-
POINTWIRE LIMITED
The Security Baseline Service is an assessment that reviews your organisations security baseline and provides recommendations on how to improve maturity within your cyber estate using solutions such as Corelight, Tanium, Deep Instinct, Crowdstrike, Keeper and Titania.
-
ABCONSULTANCY SERVICES LTD
Our Power Platform Cloud Transition and Integration service migrates on-premise Business Intelligence and Analytics solutions to hybrid or full cloud platforms using the Power Platform suite, including Power BI, PowerApps, Power Automate/Flow. We provide comprehensive support throughout the entire transition process, integrating Power Platform solutions with SharePoint and other systems.
-
ST-FOUR LIMITED
Centralised management, remote control, application deployment, auditing, registry changes of your Windows and Mac OSX devices. Novell, OpenText, Microsoft, ZENworks, Liquit, SCCM, MECM, Intune.
-
CMC PARTNERSHIP CONSULTANCY LTD
Our requirement analysis service develops requirements into clear, organised, well-documented requirements that take the project forward. We check for duplicates, evaluate feasibility and remove conflicts. We ensure requirements clear, concise, consistent, relevant, unambiguous, correct, testable and solution agnostic. We guide implementation, strengthening processes to implement change and improve organisational efficiency.
-
Brightman
Brightman’s Target Operating Model Service helps organisations adopting cloud to reap the benefits of vision, strategy and synergies between departments. A comprehensive implementation plan, aligning operational capabilities and strategic objectives provides an overview of core business capabilities, drivers, strategic and operational levers, organisational and functional structure, technology and information resources.
-
EVOLVE COMMERCIAL LIMITED
Evolve offers consultancy expertise in cloud, digital and cyber procurement commissioning and support including commercial, advisory and contract management services across Nuclear and the wider Public Sector. We provide end-to-end procurement support services using a hands-on and pragmatic approach, combining flexibility, commercial acumen, and value for money.
-
BANGURA SOLUTIONS LIMITED
Bangura Solutions Azure DevOps and Cloud-based solutions service deliver cost effective ways to maintain cloud software and hosting services. We can supply current DV & SC security cleared capability to deliver Outcomes, Statements of Work (SoW) packages or Time and Material packages.
-
CODA TECHNOLOGY SERVICES LTD
CODA helps organisations plan, design and deliver resilient cloud and digital based services. We transform, develop business/IT strategy and roadmaps, establish integration capabilities, and create a technology blueprint enabling successful transition to cloud and platform based capabilities. CODA provides SME's to deliver successful Cloud and digital services (Technology agnostic approach).
-
CYBEXER (UK) LTD
Cyber exercise design consultancy provides expert guidance ensuring that training exercise objectives and outcomes align with the business strategy. This includes development of learning objectives, success indicators, and scenario support. Consultants work with clients to identify and contextualise cost effective training solutions to enhance learning outcomes and optimise employee development.
-
MOZAIC-SERVICES LTD
A Mozaic Cloud Service, accelerating digital excellence by streamlining and integrating disparate legacy, hybrid and new systems, unifying your digital landscape for efficiency and coherence. Our structured approach to consolidation and automation support a transition to a microservice design that can scale and adapt to meet changing business requirements
-
JADU CREATIVE LIMITED
Jadu's Digital Platform Professional Developer Service Bundle is a comprehensive subscription which empowers developers to enhance and extend Jadu platform capabilities. Gain access to developer training materials, a Jadu Central Docker environment, consultancy with experienced developers, and the Jadu Central SDK library. Innovate using Jadu, with expert support.
-
CODA SECURITY LIMITED
A broad range of activities intended to determine the degree to which an organisation, system, or information asset is exposed to potential compromise, the impact of such a compromise, and the likelihood of it occurring, through primarily technical means.
This supports risk management by providing objective risk information.
-
I3WORKS LTD
IT Project Management is one of the high-quality services that i3Works offers. We provide IT Project Management at all levels, from lead to support. Our experience of IT Project Management and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.
-
eXceeding Limited
eXceeding's Project Management Consultancy will help with the management of the development of tender documents, including contracts, PQQ and evaluation strategy to support invitation to tender (ITT).
-
INTELOGY LIMITED
Enhance productivity by migrating email, SharePoint and File Share content to the Microsoft Cloud. Intelogy has over 20 years experience of migrating data securely and can make sure you get the best return on your cloud investment. This a proven and complete migration project life-cycle service.
-
ACCENTURE (UK) LIMITED
Journey to Cloud is an end-to-end service that offers Cloud strategy to meet your business objectives through designing target-state architecture, analysing your existing IT landscape and migrating your application portfolio to a modern cloud infrastructure. It will bring robustness, scalability and flexibility to your IT landscape at a reduced cost.
-
HYPER TALENT SOLUTIONS LTD
HTS offer comprehensive data integration design and delivery services at an enterprise scale and performance. Designed to help customers to ‘spring-clean’ data and reap rewards from their platforms, addressing causes for degradation of customer data their CRM systems manage and run through every day.
-
BIP CONSULTING UK LIMITED
BIP helps organisations create and refresh digital/ICT strategies to ensure they're at the forefront of the digital challenge, so they provide high quality, resilient and performant IT services and provide technology functions that provides value for money, giving every customer; officers, staff or public, improved customer and technology experience.
-
The Virtual Forge Limited
The Helpdesk is used as a means of underpinning the products and services of The Virtual Forge with a stable, resilient support structure to ensure any issues experienced by customers are handled swiftly. We provide the full range of cloud services for consultancy, security, DevOps with AWS and Azure support.
-
ARKE LTD
Our Policy Analysis service assesses the likely impact of new or changed policies against their intended goals. Our service considers policies against the wide ranging, potentially messy and complex impacts on the real-world systems to which they relate.
-
GSA CYBER SECURE LIMITED
GSA Cyber Secure provides both point-in-time assessment and testing, and continuing managed vulnerability management and testing services. This includes penetration testing, cloud security posture assessments, ITHCs, web and mobile security assessments, infrastructure assessments, configuration reviews, host and build reviews and security architecture reviews.
-
COFORGE U.K. LIMITED
Coforge offers functional testing services to verify and validate application functionality. Our focus is on validating individual businesses and end-to-end verification across all the business areas, integrating both digital and non-digital businesses. We enable quick and continuous functional testing by adopting the latest testing techniques and tools.
-
AKKODIS UK LIMITED
Modis (Akkodis) will review your organisation's operational, commercial and delivery performance and measure against best practice outlined in relevant frameworks such as ITIL, TOGAF and COBIT
-
Deeper Than Blue Ltd
DeeperThanBlue have decades of integration experience and building robust APIs.
We are ready to leverage existing vendor offerings, or develop bespoke solutions utilising HTTP, SOAP, REST, JSON, GraphQL and SpringBoot micro services or develop hybrid solutions.
We’re experienced in a range of middleware solutions-services to provide that “complete” integration experience.
-
THALES UK LIMITED
Thales SOCaaS provides 24/7 monitoring, threat detection, incident reporting, and compliance support. Benefit from expert-driven security monitoring without an in-house SOC. Our solutions cater to remote or client-side SIEM management, leveraging Thales global threat intelligence for effective threat detection and incident reporting.
-
4C STRATEGIES LIMITED
Our Cloud Mobile Learning Project Management service is for organisations that require an experienced Project Manager to deliver a transition to cloud services.
-
NEC SOFTWARE SOLUTIONS UK LIMITED
Our legacy transformation services enhance public sector software solutions by assessing and optimising their architecture for cloud readiness. We refine UI/UX, develop CI/CD pipelines, refactor, and containerise applications, and manage data migration. The service ensures reliable, secure, and scalable software with efficient deployment, reduced hosting costs, and robust 24/7 support.
-
COMXPS LTD
Our Cloud project financial strategy service includes: planning and review, cost analysis, compliance, risk mitigation and financial and operating models We create a unique financial vision, strategy and policy.. Our experienced Cloud Financial Experts hold qualifications in CCAB,ACCA, CIPFA, ICAEW, ICAT, CIMA, AAT, CPMS, ORACLE, P2P, SAGE, Quickbooks, Xero.
-
FUTURE ARC SERVICES LIMITED
Part of any large change is an understanding of your existing operating model and structures. Our team of experts and analysts will work with you to assess your existing organisations operating model so that a strong baseline for change can be established.
-
SALUS DIGITAL SECURITY LIMITED
Salus Cyber consultants will not simply run malware on your system and tell you that "you're vulnerable", this is cutting-edge custom payloads and attack vectors written as threat actors without the malice element. Ransomware remains a significant threat to an organisation, both from external attacks or supply chain attacks