-
FORRESTER RESEARCH LIMITED
Digital learning platform. Engage with fellow practitioners and champions in our social learning platform to share challenges and exchange ideas. Access a toolkit with templates for practical application after the course. Certification includes topics such as Customer Experience and Cyber Security (Zero Trust).
-
PANLOGIC LIMITED
As a mature and experienced hosting providers we help customers to design, build, migrate and operate secure, high-performing, resilient, and efficient clould infrastructure for their applications with designs that will scale over time. We also help customers transform and transition their service delivery approach to a cloud-native model.
-
METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED
We provide expert Product Management capabilities to deliver high-quality, user-centred services that transcend the entire product lifecycle. Our approach ensures we are continuously learning and adapting to deliver value and meet user needs. Our product managers are skilled in Agile principles, contributing to faster, more adaptive, and successful outcomes.
-
PROLIFICS
Prolifics Services to discover and protect your API attack surface
-
ELYSIANIT LIMITED
Our “Microsoft 365 – Security Baselines Implementation” is a service whereby we deploy our standard security setup to your Tenant. This has been designed to use the Microsoft Best Practices guidance. The objective of this service is to provide an accelerated deployment of security best practices to your Tenant.
-
SMARTER TECHNOLOGIES GROUP LIMITED
Delivering a unified user experience for cross party collaboration. Integration, delivery and support of complex Teams solutions, delivering productivity enhancements and cost savings by exploiting your Office365 to ensure maximum ROI and VFM. Simplify your architecture and enable collaboration for your workforce, other departments, partners and suppliers.
-
VALTECH LIMITED
Our collaborative discovery service for Customer Data Platform (CDP) strategy helps you identify the critical CDP use cases and benefits, identify the technology options and develop a roadmap for investment and implementation.
-
EBENI LIMITED
Ebeni's industry recognised Cyber Security expertise provides support to diverse systems including safety-critical environments, operational technologies and business systems. Our service has been applied across multiple sectors, supporting organisations in understanding and overcoming the challenges presented by often conflicting regulatory requirements imposed on cyber security and safety critical systems.
-
WARP TECHNOLOGIES LIMITED
Warp is a Microsoft Partner, providing a managed, end-to-end Microsoft Power Apps implementation service to deliver transformational business solutions. We provide clients with the required skills, experience and engagement to design, implement and adopt Power Platform solutions, including Power Automate, Power Apps and Power BI, to solve problems.
-
CACI LIMITED
CACI can help organisations explore the benefit of moving services to the cloud and de-risk delivery through agile prototypes and Proof of Concepts. We produce rapid prototypes across a wide range of cloud technologies. Following agile principles, we work collaboratively to help customers learn quickly at low cost.
-
COFORGE U.K. LIMITED
Intelligent process automation is application of Robotic Process Automation, NLP, OCR, Artificial Intelligence etc to automate processes. Intelligent process automation takes productivity optimisation to the next level by redefining and reassigning work. Process bots are capable of independently performing simple human-like functions such as interpreting, deciding, and learning.
-
ENVITIA LTD
Envitia's Obsolescence Management Services, supported by ITIL-certified engineers, ensures your technology stays cutting-edge. Specialising in transitioning legacy systems to contemporary solutions, we emphasise security and minimal disruption. Our strategy encompasses managing upgrades, cost reduction and security patching for customers in the defence, central government and national security domains.
-
BJSS LIMITED
Our approach to service design focusses on improving the quality of interactions with users. Working and co-designing with people to understand pain-points and user needs, we design new ways of organising people, infrastructure, and technology to deliver great customer experiences while identifying opportunities to deliver new organisational value.
-
COC00N CYBER LIMITED
Custom coc00n offers an enterprise-level cybersecurity solution tailored to meet the demands of organisations requiring high-security measures for their high-value systems and data.
Custom coc00n is built to integrate seamlessly into an organisation’s own IT environment, allowing for internal hosting and management of the cybersecurity framework.
-
Th3rd Curve Ltd
PMO and project controls are critical to providing a holistic approach to project delivery and performance. Our team will ensure your scope, time, cost, risk and commercial data and your control functions are aligned and that information and reports are available to manage and monitor delivery performance and aid decision-making.
-
PA CONSULTING SERVICES LIMITED
PA provides Cyber Security services including CREST accredited Penetration Testing. We can review the configuration of cloud provisioned elements against recommended security standards as well as best practices to provide assurance over the security of the environment and its resources. Assessments can be conducted across AWS, Azure and Google Platforms.
-
STORM (ID) LTD
A coherent Information Architecture (IA) is essential for delivery of effective and sustainable digital services (websites and intranets). An IA is developed by considering the structure and labels associated with the content, and is informed by other user research activities relating to user needs and business objectives, including content strategy.
-
Nomensa Ltd
We create seamless interaction designs, focusing on both the overall flow and individual design elements. We draw on user research, established design patterns and organisational objectives to develop and enhance prototypes and visual design components. This ensures that our outputs align with real human behaviour and Government Digital Standards.
-
ST VINCENT’S CONSULTING LTD
Assistance and guidance when transitioning between ITO providers. Trusted expertise ensures smooth transitions for enhanced healthcare IT efficiency.
-
SHIVOM CONSULTANCY LIMITED
Our Cloud-Based Artificial Intelligence (AI) Strategy Formulation service enables organisations to leverage cutting-edge AI technologies on the cloud. We provide strategic guidance for secure, scalable, and high-performing AI solutions that align with business goals, delivering powerful insights and automation.
-
MOZAIC-SERVICES LTD
A Digital Product and Service Delivery (DPSD) enabler, Mozaic’s delivery management service provides you with the confidence you need to successfully deliver user-focused digital services. Our delivery managers take responsibility and accountability for successful delivery from initial user research during delivery, through to operational handover and Live support.
-
6B DIGITAL LTD
6B create bespoke web apps and progressive web apps with a focus on user experience, performance, and integration. This service is ideal if you are struggling with a clunky, legacy experience and need to update to the cloud. We manage the whole product life-cycle from discovery to continuous improvement.
-
QA LIMITED
The courses in this listing prepare learners for expanding business presence into the cloud in a planned, controlled, secure and cost-effective manner. They learn to plan and deploy applications, create application environments on GCP, deploy GCP networking technologies, and utilise network design patterns and automated deployment using Cloud Deployment Manager.
-
NAIMURI LIMITED
Revolutionise your cloud journey with our comprehensive Cloud Solutions Suite, integrating Secure Development Platform, Virtual Desktop Infrastructure and Secure Cloud Kubernetes at the highest level of optimisation. Seamlessly blend flexibility, scalability, and cost-efficiency into your operations, unlocking unprecedented potential for innovation and growth all in a highly secure environment.
-
DIGITAL NATIVE GROUP LIMITED
At Digital Native Group we can provide teams to help organisations understand when and how to solve problems more effectively with machine learning algorithms and generative AI and help implement and support them. We provide experienced teams that are efficient building implementations against varied data sets and problem domains.
-
ACCENTURE (UK) LIMITED
Intelligent Asset Management is designed to improve-profitability, maximise performance and reduce asset related operational-risk over the entire life cycle. Our solutions transform all aspects of performance through provision of transparent, connected, and timely data and insights - Predictive Models, Condition Status and Budget Variance for the C-Suite to Work Orders.
-
ERGOS IDS Ltd
Ergo offers Azure Data & Analytics Services enabling clients to plan, architect, develop, deploy and manage Data & Analytics cloud solutions in Azure using various Azure services and products.
-
PGI - PROTECTION GROUP INTERNATIONAL LTD.
PGI is a leading provider of the government-backed Cyber Essentials certification scheme, helping hundreds of businesses across the UK to improve their processes and demonstrate a commitment to cybersecurity.
Our Information Assurance experts can assist your organisation in gaining and maintaining Cyber Essentials certification.
-
CONTRACTSONLINE LTD
We offer government customers and buyers a wide range of business and user-centric services designed to help transition to Cloud, maintain and support Cloud services and provide continuous development, including digital transformation. Our Cloud support services for Cloud Transformation Analysts, Designers and Managers are all offered Outside IR35.
-
LEONARDO UK LTD
Leonardo’s Cloud solutions are built to join diverse public and private sources securely . Solutions are optimised to support your business goals while meeting relevant compliance and security requirements. Factors such as portability and interoperability are considered to avoid vendor lock-in, ensuring the architecture can respond to future requirements.