-
GARTNER U.K. LIMITED
Gartner for Chief Procurement Officers Reference Team Member is a membership-based service that provides access to Gartner research and experts to help Chief Procurement Officers and their teams execute against critical priorities.
-
AMEY OWR LIMITED
Amey’s business architecture services align your strategy with execution. We leverage our extensive industry experience to explore opportunities across organisation, people, process, technology and data to provide insights for optimising delivery and achieving your business objectives. Our iterative approach encompasses discovery, user-journey mapping, operating model and service design.
-
SANDERSON GOVERNMENT AND DEFENCE LIMITED
Providing solutions to Cloud based problems utilising best of breed resources supporting an aspirant cloud-native buyer ecosystem. Covering all public cloud service and deployment models, (SaaS, PaaS, IaaS) at Official, Secret or above; able to deploy to private, community and hybrid clouds covering: Agility, Performance, Value, Security, Usability and Compliance.
-
ACCORDANT SOLUTIONS LIMITED
Adoption of Cyber Security in the Cloud.
Consulting, Design, Configuration and Managed Services for Security on AWS, Azure, Google Cloud Platform and Oracle OCI. This encompasses both native and 3rd Party toolsets. We also help with Cloud Security framework adoption including ISO27017 and CCA CCM
-
ACCENTURE (UK) LIMITED
Accenture delivers capabilities and innovative solutions using IBM Technologies to modernise an organisation’s technology. We assist with defining the strategy, designing, delivering and supporting solutions based on IBM products and bring a wealth of knowledge, methodologies and accelerators to the project with IBM Cloud Accenture owned environments where cocreate innovations.
-
MICROSOFT LIMITED
Microsoft Cloud Application Assessment provides an assessment of a LoB application portfolio to determine which applications are a good fit for migration to Microsoft Azure. The Cloud Application Assessment is available in various sizes, from a 2 week assessment for 6 apps to 10 weeks for 650 apps, and onwards.
-
CGI IT UK LIMITED
We offer a broad range of IAM consulting and implementation services, which are tailored to meet the needs of modern enterprises across all industries. We work with organisations at different levels of IAM maturity and with various budgetary constraints.
-
ACCENTURE (UK) LIMITED
Data Assurance Services ensure quality and compliance across vast semi-structured datasets with cutting-edge technology. Using our JSON-first profiler, we provide real-time profiling, anomaly detection, and rule compliance at a petabyte scale in AWS. Ideal for complex data volumes, our service delivers comprehensive monitoring and assurance for data accuracy and reliability.
-
Resillion
The assessment is typically prioritised on a risk basis, where testing is concentrated on functions perceived by the tester as posing the highest potential for direct or indirect loss or damage within the overall time cap of the test.
-
BARINGA PARTNERS LLP
At Baringa, our Cloud Optimisation Advisory and Assurance services enhance the realisation of benefits for our clients’ cloud solutions. Through the identification and realisation of improvements across cost optimisation, vendor management, and cloud operating models, Baringa provides independent advisory and assurance services to ensure maximum benefits realisation from cloud services.
-
BROVANTURE LIMITED
Based on Brovanture’s extensive knowledge and expertise of Oracle Cloud EPM this transformative system review process pinpoints the root causes of a client’s current Oracle Cloud EPM system challenges. The comprehensive assessment is designed to optimize user experience and unlock value and performance from the client’s Oracle Cloud EPM investment.
-
LEIDOS INNOVATIONS UK LTD
Check (ITHC) services in line with NCSC (formerly CESG) requirements through partnership with trusted suppliers holding CHECK, CREST and PCI DSS accreditation. Leidos provides analysis of systems and networks to identify vulnerabilities, provide daily management throughout the engagement and detailed reporting with remediation actions upon completion.
-
DEECON CONSULTING LIMITED
Deecon works alongside you to evaluate programme performance, ensuring that every step is optimised to deliver exceptional value for money (VfM). Our service will help you review and understand where you are getting VfM and where improvements could be made. We analyse anything from individual services to entire organisations.
-
Atech Support Ltd
Atech's Microsoft Cloud expertise provides businesses with the skills, knowledge, and experience to accelerate their digital transformation. ISO27001 accredited and a Microsoft Copilot Launch partner, enabling our clients to maximise their Microsoft investments through cloud optimisation and utilise our experienced Copilot adoption process, unique to every organisation
-
INTELLIGENT CONSULTING SERVICES LIMITED
At ICS Ltd, we pride ourselves on being able to deliver a broad range of standard and bespoke training for organisations. Our consultants have considerable experience and expertise in developing and delivering training on Information Assurance and underlying technologies for both Government and commercial customers.
-
MFDC LTD
Our Target Operating Model (TOM) and Organisational Design expertise has a proven success record in both public and private sectors. Our skills drive organizational transformation, operational optimization, and alignment, boosting efficiency, enhancing customer-focused services, and improving financial health.
-
CIVIC COMPUTING LIMITED
Engage your stakeholders in the design and development of your website/app through our interactive co-design workshops. CIVIC will work with you to design activities that define business and user objectives through our collaborative sessions. You’ll leave with an aligned team and clear goals for the project.
-
SOPRA STERIA LIMITED
Vulnerability Management is the ongoing, regular process of identifying, assessing, reporting, managing and remediating cyber vulnerabilities across endpoints, workloads, and systems. Our security team will leverage a vulnerability management tool to detect vulnerabilities and utilise robust processes to assess, prioritise and remediate them.
-
NCC Group Security Services Limited
Compromise assessments and threat hunting - In an increasingly regulated world, cyber-attacks cause business impacts far wider than the IT team.
Our threat hunting services are designed to find any evidence a compromise has occurred, whilst also providing practical recommendations for security improvements, preventing a wide variety of potential incidents.
-
LOGICALIS UK LIMITED
The Logicalis P5G service is a mobile network service built on cloud hosted control services. This provides customers with their own secure private network, using industry standard components, delivering low latency high bandwidth connectivity to meet a range of use cases, including IoT, Campus safety, research environments and healthcare operations.
-
ACCENTURE (UK) LIMITED
Accenture’s Programme Management and Project Governance Service facilitates the shaping, planning and delivery of complex cloud transformation within a discreet project or wider transformation portfolio. Our industry-proven tools and data-driven metrics cover mobilisation, benefits realisation and tracking, agile delivery management, scope prioritisation, transformation governance, change impacting, programme review, and recovery.
-
MOZAIC-SERVICES LTD
A Digital Service Management (DSM) enabler, this service defines and builds a strong CMDB Service Architecture. It provides the construct for the businesses and users that consume IT services, services delivered to the business, links between IT services, their providers, service agreements and discovery tools; ensuring currency of IT assets.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions designs Showback and Chargeback Models for government departments, enabling transparent cost allocation and accountability. Through customizable models, we allocate cloud expenses to specific users or departments, fostering awareness of resource usage and incentivizing cost-efficient behavior. Our solutions promote transparency, accountability, and optimal resource utilization.
-
Node4 Ltd
AI Services Analysis & Strategy evaluates an organisation's existing AI utilisation, offering a strategic roadmap to enhance maturity levels using Azure's AI capabilities. This service aims to improve business performance and insight generation, tailoring AI solutions to meet specific organisational needs and future-proof their technological landscape.
-
SIMPSON ASSOCIATES INFORMATION SERVICES LIMITED
Simpson Associates offer Power BI services to assist in a range of scenarios, from planning through to full delivery of Power BI based solutions for Social Housing, Police, Ambulance, Fire, Local & Regional Government and Central Government, Higher Education, NHS.
-
MTI TECHNOLOGY LIMITED
MTI provides a complete ISO27001:2022 Security Assessment and Gap Analysis Service. This assists an organisation in preparing for the ISO27001 certification audit by reviewing current security policies/processes against the certification requirements defined in ISO27001. Recommendations and guidance on areas requiring improvement are provided. Followed by the formal accreditation audit.
-
SOTA SOLUTIONS LIMITED
Our dedicated Service Desk of experienced engineers provide remote, onsite and 24/7 support services with rapid response times and strict service level agreements (SLA), to ensure a guaranteed response and a high level of customer service. All major services and components are proactively monitored to ensure minimal disruption or downtime.
-
KAINOS SOFTWARE LIMITED
From end-to-end service design and user research, to prototyping and visual design, we offer the full range of skills and expertise needed to build and deliver GDS aligned, engaging, and inclusive digital products and services that meet customer, user and business needs.
-
DEFENCE DATASEC LTD
Our cyber-security Audit-Service provides an independent and in-depth assessment of the ability of an organisation to protect its information-assets from the impact of cyber-threats.The cyber-security audit aims to establish and validate the effectiveness of cyber-security measures.It also identifies-vulnerabilities in an IT-system and matches them to potential internal and external cyber-threats.
-
REPLY LIMITED
Discover unparalleled connectivity with Cisco Meraki SD-WAN managed services. Our comprehensive package includes expert design, implementation, optimisation, and support. Elevate your network's efficiency and reliability. Choose our Cisco Meraki services for a transformative networking solution tailored to your business needs.