Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

219 results found

219 results found containing keep information security services in All lots

  • virtual Chief Information Security Officer (vCISO)

    KEEP Information Security Services

    virtual Chief Information Security Officer (vCISO) by KEEP. This service provides you with a dedicated and experienced consultant who becomes the trusted adviser to the organisation. Providing your organisation with the CISO capabilities without the associated full-time costs.

  • Cloud Security Consultancy

    KEEP Information Security Services

    Cloud Security Consultancy by KEEP. This service provides you with our Microsoft Azure & O365 baseline reviews, providing actionable priorities to understand any gaps or mis-configuration that may increase the risks and vulnerabilities to the organisation.

  • Cyber Security Transformation

    KEEP Information Security Services

    Cyber Security Transformation by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and transform cyber security controls across your organisation to increase your overall cyber security posture and maturity.

  • Cyber Security Consultancy

    KEEP Information Security Services

    Cyber Security Consultancy by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and improve cyber security controls across your organisation to increase your overall cyber security posture and maturity.

  • Microsoft Defender 365 services

    KEEP Information Security Services

    Microsoft Defender 365 services by KEEP. Our consultants have years of experience with Microsoft Defender 365, where we provide clients with engineering support, configuration assessments and new feature introductions alongside KQL support. To ensure you make the best use of Microsoft Defender 365 and associated services.

  • 3rd Party Risk Review

    KEEP Information Security Services

    3rd Party Risk review by KEEP. 3rd Party risk is becoming an ever-increasing problem. Various attacks originate from 3rd parties; via malicious software packages, hacked systems or poor cyber security governance. We work with you to understand your organisation, context, threats faced, risk appetite, senior management, nuances and supply chain.

  • NCSC Cyber Assessment Framework (CAF)

    KEEP Information Security Services

    NCSC Cyber Assessment Framework (CAF) by KEEP. This service provides clear guidance regarding the NCSC CAF, understanding your current readiness, identifying gaps and assisting you to implement strategies, roadmaps, tooling and projects to align compliance with the NCSC CAF requirements.

  • NIS / NIS2 Consultancy

    KEEP Information Security Services

    NIS2 Consultancy by KEEP. Our consultants hold a wealth of experience in reviewing, understanding, prioritising and assisting organisations meet the control requirements of the NIS2 directive alongside the completion of Operators of Essential Services (OES) returns.

  • Security By Design

    XMCS

    Security by Design helps ensure organisations keep information and other assets secure by design and by default. We specify, design, plan and implement how security runs as a "golden thread" through the organisation and its service solutions. We have led creation of pan-government tier-2 services, the implementation of micro-segmentation etc.

  • Attack Surface Mapping

    KEEP Information Security Services

    Attack Surface Mapping by KEEP. This service allows you to understand your true risks in the context of your organisation, your risk appetite, the threats faced and the likely areas that will be targeted. These targeting opportunities form your organisations unique “Attack Surface”. Our Consultants highlight your attack surface(s).

  • Cyber Security Services

    KEEP IT SIMPLE LIMITED

    Our Cyber security services specialise in keeping systems secure, protected and compliant in collaboration with public sector. Our personnel are highly efficient, knowledgeable and operate to all known security frameworks and industry best practice providing both hands on technical skills and information security assurance.

  • Cyber Threat Modelling (CTM)

    KEEP Information Security Services

    Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.

  • Cloud and Cyber Security Service

    MOBILISE CLOUD SERVICES LIMITED

    Mobilise provide a range of security services to protect critical workloads from Well Architected Reviews through to Security Event and Information Management (SIEM) Services. Working across cloud and hybrid cloud environments, Mobilise strengthen the security posture of interconnected systems and datasources in accordance with GDS and NCSC cybersecurity principles.

  • Microsoft Kusto Query Language (KQL) support

    KEEP Information Security Services

    Microsoft Kusto Query Language (KQL) support by KEEP. Our consultants have years of experience with Microsoft KQL and can help you with advanced hunting and queries required in both Microsoft Defender 365 and Microsoft Sentinel to extract, report, dashboard, alert and monitor specific threats or requirements.

  • ISO/IEC 27001:2022 Certification Consultancy

    FORTIS CYBER SECURITY LIMITED

    Fortis offers a range of ISO 27001 implementation and certification consultancy support services from a one-off gap assessment to complex multi-standard integrated management system projects, in addition to the ongoing maintenance and assurance of your ISMS. All services can be tailored to suit your organisation’s specific objectives, budget and timeline.

  • Cloud Platform Assessment - AWS

    NCC Group Security Services Limited

    To provide assurance that Amazon Web Service (AWS) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of AWS cloud services within the business.

  • Cloud Platform Assessment – Google Cloud Platform

    NCC Group Security Services Limited

    To provide assurance that Google Cloud Platform (GCP) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of GCP cloud services within the business.

  • NCC Group Cloud Platform Assessment – Azure

    NCC Group Security Services Limited

    To provide assurance that Azure cloud services, including O365, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of Azure cloud services within the business.

  • Amazon Web Services (AWS) Training Courses for Security Engineers

    QA LIMITED

    The courses in this listing teach learners how to efficiently use AWS security services to stay secure in the AWS Cloud. They learn AWS-recommended security practices for enhancing security of data and systems in the cloud, and security features of AWS key services including compute, storage, networking and database services.

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    KHIPU NETWORKS LIMITED

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.

  • e2e Secure Cloud Website Hosting Service

    E2E-ASSURE LIMITED

    A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.

  • Informu Information Asset Register and Management System

    INFORMU SOLUTIONS LIMITED

    The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.

  • Endpoint Security for Cloud Access

    LEFKE IT LIMITED

    Lefke IT offers tailored Endpoint Security for government cloud access, featuring protection platforms, secure VPN, and threat detection. Our services ensure real-time monitoring, policy enforcement, and vulnerability management, bolstering cloud data security. Clients can confidently adopt cloud computing while maintaining network integrity.

  • Cyber Security as a Service

    DIFFERENTIS LTD

    Our cloud-centric cybersecurity service offers robust protection for UK public sector organisations, ensuring secure data handling and compliance with national standards. Key features include real-time threat detection, encryption, access control, and continuous monitoring, tailored to safeguard sensitive information against evolving cyber threats.

  • Proofpoint Essentials

    BYTES SOFTWARE SERVICES LIMITED

    Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc

  • Drupal security updates

    CODE ENIGMA LIMITED

    We'll keep your Drupal application secure with regular updates of both core and supported modules. Single monthly fee per Drupal core. Automated monitoring for update releases. Hands-on process to apply relevant updates and ensure your site isn't adversely affected. Approval stage before deploying to align updates with other development activity.

  • boxxe Managed Email Gateway

    BOXXE LIMITED

    Powered by Sophos Central Email Advanced, our Secure Email Gateway protects the customers network from advanced threats, known risks, using security controls to manage information flowing through the customers organisation, successfully protecting against spam, malware, spear-phishing and other email-borne threats. This can be used as a service or standalone.

  • Penetration Testing

    BULLETPROOF CYBER LTD

    Penetration Testing lets you uncover security weaknesses in your infrastructure, network, web app, mobile app or cloud. Meet compliance, supply chain & infosec best practices. Powerful dashboard-driven reporting with vital information about how to protect against attacks and keep your data and users secure.

  • YUDU Sentinel

    YUDU Sentinel

    Keep vital business communications running in a crisis, when all other systems fail. Sentinel delivers mass notification, document hosting and collaboration tools to help manage an incident remotely from any device, to keep crisis response teams and key stakeholders updated throughout the life cycle of any critical event.

  • Abavus - Regulatory Services

    ABAVUS LIMITED

    Our Regulatory Services module provides councils with an all-in-one digital solution for the processing and management of licensing and regulatory services (including public protection).