-
METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED
Simon Wardley’s modern approach to value-chain mapping is an innovative method to give situational awareness and show strategic opportunity. Mapping capabilities to their evolution from genesis to commodity provides insight into duplication and inefficiency, as well as highlighting opportunities for organisational development and cloud/technological change.
-
KONSOLUTE
Gain confidence in your Microsoft Cloud infrastructure with Konsolute's expert support. From first-line troubleshooting to advanced issue resolution, our Microsoft-certified team ensures operational excellence, aligning with government standards to enhance performance, security, and cost-efficiency, while providing the guidance necessary for continued compliance and innovation.
-
ACTICA CONSULTING LIMITED
Actica provide support to meet the challenges of an increasingly complex mix of cloud and non-cloud services and how they interrelate and integrate, coupled with strong service integration, management and governance functions – all undertaken within the context of increasing headcount pressure, growing user expectation and increasingly dynamic, evergreen environment.
-
CLOUD NATIVE LTD
Single Sign-on accessible cloud hosted business services.
Cloud Native technical expertise are able to deploy architecture and services which integrate seamlessly with the buyers existing user directory.
Utilising middleware components from industry leading vendors such as Oracle, Microsoft, Apache, Tomcat etc
-
WIPRO IT SERVICES UK SOCIETAS
Wipro's Critical Incident Response Retainer offers immediate, specialised support for organisations during cybersecurity incidents. This service is grounded in rapid mobilisation, in-depth incident management, and a proactive defence philosophy, ensuring clients are equipped to address and mitigate cyber incidents efficiently, we provide a strategic advantage in the digital threat landscape.
-
LAYER 7 LIMITED
We develop and implement QA strategies for QA testing, including embedding QA testing capabilities within delivery teams to enhance the software development lifecycle (SDLC). Our approach leverages cloud-based tools and a variety of QA testing methodologies such as unit, integration, smoke, accessibility, performance, and security testing.
-
METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED
As the leading Salesforce Lightning CRM/CMS implementation partner for UK public sector, Methods specialise in Lightning CRM/CMS Service and Sales cloud consultancy.
Our experienced developers, admins, consultants, BA and architects deploy Sales, Service and Marketing Cloud solutions that precisely align with clients' business/operational requirements, ensuring operational efficiency and seamless functionality.
-
I3WORKS LTD
Benefits Management is one of the high-quality services that i3Works offers. We provide Benefits Management at all levels, from lead to support. Our experience of Benefits Management and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.
-
SALUS DIGITAL SECURITY LIMITED
Salus Cyber provides a consultancy presence from our Senior Team to identify areas of weakness in the operational and technical space. Our Senior Team will work with your organisation to ensure observations can be translated into a shift in strategy that will directly improve the cyber security maturity.
-
inavate
Inavate provides a full range of ISO27001 services, from conducting gap and readiness assessments, conducting auditing, training through to full implementation and ongoing maintenance ,
-
GUTTERIDGE HASKINS & DAVEY LIMITED
GHD develops sustainable, scalable and secure cloud platforms by delivering robust roadmaps and implementation plans designed for your organisation's needs and strategic goals. We cover a full range of services from deployment of new applications to full legacy system migrations, designing in accordance with best practice for low risk releases.
-
PERICULO LIMITED
Our NHS DSPT Audit service helps IT organisations ensure full compliance with the latest NHS requirements.
We provide an independent assessment of an organisations NHS Data Security and Protection Toolkit.
Our expert external audits are aligned with the latest DSPT Independent Assessment Guide.
-
RAYTHEON SYSTEMS LIMITED
Our comprehensive cloud support service provides our clients with the support and confidence they need to manage their applications and data in the cloud. We offer state of the art support services and tools to allow our clients to continuously monitor their cloud infrastructure, applications, and data using SRE principles.
-
MONDAS CONSULTING LTD
Our ISO27001 Certified Crowdstrike 24x7 Managed Detection and Response service utilises the power of the Crowdstrike Falcon Endpoint Detection and Response EDR tool to protect your endpoints from Cyber Security threats. Our UK based SecOps team monitors the Crowdstrike EDR for signs of malicious activity on your network.
-
COGNIZANT WORLDWIDE LIMITED
The implementation of predictive and prescriptive analytics to provide better insights into population health.
-
CODA Security Limited
A range of services focused on providing assurance of operational technology and industrial control system components. This includes governance auditing, targeting assessment and testing of OT and ICS components, review of segregation and application of Purdue model principles.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions offers Salesforce Custom Report Development services, enabling government departments to generate tailored reports that meet their specific needs. Our expertise in custom report development provides deep insights, facilitates data-driven decision-making, and enhances transparency and accountability in the public sector.
-
SUNRISE TECHNOLOGIES LIMITED
At Sunrise Technologies, we don't consider us just a typical "IT Support Company". The role of a Management Support Package has evolved to one that provides an all-encompassing solution covering 3 key areas:
- Support
- Security and Risk Management
- Guidance and strategy through continuous improvement.
-
Leicestershire Health Informatics Service
LHIS CSS can facilitate desktop exercises which simulate an example of a potentially substantial cyber attack. Over twenty scenarios are available including ransomware attack, supply chain compromise, insider threat, home and remote working, etc.
The exercises are designed to establish your state of readiness for major cyber security events.
-
e3 media ltd t/a Great State
User research at Great State aligns with Government Digital Service (GDS) principles and can encompass rapid or comprehensive approaches. With extensive experience, we conduct interviews, surveys, and deep analysis to understand user needs. This informs agile product development, ensuring solutions are both user-centric and efficient.
-
Home Connections
Our online form builder excels in crafting bespoke electronic form solutions. We provide an extensive range of template eForms/e-Forms and Calculators for sectors like Revenues, Housing, Environmental Health. Our eForms/e-Forms feature meticulous design, corporate branding alignment, in-form intelligence, and seamless integration with PDF/XML export, evidence capture, and payment functions.
-
Next Ventures limited
Our DevOps consultancy can deliver all the benefits this continuous integration, continuous delivery approach. Reduce complexity and shorten development cycles resulting in cost savings with higher quality. We have DevOps experience across AWS, Azure and G-Cloud deployments.
-
INET
We develop web based applications following GDS guidelines , we have dedicated resources in fullstack(angular/react), wordpress. CMS, Mogento, opensource, all our developments comes with complimentary mobile app, quick delivery and provide high security
-
Wavenet
Microsoft Defender for Identity is a cloud-based solution that detects, investigates advanced threats and compromised identities. Monitoring user behavior, protects identities in AD, and provides clear incident information. DfI can be installed and monitored within the CyberGuard SOC if included in subscriptions like EMS or Microsoft 365 Enterprise.
-
TRUSTMARQUE SOLUTIONS LIMITED
Complete, proactive approach to enhance your current security and safeguard critical data and systems. Significant reduction in the likelihood and impact of potential security incidents. The engagement is vendor-agnostic and evidence-led, designed to help you translate your current compliance and cyber security posture into a universal risk register.
-
adappt
For larger scale transition projects, that feature planning, setup, migration, security services, ongoing support and more. Adappt's high level software architects have an enviable track record at Govt and NGO level. that helps in designing world class solutions.
-
Node4 Ltd
Application Solutions Architecture Strategy & Design service crafts bespoke strategies for enhancing and modernising business applications. Focusing on current and future organisational needs, it ensures optimal application performance through a deep understanding of unique challenges and requirements, thereby delivering tailored, effective application solutions.
-
CAPGEMINI UK PLC
The service provides frameworks for constructing systems and organisations securely, based on business and Cloud adoption needs. Security architecture can be aligned to frameworks such as TOGAF, and structured into context (why an organisation needs to be secure), and concept (what security is needed in terms of policies or services).
-
SOFTCAT PLC
Softcat’s Azure Adoption Accelerator Service is designed to provide an environment built to the Centre of Internet Security (CIS) Microsoft Azure Foundations Security Benchmark, and deployment into Microsoft Azure via Softcat’s CSP programme.
-
Made Tech Ltd
Digital Transformation is one of several high-quality services delivered by Made Tech. Our digital transformation service delivers innovative transformation solutions by a team of highly experienced and qualified digital transformation professionals, who will guide your digital transformation projects/programmes from initial concept through to final implementation.