Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

19454 results found

19454 results found in Lot 3: Cloud Support in the category Security services

  • Privacy Compliance Reviews, Assessments and Audits

    FORVIS MAZARS LLP

    Our privacy compliance reviews, assessments and audits enable clients to understand the status of compliance with local and global privacy legislation like GDPR, UK DPA2018, PECR and the ePrivacy Directive to mention a few. We provide assurance on your compliance programme and suggest tailored guidance to move you towards compliance.

  • UI, UX and Design Services

    BIG BLUE DOOR LIMITED

    We specialise in designing creative, user-centered websites. Our experienced designers and UX specialists will translate your ideas into storyboards, flat designs and clickable wireframes, and our interactive testing process will ensure the final product meets all of your requirements whilst visually engages your audience on all devices.

  • NetApp: Data Discovery and Cloud Readiness

    CGI IT UK LIMITED

    A NetApp global alliance partner, offering a full spectrum of services supporting the whole lifecycle of NetApp ownership. Data Discovery and Cloud Readiness deploys NetApp's IP to map and classify client data, helping clients on their cloud journey whilst reducing security and compliance risk and decreasing their storage costs.

  • Usability Testing/ User Testing

    METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED

    Methods is well experienced in usability testing and see it as a key part of any user-centred development process. We test prototypes with users, gather feedback, identify areas for improvement and re-iterate designs to meet user’s needs. We test functionality and understanding of prototypes to design the best possible solutions.

  • On-going Support

    CHARKOS UK LTD

    We provide a full range of cloud-hosted software on-going support services, including extensive service support for electronic patient record systems programmes, ensuring that post-live upgrades and fixes of application software is undertaken according to agreed post-live objectives and design principles.

  • Cyber Security Strategy

    CIO-OFFICE LLP

    CIO-OFFICE creates cyber security strategies proportionate to mission critical priorities, available budget and threat faced. Includes discovery and assessment process to understand the as-is security posture and business context. Provides a robust and achievable cyber security strategy and roadmap aligned to risk appetite and available budget.

  • Strategy Development

    CLOUD 21 LIMITED

    Cloud21 offer proven consultancy expertise in the co-creation of your digitally enabled transformation strategy, working with clinical, non-clinical and digital leaders and other staff groups, we help create a digital strategy which is fully aligned with your organisational/clinical strategy, objectives, organisational and financial requirements as well as risk appetite.

  • Cyber Social Engineering (CybSE)

    PEN TEST PARTNERS LLP

    Cyber Social Engineering uses electronic means, such as email (Phishing), telephony (Smishing & Vishing), or other methods to contact and influence targets. Our services allow organisations to test technology, people and processes and establish if they can be persuaded to disclose sensitive information, credentials or facilitate remote access into networks.

  • Kubernetes Platform Support

    APPVIA LTD

    We build and manage private/public Kubernetes based platforms to service all the applications across your business, enabling your team to focus on delivering results with the tools they need to support them. We’re active contributors to the Kops project because it’s important to stay on top of every new development.

  • Stone Penetration Testing

    Stone Technologies Limited Trading as Converge Technology Solutions

    Good security practice involves regular testing of your IT infrastructure for vulnerabilities and exploitable weaknesses. Penetration Testing, also referred to as Pen Testing or ethical hacking, is an authorised attack on a network, web/mobile application, or a Wi-Fi network to find security vulnerabilities that an attacker could exploit.

  • Legacy Migration and Modernisation

    CACI Limited

    Rowe navigates legacy systems with expertise in digital transformations for large organisations and large datasets. Our process involves assessing complex data rules, developing transformation scripts for data cleansing/re-classification, and enhancing metadata for new structures. Modernising and migrating legacy IT infrastructure ensures seamless transitions and improved efficiency.

  • AWS and Azure Support

    TRANSPUTEC LIMITED

    Transputec offers comprehensive IT support for AWS and Azure cloud infrastructure, including 24/7 monitoring, support, regular patching, performance optimisation, security management, and client onboarding/offboarding processes. These services ensure high availability, security, and customer satisfaction

  • Asset Management: Enhanced Decision Support

    PA CONSULTING SERVICES LIMITED

    Asset management organisations require strategic and tactical decisions to be made to drive value from their asset base. We offer asset management decision support as a process to support organisations drive consistency in intelligent decision-making and support digital asset management software implementation and usage across infrastructure asset management organisations.

  • DXC Technology Workplace Device Management Services

    ENTSERV UK LIMITED

    DXC Technology Workplace Device Management Services offer converged device management for all devices (desktops, laptops, tablets, mobile devices), and all OS (Windows10, iOS, Android, ChromeOS). We provide full lifecycle management: procurement, provision, management, securisation, support and refresh. We can also include hardware cost, all bundled in a single monthly fee.

  • Cloud Research — Gartner for Technical Professionals Advisor Department (IT1ADVDEPT)

    GARTNER U.K. LIMITED

    Gartner for Technical Professionals complements other Gartner services, delivering indispensable insights and resources tailored to the needs of technical architects and engineers. Cloud offerings from Gartner include IaaS, PaaS, SaaS, Cloud security and IT cost optimisation through Cloud.

  • Virtual Chief Information Security Officer (vCISO)

    CYPRO CONSULTING

    Leverage the expertise of an executive-level Chief Information Security Officer without the rigidity of a full-time employee. Our Virtual CISO service provides strategic leadership that enables you to set the long-term goals that align to business objectives, establish a cyber roadmap and enable you to start immediately reducing your risk.

  • Digital Forensics

    PGI - PROTECTION GROUP INTERNATIONAL LTD.

    PGI's Digital Forensics experts provide fast, effective and highly efficient forensic data imaging and acquisition services. In the event of a computer security investigation, time is paramount. The sooner we are involved the sooner we can secure assets, limit damage and measure extent.

  • PwC Operate Digital Testing Services

    PRICEWATERHOUSECOOPERS LLP

    Services providing high quality delivery and innovative solutions across testing types. A range of services are available from an audit of your test function to providing post-production support. These are underpinned by a catalogue and accredited frameworks to deliver fully managed test capability in a flexible and scalable way.

  • G-Cloud Support Service

    Indus Services Limited

    We offer a comprehensive range of data solutions spanning from the more traditional data management to contemporary cloud computing and in many cases bespoke and innovative solutions. We offer a range of Data solutions like data management, data services, migration, governance and quality assurance within the reach of any enterprise.

  • Micro Frontend Development

    UNISYS LIMITED

    This service offering provides expertise in designing and developing micro frontend architectures for complex web applications. Our approach leverages industry best practices to create loosely coupled, independent micro frontends that promote faster development cycles, improved maintainability, and a consistent user experience.

  • IBM Electronic Patient Record/Electronic Health Record and Clinical Systems Procurement Services

    IBM UNITED KINGDOM LIMITED

    IBM provides Electronic Patient Record/Health Record (EPR/EHR) and Clinical Systems Procurement Services for NHS and private health organisations. This comprises a set of services that includes: Future State Visioning; Output-Based Specification development; vendor evaluation, vendor selection; and Strategic, Outline and Full Business Case development (with benefits management and realisation plans).

  • Governance, Risk and Compliance Services

    GSA CYBER SECURE LIMITED

    GSA offers a range of tailored GRC services to help you identify threats to your organisation, manage the associated risk and reduce your exposure.

  • Cloud Interoperability Services

    New Scaler Limited

    New Scaler provides specialised Cloud Interoperability Services building comprehensive solutions for seamless compatible integration and communication across various cloud-based systems, platforms, and applications allowing organizations to leverage the full potential of cloud computing. Our service spans across Video (CVI), Application, Audio, Data, Messaging & Workflow Interoperability.

  • Salesforce CPQ (Configure, Price, Quote) Streamlining

    HYPER TALENT SOLUTIONS LTD

    Hyper Talent Solutions offers Salesforce CPQ (Configure, Price, Quote) Streamlining services for government departments, optimizing their CPQ processes to improve efficiency and accuracy. This service includes streamlining product configuration, pricing rules, and quote generation workflows, ensuring departments can quickly and accurately create quotes for their customers.

  • Power Apps Management, Control and Maintenance Services

    CEOX SERVICES LTD

    Ceox helps organisations manage, control, and maintain their Microsoft Power Apps estate. Implementing a Centre of Excellence model, organisations can build line of business Power Apps with the reassurance they will be managed, controlled, and maintained. Deliver modern applications using Power Apps, Power Automate, Power BI and Copilot Studio Chatbots.

  • Cognizant Intelligent Document Processing Services

    COGNIZANT WORLDWIDE LIMITED

    End-to-end automation development services help automate mundane, time-consuming and human-centric repetitive tasks, thereby improving operational efficiency, reducing costs and increasing margins by unleashing the true productivity of the team. Automation can quickly and accurately handle cognitive activities to augment and extend human capabilities, reduce the errors of time-consuming manual processes

  • Virtual Collaboration and Hybrid Whiteboarding Services

    GENERATION DIGITAL LIMITED

    Get implementation and support on collaborative whiteboard platforms that enables distributed teams to work effectively together, from brainstorming with digital sticky notes to planning and managing agile workflows. Miro, Figma, Mural... Take advantage of a full set of collaboration capabilities, make cross-functional teamwork effortless, and organize meetings and workshops.

  • Smart Card and Registration Authority (RA) Services

    LEICESTERSHIRE PARTNERSHIP NHS TRUST

    LHIS provides Smart Card and Registration Authority (RA) services to the following organisations whose staff access NHS CRS compliant applications: Clinical Commissioning Group’s, Local Authorities, GP practices, Dentists, Optometrists, Pharmacies, Social Enterprises, Independent Providers including Any Qualified Providers and Prisons.

  • Cloud Consultancy services

    Fifosys Limited

    Fifosys provide cloud consultancy services. This can be delivered on either short term or long term basis. We often engage in a detailed audit of the existing IT estate. The objective is to aid the transformation by avoiding unnecessary risk and address challenges around security, compliance, business continuity, and architecture.

  • Application Modernisation and Migration

    TESTQ TECHNOLOGIES LIMITED

    Transform legacy applications to the Cloud with our Application Modernisation and Migration Service, minimizing technical debt through iterative improvement. From user needs assessment (Discovery) to design, prototyping, and testing (Alpha), we deliver user-centric applications (Beta/Live) with modular, maintainable APIs, front- and back-end services for enhanced user experience and reduced risk.