Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

19500 results found

19500 results found in Lot 3: Cloud Support in the category Security services

  • eNsure - Namos HESA Submission Application

    NAMOS SOLUTIONS LTD

    The Namos HESA application is a secure online tool that enables Higher Education Institutions (HEIs, i.e. Universities) to return accurate staff data to HESA quickly and easily. The Namos HESA application removes all the heavy lifting from building a staff HESA return.

  • Cyber Threat Modelling (CTM)

    KEEP Information Security Services

    Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.

  • Cloud QA Support

    CAPGEMINI UK PLC

    Cloud QA is a suite of services offering Quality Assurance and Engineering for delivery to aggressive Cloud Migration timelines as part of Buyer’s digital transformation journey. The services can be offered as an independent Cloud-based quality assurance function, or by integrating Continuous Testing as part of Buyer’s DevOps solution.

  • Cloud Research — Gartner Executive Programs v2 Guided Team CISO Guided Leader Member (EXPV2G17)

    GARTNER U.K. LIMITED

    Executive Programs v2 Guided: CISO Guided Leader Member is designed for the senior most security and risk management leaders in the client company, typically the Chief Information Security Officer (“CISO”). The Service provides access to Gartner research and research experts.

  • Cloud Infrastructure

    NIXINFINITY - AI LTD

    Empower your business with our secure and scalable Cloud Infrastructure services. We provide a comprehensive solution, managing your servers, storage, and networking in the cloud, irrespective of cloud provider. Focus on your core operations while we ensure your IT infrastructure is reliable, cost-effective, and readily available.

  • Cloud Support Services by ITGL

    Conscia UK

    ITGL provides a range of proactive and reactive support services that include and enhance manufacturer maintenance and support for our public sector clients. By utilising in house expertise and vendor specialists we can help our clients mitigate risk, increase resolution time and ensure up to date and compliant technology solutions.

  • Firewall Configuration Review

    DigitalXRAID Ltd.

    DigitalXRAID provides CREST approved Penetration Testing of security professionals. DigitalXRAID Firewall Configuration review team are highly accredited and seasoned professionals. We ensure organisations understand the risks vulnerabilities pose and highlight the true business impact if these were exploited. Visit www.digitalxraid.com for further information.

  • User Experience (UX) Design consultancy service

    Nomensa Ltd

    We utilise user experience (UX) design to answer challenging problems and find opportunities to go beyond initial thinking. We push boundaries of what is possible and partner with clients every step of the way. Our UX design is informed by user research and underpins our entire design process.

  • DevOps and Infrastructure

    KE TECHNOLOGY LTD

    KE Technology’s DevOps and Infrastructure service support Public Sector organisations to improve the system's robustness and enable quicker and more fluent operations.

  • PwC Back Office ERP Enabled Transformation Services

    PRICEWATERHOUSECOOPERS LLP

    PwC provides end-to-end services for Cloud enabled business transformation. This includes planning, readiness assessments, architecture, integration, system & business implementation services for all major ERP and HCM software products including Workday, Oracle, SAP and Microsoft, across all back office functional areas including Finance, Procurement, Supply Chain, Commercial, HR and Payroll.

  • Penetration testing

    FORENSIC CONTROL LIMITED

    Penetration testing conducted by CREST CRT qualified pen tester. Internal and external penetration testing on web apps, APIs, external infrastructure, mobile apps. Remediation steps provided for any found vulnerabilities. Provision of comprehensive report suitable for technical and non-technical staff.

  • Managed Infrastructure Support

    Silver Lining Convergence Limited

    Silver Lining boasts decades of networking experience in-house while providing a responsive and transparent Infrastructure IT support and management service. Covering all cloud and on-premise technology infrastructure, including servers, virtual servers, virtual desktops, backup, storage and network equipment.

  • Risk Management

    BMT LIMITED

    BMT’s Risk Management services enable identification, assessment and management of risks. We use Association of Project Management’s (APM) Project Risk & Analysis Management (PRAM) Guide, Cabinet Office Management of Risk (M_o_R) and Institute of Risk Management (IRM) guidance and methodologies to deliver complete understanding of threats and opportunities.

  • Cyber Essentials Certification and Best Practice Cyber Security Recommendations

    KHIPU NETWORKS LIMITED

    This service helps organisations of any size who wish to be Cyber Essentials certified. KHIPU's certified cyber security assessors will help organisations understand the scheme, develop an understanding of their cyber security posture and then guide them through the necessary steps to compliance including best practice recommendations/solutions.

  • Cyber Essentials including Plus

    PENTEST PEOPLE LIMITED

    Cyber Essentials from Pentest People provides a set of fundamental security controls, underlining the minimum level of cybersecurity protection an organisation should have. Pentest People offers three different packages tailored to varying needs and levels of support required by businesses.

  • Development & Security Services

    MALFAUR LONDON CONSULTING LIMITED

    Our software development and security services provide tailored solutions for seamless creation, deployment, and protection of digital assets. We specialize in crafting software that meets unique business needs while prioritizing robust security. Our expert team ensures advanced technology and protection against potential threats, allowing clients to innovate confidently.

  • Cloud Hosted Data Vault

    Airwalk Consulting Reply Ltd

    Cloud Hosted Data Vault mitigates ransomware and data corruption, ensuring long-term, immutable, encrypted, independently restorable snapshots of critical applications and data are kept in a secure “vault” where data cannot be changed regardless of administrative privilege. Retention policies cannot be tampered with. Recovery via cleanrooms provides malware scanning.

  • DXC Technology Transformation Planning for SAP S/4HANA

    ENTSERV UK LIMITED

    Organizations have specific and unique needs, there cannot be one size or approach to fit all DXC has developed a methodology that combines consultant expertise with the guidance, tools, accelerators and techniques determined by DXC as the most effective to tailor and scale each customer engagement.

  • Big Data Consultancy

    LEFKE IT LIMITED

    The growing need for massive volumes of relevant data offers both big opportunities and big problems. This service enables organisations to understand and exploit the value in their Big Data by advising and guiding clients on their strategy,requirements,cloud-based solution designs and transition planning. Big Data expertise: Hadoop, Apache Spark, R.

  • Secure Technical Services for Digital Projects and Programmes

    SA GROUP LTD

    SA Group provides Suitably Qualified and Experienced Personnel to enable digital transformation from legacy on-premises, physical systems and services to secure, modular and automated cloud services in both public and private cloud environments. Our demonstrable record of innovative quality solutions with Defence, Public Sector and Enterprise clients uses proven approaches.

  • Cloud Leadership — Executive Programs Leadership Team Plus with Industry: Delegate Member (EPLPDELI)

    GARTNER U.K. LIMITED

    Executive Programs Leadership Team Plus with Industry: Delegate Team Member permits the client to identify an individual reporting to the CIO, for professional development and to serve as proxy for the leader. The service provides indispensable insights and specific guidance on best practice for cloud deployment and strategy..

  • SPLUNK integration and delivery Service

    AGILE BYTE LIMITED

    Supports your adoption of SPLUNK including legacy transition, integration, data security and live running. Agile Byte will enable you to integrate SPLUNK components into your infrastructure, harnessing the benefits it brings to your specialist operational areas such as the Security Operating Centre (SOC) monitoring and network operating centre (NOC) functions.

  • Digital Health Consultancy

    ARCA RESOURCING LTD

    ARCA provides a full range of digital healthcare services that supports NHS Health & Social Care organisations through complex Digital & Cloud transformation programmes. Our expert consultants have extensive experience in advising, implementing and assuring Electronic Patient Records (EPR/EHR), Population Health and LIMS/Pathology programmes across the UK.

  • Mobile Security and Privacy

    GET SWARMS LIMITED

    GSL ensures mobile security and privacy by implementing robust encryption, secure authentication, and compliance with industry standards. We assess and protect mobile apps against vulnerabilities, safeguarding sensitive data. Our solutions include secure coding practices, regular audits, and privacy measures, ensuring safe, compliant mobile experiences for users and organizations.

  • Automation Advisory Services

    QUALITEST GROUP UK LTD

    Qualitest's Automation advisory services assist businesses and organisations in automating their processes and operations by offering guidance, expertise, and support through technology solutions. Qualitest help organisations identify automation opportunities, implement effective automation strategies, and realise the full benefits of automation in their operations

  • Web Application Penetration Testing

    AXIS PENTEST LTD

    Let our certified specialists remotely probe and penetrate your external networks. Our highly manual service aims to identify vulnerable Internet services and components which may be remotely exploited to extract information or mount further attacks while operating within your networks.

  • Transformation and Change Management

    I3WORKS LTD

    Transformation and Change Management is one of the high-quality services that i3Works offers. We provide Transformation and Change Management practitioners at all levels, from lead to support. Our experience of Transformation and Change Management and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.

  • Cloud and Datacentre Infrastructure & Network Services

    Axians Networks Limited

    Understanding your requirements and designing complex network architecture solutions is our business. From initial strategy through to low level design and build, we can ensure that your network infrastructure will deliver the required services from day one, whilst enabling the ability to scale and add new services as necessary.

  • User Research

    SOLIRIUS REPLY LIMITED

    User research facilitates better strategic and tactical decision making for product and service teams, leading to better experiences and successful outcomes. Our user researchers help identify different user groups (citizens and staff) to understand their needs, goals and pain points; and use this insight to guide strategy and design decisions.

  • Penetration Testing

    Six Degrees

    Our Penetration Testing services give you the information you need to enhance your protection against ransomware and other cyber-attacks. All of our Penetration Testing services are delivered by experienced, qualified ethical hackers. We provide summary reports in an easy to digest format that contain expert advice for reducing attack surface.