-
ABCONSULTANCY SERVICES LTD
Our Data Load (ETL) Service facilitates the seamless transfer of transformed data from our 'Data Transformation' service, into target repositories, ensuring its integrity and availability for analytics and reporting purposes. With automated loading pipelines and error handling mechanisms, it simplifies data migration processes and supports scalable data storage solutions.
-
I3WORKS LTD
P3M Governance is one of the high-quality services that i3Works offers. We provide P3M Governance at all levels, from lead to support. Our experience of P3M Governance and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.
-
M-HANCE LIMITED
m-hance will work with your existing IT resources in a collaborative manner to help ensure that your implementation of Office 365 is a success. This includes determining the most appropriate deployment options for the various Office 365 components; providing advice and solution design; network readiness and remediation; hands-on implementation; training.
-
DEFENCE DATASEC LTD
Defence DataSec Cyber Security services for cloud based delivery. Our Cloud Cyber Security Consultants can help in any aspect of your Cloud journey.Providing Information Assurance and Security services that includes security architecture,certification and accreditation.Design,operate and support security solutions for your cloud applications that could be hosted in various Cloud Providers
-
CIO-OFFICE LLP
CIO-OFFICE provide independent services that assess the overall cloud service provision to ensure it is optimised to exploit the benefits of the cloud, while managing risk and delivering to your requirements.
Key features of our services include benchmarking services, contract assessments, financial modelling and a functionality review to optimise solutions.
-
DEFENCE DATASEC LTD
Defence DataSec provides Threat intelligence platform that combines both automated/manual collection of data across the Clearnet,darknet and deep web.Our threat intelligence capability aims to produce actionable, accurate, relevant, and timely threat intelligence products that protect our clients by supporting the ability to identify,protect,and detect cyber threats and mitigate cyber risks.
-
BROVANTURE LIMITED
Brovanture offers a configurable mix of Implementation, Consulting, Training and Support services designed for the successful set up and continued use of Oracle Cloud EPM Planning (PBCS, EPBCS). These services are designed specifically for the fast, reliable and cost-effective enablement for line-of-business teams in public sector organisations, at fixed cost.
-
TRUSTMARQUE SOLUTIONS LIMITED
Trustmarque supply a data management and warehouse tool that delivers SUS, NHS reporting and commissioner reporting.
All of the elements required to meet the requirements of an NHS Informatics department and many more.
Reduce the time spent delivering BAU by 80% . Improve reporting accuracy and deliver it daily.
-
SOPRA STERIA LIMITED
DevSecOps enablement services are designed to help organisations accelerate delivery performance for software solutions. Our structured, data driven approach provides a roadmap of improvements. Building on DevOps techniques combined with a secure development lifecycle, it helps teams establish an efficient, safe, and lasting product delivery culture.
-
TRANSFORMCX LIMITED
TransformCX's Service Design & Delivery Services optimize service offerings and ensure seamless delivery. We analyse user needs, design customer-centric solutions, and implement efficient delivery mechanisms. With extensive experience in the public sector, we enhance service quality, compliance, and drive excellence in service provision, meeting the unique demands of customers efficiently.
-
PRICEWATERHOUSECOOPERS LLP
PwC offers scalable services to help prototype, design, implement, maintain and embed Robotic Process Automation (RPA) and Intelligent Automation tools and methods in your organisation. We can create the case for change, measure and track benefits and upskill your workforce in a range of automation tools, including AI and OCR.
-
SOLIRIUS REPLY LIMITED
Our agile business analysts work with business stakeholders, subject matter experts, product and service managers to translate business requirements into something that the developers can build. We encourage close working with client teams as well as technical teams to deliver clear, unambiguous and testable functional and non-functional requirements.
-
KPMG LLP
Our Zero Trust Networking service implements a security model that assumes no inherent trust within a network, providing stringent access control, verification, and continuous monitoring to protect against threats and breaches, enhancing organisational security posture.
-
BOXXE LIMITED
DOBUS Remote™ is a unique service developed specifically for users who have restricted or no access to secure networks to utilise the functionality of DOBUS™, it will appeal in particular to organisations who have personnel in remote locations, or where access to their central network is unavailable or unsecured.
-
SOLIRIUS REPLY LIMITED
Solirius offers comprehensive project, program, portfolio management solutions tailored to the unique needs of your business or organisation. Our experienced team collaborates closely with you to streamline processes, optimise resource allocation, and ensure successful project delivery from inception to completion.
-
HEALTH HR UK LIMITED
We can help clients manage vendors effectively. This includes assessing delivery against contract, identifying service improvement opportunities, ensuring KPI’s, OLA’s and SLA’s are being delivered, negotiating resolution of delivery failures, and developing supplier improvement plans. It can also involve the review/creation of new supplier contracts or novation/renegotiation of existing ones.
-
COMPUTACENTER (UK) LIMITED
Our software development services provide customers with access to agile teams of software engineers, scrum masters and agile project & delivery managers. We help customers improve their software delivery lifecycle (SDLC) and CICD automation, and provide flexible development teams to help customers build web, desktop, cloud and mobile software.
-
ARCULUS LIMITED
A virtual CISO (vCISO) can be a cost-effective solution for organisations who need cybersecurity leadership without the cost of a full-time CISO. Our vCISO service provides highly experienced professionals who take responsibility for your organisation’s overall security & risk strategy. The service is tailored to the needs of each organisation.
-
Advania
Advania helps you to identify M365 features that can replace existing technologies, providing a roadmap for new capabilities to aid Microsoft365, Enterprise Mobility+Security, and Windows 10 purchasing decisions. Information is gathered in a workshop and documented to serve as a standalone artefact, or input into a broader technology roadmap.
-
CYBERSYCURE LTD
This service involves conducting a comprehensive assessment of an organisation's information security management system (ISMS) against the requirements of ISO/IEC 27001:2022 standard and its privacy extension ISO/IEC 27701:2019. The service includes identifying gaps, implementing necessary measures, and developing processes to bridge identified gaps, achieving certification for both standards.
-
REPLY LIMITED
Safeguarding organisational assets demands robust tools covering identities, endpoints, applications, and data. Integration and synergy among these tools bolster protection, ensuring vital assets remain secure. Reply specialises in guiding enterprises to optimal XDR services which manage vast volumes and fortifying global business security with tactful adoption of next-gen security services.
-
CIRRO LIMITED
Cirro's software development as a service codes mobile, web and applications. Having worked on projects from IoT, Machine Learning, AI, Business Process Management, Workflow Optimisation, eCommerce, Mobility, Contact Centre and countless others.
Our experience means we understand user-cases and requirements, business processes and application integration requirements.
-
BEDIGITALUK LTD
bedigital's service helps you define and deliver your commercial and procurement strategy and ongoing supplier and vendor management, aligning it to your operating model, services, supply chain. bedigital Commercial strategy approach is aligned with the Digital Marketplace, frameworks and utilising Open Source and Cloud technologies delivering increased Value for Money
-
VE3 GLOBAL LTD
VE3 enhances an organization's cloud journey with its advanced Modern Change approach, integrating leadership, training, organizational design, workforce transformation, and communication strategies for successful day 1 implementations. We leverage digital tools, assets, and expertise to ensure a seamless cloud transformation.
-
INTUITY COMMUNICATIONS LIMITED
Professional services covering design, installation, pre and post sales support and end user training for the 8X8 UCaaS and CCaaS solutions.
-
DGM AGILITY LIMITED
A comprehensive risk assessment of all your data Including classification of data, risk assessment methodology, compliance with legal and regulatory frameworks and information security roadmap.
-
ZERO PLUS LTD
We simplify building/enrolling devices using market leading products such as MS Intune and Autopilot as well as VMWAre Workspace One. We allow users to be ready for business in a production environment within minutes utilising OOBE and technologies for a self-service experience, simplifying all parts of the device lifecycle.
-
QUALITEST GROUP UK LTD
Quality and performance assurance of XR technologies (AR, VR, MR) by validating hardware including head mounted display (HMD), smart phone, software, XR models, avatar interactions, rendering on HMDs, and cross-platform compatibility through manual and automated testing ensuring stability, reliability, and optimal user experience for immersive XR solutions.
-
ACCENTURE (UK) LIMITED
Accenture’s Redaction Solution can automatically identify and redact Personally Identifiable Information (PII) from documents including PDFs and handwritten. This solution uses advanced artificial intelligence to help protect against unintentional exposure of PII such as names, addresses, phone numbers, financial details, faces and other sensitive data.
-
CYBEXER (UK) LTD
The training is a comprehensive course that covers the CSIRT operational cycle from vulnerability management to forensic analysis. It combines theoretical instruction with hands-on cyber range exercises, allowing participants to apply learned concepts through practical experience with security tools in real-world simulations.