-
NAMOS SOLUTIONS LTD
The Namos HESA application is a secure online tool that enables Higher Education Institutions (HEIs, i.e. Universities) to return accurate staff data to HESA quickly and easily.
The Namos HESA application removes all the heavy lifting from building a staff HESA return.
-
KEEP Information Security Services
Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.
-
CAPGEMINI UK PLC
Cloud QA is a suite of services offering Quality Assurance and Engineering for delivery to aggressive Cloud Migration timelines as part of Buyer’s digital transformation journey. The services can be offered as an independent Cloud-based quality assurance function, or by integrating Continuous Testing as part of Buyer’s DevOps solution.
-
GARTNER U.K. LIMITED
Executive Programs v2 Guided: CISO Guided Leader Member is designed for the senior most security and risk management leaders in the client company, typically the Chief Information Security Officer (“CISO”). The Service provides access to Gartner research and research experts.
-
NIXINFINITY - AI LTD
Empower your business with our secure and scalable Cloud Infrastructure services. We provide a comprehensive solution, managing your servers, storage, and networking in the cloud, irrespective of cloud provider. Focus on your core operations while we ensure your IT infrastructure is reliable, cost-effective, and readily available.
-
Conscia UK
ITGL provides a range of proactive and reactive support services that include and enhance manufacturer maintenance and support for our public sector clients. By utilising in house expertise and vendor specialists we can help our clients mitigate risk, increase resolution time and ensure up to date and compliant technology solutions.
-
DigitalXRAID Ltd.
DigitalXRAID provides CREST approved Penetration Testing of security professionals. DigitalXRAID Firewall Configuration review team are highly accredited and seasoned professionals. We ensure organisations understand the risks vulnerabilities pose and highlight the true business impact if these were exploited.
Visit www.digitalxraid.com for further information.
-
Nomensa Ltd
We utilise user experience (UX) design to answer challenging problems and find opportunities to go beyond initial thinking. We push boundaries of what is possible and partner with clients every step of the way. Our UX design is informed by user research and underpins our entire design process.
-
KE TECHNOLOGY LTD
KE Technology’s DevOps and Infrastructure service support Public Sector organisations to improve the system's robustness and enable quicker and more fluent operations.
-
PRICEWATERHOUSECOOPERS LLP
PwC provides end-to-end services for Cloud enabled business transformation. This includes planning, readiness assessments, architecture, integration, system & business implementation services for all major ERP and HCM software products including Workday, Oracle, SAP and Microsoft, across all back office functional areas including Finance, Procurement, Supply Chain, Commercial, HR and Payroll.
-
FORENSIC CONTROL LIMITED
Penetration testing conducted by CREST CRT qualified pen tester. Internal and external penetration testing on web apps, APIs, external infrastructure, mobile apps. Remediation steps provided for any found vulnerabilities. Provision of comprehensive report suitable for technical and non-technical staff.
-
Silver Lining Convergence Limited
Silver Lining boasts decades of networking experience in-house while providing a responsive and transparent Infrastructure IT support and management service. Covering all cloud and on-premise technology infrastructure, including servers, virtual servers, virtual desktops, backup, storage and network equipment.
-
BMT LIMITED
BMT’s Risk Management services enable identification, assessment and management of risks. We use Association of Project Management’s (APM) Project Risk & Analysis Management (PRAM) Guide, Cabinet Office Management of Risk (M_o_R) and Institute of Risk Management (IRM) guidance and methodologies to deliver complete understanding of threats and opportunities.
-
KHIPU NETWORKS LIMITED
This service helps organisations of any size who wish to be Cyber Essentials certified. KHIPU's certified cyber security assessors will help organisations understand the scheme, develop an understanding of their cyber security posture and then guide them through the necessary steps to compliance including best practice recommendations/solutions.
-
PENTEST PEOPLE LIMITED
Cyber Essentials from Pentest People provides a set of fundamental security controls, underlining the minimum level of cybersecurity protection an organisation should have. Pentest People offers three different packages tailored to varying needs and levels of support required by businesses.
-
MALFAUR LONDON CONSULTING LIMITED
Our software development and security services provide tailored solutions for seamless creation, deployment, and protection of digital assets. We specialize in crafting software that meets unique business needs while prioritizing robust security. Our expert team ensures advanced technology and protection against potential threats, allowing clients to innovate confidently.
-
Airwalk Consulting Reply Ltd
Cloud Hosted Data Vault mitigates ransomware and data corruption, ensuring long-term, immutable, encrypted, independently restorable snapshots of critical applications and data are kept in a secure “vault” where data cannot be changed regardless of administrative privilege. Retention policies cannot be tampered with. Recovery via cleanrooms provides malware scanning.
-
ENTSERV UK LIMITED
Organizations have specific and unique needs, there cannot be one size or approach to fit all
DXC has developed a methodology that combines consultant expertise with the guidance, tools, accelerators and techniques determined by DXC as the most effective to tailor and scale each customer engagement.
-
LEFKE IT LIMITED
The growing need for massive volumes of relevant data offers both big opportunities and big problems. This service enables organisations to understand and exploit the value in their Big Data by advising and guiding clients on their strategy,requirements,cloud-based solution designs and transition planning.
Big Data expertise: Hadoop, Apache Spark, R.
-
SA GROUP LTD
SA Group provides Suitably Qualified and Experienced Personnel to enable digital transformation from legacy on-premises, physical systems and services to secure, modular and automated cloud services in both public and private cloud environments. Our demonstrable record of innovative quality solutions with Defence, Public Sector and Enterprise clients uses proven approaches.
-
GARTNER U.K. LIMITED
Executive Programs Leadership Team Plus with Industry: Delegate Team Member permits the client to identify an individual reporting to the CIO, for professional development and to serve as proxy for the leader. The service provides indispensable insights and specific guidance on best practice for cloud deployment and strategy..
-
AGILE BYTE LIMITED
Supports your adoption of SPLUNK including legacy transition, integration, data security and live running. Agile Byte will enable you to integrate SPLUNK components into your infrastructure, harnessing the benefits it brings to your specialist operational areas such as the Security Operating Centre (SOC) monitoring and network operating centre (NOC) functions.
-
ARCA RESOURCING LTD
ARCA provides a full range of digital healthcare services that supports NHS Health & Social Care organisations through complex Digital & Cloud transformation programmes. Our expert consultants have extensive experience in advising, implementing and assuring Electronic Patient Records (EPR/EHR), Population Health and LIMS/Pathology programmes across the UK.
-
GET SWARMS LIMITED
GSL ensures mobile security and privacy by implementing robust encryption, secure authentication, and compliance with industry standards. We assess and protect mobile apps against vulnerabilities, safeguarding sensitive data. Our solutions include secure coding practices, regular audits, and privacy measures, ensuring safe, compliant mobile experiences for users and organizations.
-
QUALITEST GROUP UK LTD
Qualitest's Automation advisory services assist businesses and organisations in automating their processes and operations by offering guidance, expertise, and support through technology solutions. Qualitest help organisations identify automation opportunities, implement effective automation strategies, and realise the full benefits of automation in their operations
-
AXIS PENTEST LTD
Let our certified specialists remotely probe and penetrate your external networks. Our highly manual service aims to identify vulnerable Internet services and components which may be remotely exploited to extract information or mount further attacks while operating within your networks.
-
I3WORKS LTD
Transformation and Change Management is one of the high-quality services that i3Works offers. We provide Transformation and Change Management practitioners at all levels, from lead to support. Our experience of Transformation and Change Management and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.
-
Axians Networks Limited
Understanding your requirements and designing complex network architecture solutions is our business. From initial strategy through to low level design and build, we can ensure that your network infrastructure will deliver the required services from day one, whilst enabling the ability to scale and add new services as necessary.
-
SOLIRIUS REPLY LIMITED
User research facilitates better strategic and tactical decision making for product and service teams, leading to better experiences and successful outcomes. Our user researchers help identify different user groups (citizens and staff) to understand their needs, goals and pain points; and use this insight to guide strategy and design decisions.
-
Six Degrees
Our Penetration Testing services give you the information you need to enhance your protection against ransomware and other cyber-attacks. All of our Penetration Testing services are delivered by experienced, qualified ethical hackers. We provide summary reports in an easy to digest format that contain expert advice for reducing attack surface.