Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

28024 results found

28024 results found in Lot 3: Cloud Support

  • Threat and Vulnerability Management

    INTEGRITY360 LIMITED

    Continuous vulnerability management plays a key role in a well-functioning cyber security strategy by covering a variety of compliance requirements and protecting the business from the risks associated with security incidents. Integrity360’s Managed Vulnerability Assessment Service helps to meet three of the six basic controls in the CIS Top 20

  • Data Architecture

    SCRUMCONNECT LIMITED

    Elevate your IT infrastructure with our Data Architecture service, offering comprehensive design and integration strategies to optimize and future-proof your systems. Our expert architects ensure scalability, resilience, and efficiency, preparing your business for tomorrow’s challenges.

  • Technical Cyber Security Service

    DAINTTA LTD

    Daintta provides technical cyber security consultancy, with expertise in security architecture, network and infrastructure security across multiple security domains and classifications. Through expert analysis, reviews, and strategic planning, Daintta delivers tailored, scalable defence strategies. Providing robust protection and operational continuity, aligning closely with client's business objectives against evolving cyber threats.

  • NCSC NIS Directive (NIS Regulations) Consultancy

    METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED

    Methods is an NCSC Assured Cyber Consultancy, and our Certified Consultants have deep industry knowledge, experience and expertise to design and develop, a comprehensive compliance programme that will ensure the security and continuity of the systems in-line with the requirements of the UK Network and Information Systems (NIS Regulations).

  • Business Analysis - Business Modelling

    ARKE LTD

    Business Analysis - Business Modelling provides a structured method for understanding, analysing and enhancing diverse facets of a business. Business Modelling acts as a guide for business strategic planning, resource allocation, risk assessment and innovation.

  • Cyber Resilience

    METHODS BUSINESS AND DIGITAL TECHNOLOGY LIMITED

    Methods provide comprehensive cyber resilience for your organisation utilising NCSC experts to recognise and respond to threats which impact your capability. Cyber Resilience results in detailed recommendations, proposals and implementation support to achieve your enterprise security management requirements through proactive development of policy, process, training, testing and regulatory compliance.

  • Digital Health regulatory compliance services

    DPM DIGITAL HEALTH CONSULTANCY LTD

    Digital Health technologies regulatory compliance consultancy services which include Clinical Safety (DCB0129/0160), DTAC compliance, Medical Devices Regulations (UK/International) including Quality Management System and ISO implementation (ISO13485, 14971, 62304). Clinical Risk Management training and Clinical Safety Officer mentorship. Our team have comprehensive experience in implementing digital health systems into the NHS.

  • Design systems

    CIVIC COMPUTING LIMITED

    Understanding the importance of brand consistency is why we pride ourselves on helping clients establish a visual language to strengthen their brand across their digital landscape through the creation of robust design systems. Installing future efficiencies for rolling out new products and allowing for faster prototyping.

  • Information advantage

    Roke Manor Research

    Roke’s knowledge and skills can both broaden and strengthen your information advantage over adversaries. Roke’s data science abilities drive deep insights from your data, our cyber security knowledge enables you to protect that insight and that all combined with our human science expertise gives you understanding and control of influence.

  • DO480 - Multicluster Management with Red Hat OpenShift Platform Plus

    Red Hat Ltd

    Multicluster Management with RedHat OpenShift Platform Plus teaches the advanced skills required to take control of multiple OpenShift clusters using the suite of tools included with the product bundle. Students will learn how to combine the capabilities and workflows of Advanced Cluster Manager with Advanced Cluster Security and Quay Enterprise

  • Cloud Consultancy

    AspiraCloud Ltd

    Our highly experienced cloud consultants and Microsoft 365 specialists will analyse your current infrastructure, devices, data and applications to determine the best options to meet your cloud needs. From cloud adoption to management and optimisation, our team use their expert knowledge to offer impartial IT advice and recommendations.

  • Microsoft Defender XDR Planning and Implementation

    HOWELL TECHNOLOGY GROUP LIMITED

    Microsoft Defender XDR (Extended Detection and Response) Planning and Implementation service enhances cybersecurity by integrating Microsoft's full suite of security solutions. This includes planning, deployment, and implementation of all Defender components—Defender for Endpoint, Identity, Office 365, Cloud, and Server. This ensures utilisation of Defender XDR to protect against cyber threats.

  • Microsoft Azure Virtual Desktop (AVD) Services

    HOWELL TECHNOLOGY GROUP LIMITED

    Our Azure Virtual Desktop offering provides a scalable, cloud-based solution for virtual desktop infrastructure (VDI), enabling seamless access to desktop environments and applications from anywhere. It streamlines desktop management, enhances security, and offers cost-effective desktop as a service, facilitating remote work flexibility and centralised control.

  • DevOps Security Services

    STORM (ID) LTD

    Storm ID offers specialised secure SDLC (SSDLC) security consultancy for Azure DevOps and GitHub platforms. Our services include compliance assurance, vulnerability management and automated security integration, ensuring robust, scalable and compliant DevOps practices and application security best practices.

  • Software Asset Management (SAM) Software License Consultancy

    VERSION 1 SOLUTIONS LIMITED

    During the course of a normal SAM lifecycle and service, specific one-off events may require specialist in-depth expert licensing advisory services. Version 1 has deep expertise in complex high value vendor scenarios such as Oracle Unlimited License Agreements (ULA), Enterprise License Agreements (ELA) and migration or transfer of licenses, etc.

  • Cyber Essentials Certification to Basic and Plus levels

    INDELIBLE DATA LIMITED

    Indelible Data Ltd is a Cyber Essentials Certification Body conducting Cyber Essentials Basic and Cyber Essentials Plus (CE+) Certification Audits.

  • Namos - Oracle Training

    NAMOS SOLUTIONS LTD

    Our flexible and comprehensive Oracle Training and Knowledge Transfer service provides standard training services, and Knowledge Transfer. We use our experience to help guide our customers to the right training for them. Namos training improves user adoption and new ways of working, resulting in expected value and benefits being met.

  • Legacy to Cloud

    ROCKTIME LIMITED

    Rocktime understands the importance for Public Sector organisations to transition from legacy to cloud as part of a Digital Transformation Programme. Our Cloud Specialists offer planning and support as part of the implementation of a clear roadmap for the migration of web applications, legacy software and servers.

  • Shaping Change - Target State

    PROJECT ONE CONSULTING LIMITED

    Management Consultancy services that help you to translate your strategic direction into a clear vision and target operating model. By focusing on the desired outcomes and fully understanding the drivers of change, we will ensure your strategy can be fully realised and the changes needed are fully embedded.

  • Computacenter - User Research Services

    Computacenter (UK) Ltd

    Computacenter User Research service works with your stakeholders to discover the real views and perspectives of your employees. We analyse the results and produce a personalised report highlighting findings and providing you with views and insights into your employees ways of working to define future improvements and technology/service roadmaps.

  • Augmented and Virtual reality services (AR/VR)

    AKKODIS UK LIMITED

    Modis (Akkodis) Augmented Reality (AR) and Virtual Reality (VR) services support organisations to develop and implement solutions from concept to digital reality. Business case, discovery, development, testing to delivery aligned to GDS Service Standards. UX research and strategy to design and prototyping harnessing the power of innovative ways to communicate.

  • Network Architecture

    L.A. INTERNATIONAL COMPUTER CONSULTANTS LIMITED

    Our Network Architecture services design the network architecture for multi-vendor, multi-protocol environments, offering experienced resources capable of completing planning and system-level integration activities. Incorporating assessment, design, planning and security in depth Network Architecture, assisting the development and deployment of scalable, maintainable security systems for enterprise and cloud network.

  • Cloud Service Adoption & Configuration

    OGEL IT LTD

    We provide organisations with the confidence and capability to adopt cloud services. We cover a wide range of IaaS, PaaS and SaaS offerings and have a wealth of experience with legacy infrastructure to help you make the right decisions at the most appropriate pace for your business.

  • Computer Forensic Investigation

    CYFOR

    CYFOR ISO 17025 accredited digital forensic investigations service ensures precise, reliable evidence handling and analysis. We adhere to stringent quality standards for testing and calibration, maintaining the integrity and traceability of data, which is crucial for judicial and regulatory compliance in forensic investigations.

  • Cloud Support and Platform Management

    JADU CREATIVE LIMITED

    Ensure the optimal performance and management of your Jadu software solutions. This document outlines the range of support services available exclusively to licence holders of the Jadu software platform, including both comprehensive and component-specific options. Our tailored support packages are designed to enhance your platform's efficiency and security.

  • Single Customer View

    TELEFÓNICA TECH UK DATA & AI LIMITED

    Adatis provide setup, configuration and management of Microsoft components to design and develop secure, enterprise scale Data Warehousing Platforms and Reporting solutions providing full Data Analytics, Business Intelligence and AI capabilities and enabling a single view of a customer.

  • Business Analysis for Supply Chain Transformation for Cloud Services

    Brightman

    This Service helps to define the requirements for an organisation’s supply chain to fully optimise the use and integration of cloud services. This can include negotiation strategy, supports IT, commercial and procurement departments through the contract renewal process during transformation. Gaps and KPIs are analysed and options for change created.

  • Resource Augmentation

    31G

    Rapid allocation of high-quality resources across all tech stacks and disciplines Compliance, security, PMO and business analyst resource allocation Client directed BAU / projects Client defined approach outcomes and tooling, with client management Business process outsourcing for any protocolised process Training teams on customer tools and systems quickly Customer support

  • ServiceNow Sourcing and Procurement Operations

    ERNST & YOUNG LLP

    ServiceNow Procurement Operations Management streamlines the procurement process by automating workflows, managing vendors, and tracking purchases. It increases efficiency, provides visibility into spending, ensures compliance, and enhances collaboration between stakeholders, ultimately optimising the procurement lifecycle within an enterprise.

  • Next-Gen Cloud Operations-monitoring, backups, provisioning, security

    INFOSYS LIMITED

    A full spectrum of NextGen Cloud Operational Services that leverage cloud native and Infosys IP tools and platforms. Our cloud operations services addresses the need of basic and advanced cloud operations, such as monitoring, alerting, compliance, automation, provisioning, OS services, cost optimisation (FinOps), ITSM tool integration, hybrid cloud operations, protection/recovery.