures so you can achieve exemplary accessibility compliance.

  • International Cross-Domain Interoperability Service

    PARICO LIMITED

    Parico's suitability qualified and experienced technical team can deliver and support International Cross-Domain Interoperability services. We deliver and support secure, NCSC assured, Low, Medium and High Assurance non-real-time and real-time Interoperability services across security classification boundaries.

  • Cybersecurity Maturity Assessment & Security Strategy Development

    VE3 GLOBAL LTD

    VE3's Cybersecurity Maturity Assessment offering evaluates security capabilities against industry standards and benchmarks, comparing them with similar organizations. After assessing the security posture, VE3 develops strategic recommendations to enhance the security practices of the client's organization. Our assessment framework enables continuous evaluation and provides strategic insights to guide transformation initiatives.

  • Cybersecurity Training and Workshop

    UPTIME LABS LTD

    Uptime Labs Cybersecurity Incident Management Training and Workshops provide in-depth sessions to equip teams with skills to handle cybersecurity incidents effectively. Tailored programs include scenario-based exercises, incident response best practices, and hands-on workshops for optimal preparedness in critical situations.

  • Organisational Change Management (OCM)

    COHESIVE UK GROUP LIMITED

    Cohesive's OCM Services help clients lead their people to make the changes necessary for success, and ensure they are focused on optimal outcomes. We engage the workforce, and ensure organisations achieve a return on their investments. Focusing on the ‘What’, ‘Why’ and ‘How,’ for sustainable adoption.

  • Google Cloud Adoption, Migration and Support

    METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED

    Methods' qualified and experienced Google Cloud architects and engineers will ensure that your workloads are modernised to take advantage of Google Cloud's scalable and secure architectures to minimise your TCO and risk. We will optimise workloads and licensing to provide a secure, scalable and efficient service.

  • Cyber health check

    FULLPROXY LIMITED

    FullProxy's Cyber Security Health Check is a comprehensive assessment service designed to evaluate the security posture of your F5 and Fortinet infrastructure. This proactive approach helps organisations identify potential vulnerabilities, misconfigurations, and areas for improvement, ensuring that their F5 and Fortinet deployments are optimally configured to mitigate cyber threats.