Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

19531 results found

19531 results found in Lot 3: Cloud Support in the category Security services

  • Physical Security & Social Engineering

    NTA Monitor Ltd.

    NTA Monitor's Physical Security & Social Engineering services are assessments designed to examine what security vulnerabilities exist, such as weak staff security awareness (e.g. phishing, email scams), physical or procedural controls that may allow unauthorised access to corporate information, either directly or via the IT systems that hold this data.

  • Strategy Development Consulting - Strategic Planning

    6BYTHREE DIGITAL LTD

    Strategic Planning: Consultants assist organisations in developing comprehensive strategic plans to evolve organisational capabilities that align with their mission, vision, and objectives. This involves conducting in-depth analyses of internal and external factors, identifying strategic priorities, organisational capability requirements and defining actionable strategies to achieve long-term goals.

  • Security Awareness and Training

    CYBER SECURITY DEFENCE CONSULTANTS LIMITED

    CSDC helps you build a secure culture with Cyber Security Training and Awareness. Our customised training programs teach users to spot and stop cyber threats like phishing and social engineering, reducing risk and therefore impact to the business. We ensure users are ready to protect and react to cyber-attacks.

  • Computacenter - Application Engineering Services

    Computacenter (UK) Ltd

    The service delivers a full stack of custom software development capabilities for web, desktop, cloud and mobile while allowing for scalability and agility through each development cycle. The service is targeted at developing applications in a secure manner via an end to end approach or through customer team augmentation.

  • Wifi penetration testing

    iSTORM

    iSTORM provides CREST accredited Penetration Testing of Web Applications, infrastructure, networks and Wifi. All iSTORM pentesting consultants are highly accredited and seasoned professionals. All tests are scoped to focus on the risks & vulnerabilities faced, with real-time reporting through our inhouse portal iRiS. Visit www.istormsolutions.co.uk for further information.

  • Beta

    KAINOS SOFTWARE LIMITED

    Kainos is a leading service provider of cloud-based Digital Services across the UK Public Sector. We have developed a robust Delivery Framework that underpins our successful service deliveries. We deliver successful Beta phases that are cost-effective, deliver end-to-end services, iterate based on user needs, reduce risk, and deliver value early.

  • Vulnerability Assessments

    CYFOR

    CYFOR Secure Vulnerability Assessment service provides comprehensive scanning of IT systems to identify and evaluate security weaknesses. Utilising cutting-edge technology, we deliver detailed insights and remediation strategies, helping organisations strengthen their defenses against cyber threats and maintain compliance with industry standards.

  • Secure Software Development Lifecycle

    KPMG LLP

    The Secure Software Development Life Cycle (SSDLC) is a systematic approach to building software that incorporates security considerations throughout the entire development process. It aims to proactively identify and mitigate security vulnerabilities, resulting in more secure and reliable software. KPMG offer full services throughout the planning and implementation stages.

  • Management and Operations for Microsoft Azure

    HYPER TALENT SOLUTIONS LTD

    HTS is a professional service provider of Hybrid Cloud solutions.We offer a wide range of services using Azure across IaaS and PaaS solutions within Microsoft Azure combining on premise hardware with Azure cloud services. From end to end the application of supervised,unsupervised and reinforcement learning,we provide intelligent Azure Machine-Learning solutions.

  • Technical Project Management

    I3WORKS LTD

    Technical Project Management is one of the high-quality services that i3Works offers. We provide Technical Project Management at all levels, from lead to support. Our experience of Technical Project Management and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.

  • Cloud Research — Gartner Executive Programs v2 Extended Team: Guided CISO Team Member (EXPV2E5)

    GARTNER U.K. LIMITED

    Executive Programs v2 Extended Team: Guided CISO Team is designed for individuals who typically support the senior most security and risk management leaders in the client company, usually the Chief Information Security Officer (“CISO”). The service provides an ongoing advisory relationship with Gartner, supported by a service delivery team.

  • Drupal, PHP CMS development, deployment and support

    READING ROOM DIGITAL LIMITED

    Our Drupal consultancy services support organisations in the implementation of cloud-hosted Drupal systems and maximise the benefit they get from the Drupal platform. Our extensive Drupal experience ranges from small campaign sites to major government departments. We have two Drupal Grand Master Certified developers as lead engineers.

  • High performing team development

    SOPRA STERIA LIMITED

    Sopra Steria Next puts people at the heart of cloud transformation with organisational change to shape, co-create and deliver positive outcomes. We provide group dynamics coaching that goes well beyond traditional team building by addressing the relational issues that hold teams back enabling improved outcomes.

  • Marketing Cloud Optimisation

    CREDERA LIMITED

    Credera's subject matter experts optimise each channel, ensuring all activity results in quantifiable business outcomes. Our thought leaders identify the most relevant and beneficial trends. Credera can streamline data from your marketing cloud into a single source of truth; providing you with the reporting to assess tangible progress.

  • Analytics

    SOFTSERVE SYSTEMS LTD

    SoftServe's Analytics Services empower businesses to harness the full potential of their data, enabling data-driven decision-making and strategic insights. Leveraging cutting-edge technologies and strategic partnerships, we deliver comprehensive analytics solutions tailored to meet specific business needs.

  • Cisco Meraki

    Creative Networks

    Cisco Meraki provides cloud-managed networking and security solutions for businesses. Offering wireless access points, switches, security appliances, and mobile device management tools, all centrally managed through a user-friendly dashboard, Meraki delivers simplicity, scalability, and enhanced security for organisations of all sizes.

  • Microsoft Azure

    AMEY OWR LIMITED

    Unlocking the power of Microsoft Azure: seamless data analytics and reporting. Amey provides delivery of services through Microsoft's Azure data platform. We work with you to provide data analytics and reporting through this cloud-based platform. Amey’s Azure services empower your data journey – efficient, secure, and future-ready.

  • Cloud Migration

    SCOTT LOGIC LIMITED

    If you’re just starting your journey towards the cloud, our vendor-agnostic consultants can help you find the right public, private or hybrid cloud solution for your business. We can build a roadmap that provides a safe and reliable migration from on-premises, monolithic systems, to cloud-based solutions leveraging modern architecture patterns.

  • ITIL 4 Service management practices - Incident Management

    I3WORKS LTD

    ITIL 4 Service management practices - Incident Management is one of the high-quality services that i3Works offers. We provide ITIL 4 Service management practices - Incident Management practitioners at all levels. Our experience of ITIL 4 Service management practices - Incident Management has been demonstrated across numerous government clients.

  • Business Process Modelling (BPM)

    I3WORKS LTD

    Business Process Modelling (BPM) is one of the high-quality services that i3Works offers. We provide Business Process Modelling (BPM) practitioners at all levels, from lead to support. Our experience of Business Process Modelling (BPM) and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.

  • Fraud Data Matching Services

    VE3 GLOBAL LTD

    VE3's Fraud Data Matching Services offer sophisticated solutions for detecting and preventing fraudulent activities by matching and analyzing data from various sources. Leveraging advanced algorithms and technologies, VE3 enables organizations to identify suspicious patterns and anomalies, minimizing financial losses and reputational damage.

  • Microsoft Teams Deployment

    CGI IT UK LIMITED

    CGI's Microsoft Teams Deployment service helps organisations in deploying and optimising Microsoft Teams to meet specific collaboration and communication needs. As a leading public sector provider of Microsoft expertise, CGI can enable your organisation to maximise the potential of Microsoft Teams for Collaboration and Communication.

  • AWS Landing Zone Accelerator (LZA)

    Identity E2E

    Our Landing Zone Accelerator service, powered by Jezero, deploys a license-free, enterprise-ready AWS Landing Zone Accelerator-based platform, meeting national security and global compliance standards, deployed within a day. Our certified professionals automate provisioning and DevOps, including cost management, security, identity, governance, and policies. Modular architecture ensures swift customisation and deployment.

  • Solution Implementation, Refresh and Update

    APACHE IX LIMITED

    Our agile and flexible client-side support services help you acquire and implement new and innovative capabilities into your organisations to enable and manage business change and transformation. Our clients include MOD, Defence Digital, Dstl, and Other Government Departments across the ICT, Cyber, Defence Intelligence (DI), Multi-Int, GeoInt, and ISR domains.

  • Cloud Support

    INTUITY COMMUNICATIONS LIMITED

    Professional services covering design, installation, pre and post sales support and end user training for the 8X8 UCaaS and CCaaS solutions.

  • Accenture Cloud Security Assessment Services

    ACCENTURE (UK) LIMITED

    Our cloud security assessment analyses cloud systems from multiple perspectives, employing a largely manual approach to auditing cloud implementations. Using a range of techniques dependent on the hosting provider, instance type and service running, our methodology aligns with industry best practices and is supplemented by research into misconfigurations and weaknesses.

  • DXC Technology Design Authority Services

    ENTSERV UK LIMITED

    A Design Authority is a standalone or integrated highly experienced team responsible for maintaining the integrity of programme objectives and alignment of solutions (designs) to programme level requirements through the effective implementation of collaborative assurance and guidance. The agile services structure can be adapted and tailored for any programme design.

  • Transition Management

    BMT LIMITED

    BMT provides transition management, continuity planning, intelligent customer capability and resource planning. Experienced in industry best practice e.g. MSP, ITIL v3, Agile, PRINCE2, ISO15288 and TOGAF to ensure that ICT transformation solutions are effectively implemented and transitioned to business as usual, collaboratively realising benefits aligned to organisational strategy.

  • Atlassian (Inc. Jira and Confluence) Migration to Cloud (Inc. AWS, Azure and GCP)

    DAEMON SOLUTIONS LIMITED

    End-to-end service to migrate existing Atlassian services onto a new or existing cloud Infrastructure. Daemon is an AWS, Azure, GCP and Atlassian partner that utilises its vast expertise in cloud migrations, DevOps and automation to deliver seamless Atlassian migrations onto cloud.

  • Security - Governance, Risk and Compliance (GRC)

    Identity E2E

    Our Security Architecture and Cyber Security Services build on IdentityE2E’s experience in delivering enterprise scale UK Critical National Infrastructure. Our services, based on Security Architecture standards and secure DevSecOps principles, address end-to-end security requirements to securely develop/migrate services to cloud while automating compliance and assurance functions of cloud workloads.