-
KEEP Information Security Services
virtual Chief Information Security Officer (vCISO) by KEEP. This service provides you with a dedicated and experienced consultant who becomes the trusted adviser to the organisation. Providing your organisation with the CISO capabilities without the associated full-time costs.
-
KEEP Information Security Services
Cloud Security Consultancy by KEEP. This service provides you with our Microsoft Azure & O365 baseline reviews, providing actionable priorities to understand any gaps or mis-configuration that may increase the risks and vulnerabilities to the organisation.
-
KEEP Information Security Services
Cyber Security Transformation by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and transform cyber security controls across your organisation to increase your overall cyber security posture and maturity.
-
KEEP Information Security Services
Cyber Security Consultancy by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and improve cyber security controls across your organisation to increase your overall cyber security posture and maturity.
-
KEEP Information Security Services
Microsoft Defender 365 services by KEEP. Our consultants have years of experience with Microsoft Defender 365, where we provide clients with engineering support, configuration assessments and new feature introductions alongside KQL support. To ensure you make the best use of Microsoft Defender 365 and associated services.
-
KEEP Information Security Services
3rd Party Risk review by KEEP. 3rd Party risk is becoming an ever-increasing problem. Various attacks originate from 3rd parties; via malicious software packages, hacked systems or poor cyber security governance.
We work with you to understand your organisation, context, threats faced, risk appetite, senior management, nuances and supply chain.
-
KEEP Information Security Services
NCSC Cyber Assessment Framework (CAF) by KEEP. This service provides clear guidance regarding the NCSC CAF, understanding your current readiness, identifying gaps and assisting you to implement strategies, roadmaps, tooling and projects to align compliance with the NCSC CAF requirements.
-
KEEP Information Security Services
NIS2 Consultancy by KEEP. Our consultants hold a wealth of experience in reviewing, understanding, prioritising and assisting organisations meet the control requirements of the NIS2 directive alongside the completion of Operators of Essential Services (OES) returns.
-
XMCS
Security by Design helps ensure organisations keep information and other assets secure by design and by default.
We specify, design, plan and implement how security runs as a "golden thread" through the organisation and its service solutions.
We have led creation of pan-government tier-2 services, the implementation of micro-segmentation etc.
-
KEEP Information Security Services
Attack Surface Mapping by KEEP. This service allows you to understand your true risks in the context of your organisation, your risk appetite, the threats faced and the likely areas that will be targeted.
These targeting opportunities form your organisations unique “Attack Surface”. Our Consultants highlight your attack surface(s).
-
KEEP IT SIMPLE LIMITED
Our Cyber security services specialise in keeping systems secure, protected and compliant in collaboration with public sector. Our personnel are highly efficient, knowledgeable and operate to all known security frameworks and industry best practice providing both hands on technical skills and information security assurance.
-
KEEP Information Security Services
Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.
-
MOBILISE CLOUD SERVICES LIMITED
Mobilise provide a range of security services to protect critical workloads from Well Architected Reviews through to Security Event and Information Management (SIEM) Services. Working across cloud and hybrid cloud environments, Mobilise strengthen the security posture of interconnected systems and datasources in accordance with GDS and NCSC cybersecurity principles.
-
KEEP Information Security Services
Microsoft Kusto Query Language (KQL) support by KEEP. Our consultants have years of experience with Microsoft KQL and can help you with advanced hunting and queries required in both Microsoft Defender 365 and Microsoft Sentinel to extract, report, dashboard, alert and monitor specific threats or requirements.
-
FORTIS CYBER SECURITY LIMITED
Fortis offers a range of ISO 27001 implementation and certification consultancy support services from a one-off gap assessment to complex multi-standard integrated management system projects, in addition to the ongoing maintenance and assurance of your ISMS.
All services can be tailored to suit your organisation’s specific objectives, budget and timeline.
-
NCC Group Security Services Limited
To provide assurance that Amazon Web Service (AWS) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of AWS cloud services within the business.
-
NCC Group Security Services Limited
To provide assurance that Google Cloud Platform (GCP) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of GCP cloud services within the business.
-
NCC Group Security Services Limited
To provide assurance that Azure cloud services, including O365, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of Azure cloud services within the business.
-
QA LIMITED
The courses in this listing teach learners how to efficiently use AWS security services to stay secure in the AWS Cloud. They learn AWS-recommended security practices for enhancing security of data and systems in the cloud, and security features of AWS key services including compute, storage, networking and database services.
-
KHIPU NETWORKS LIMITED
This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.
-
E2E-ASSURE LIMITED
A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.
-
INFORMU SOLUTIONS LIMITED
The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.
-
LEFKE IT LIMITED
Lefke IT offers tailored Endpoint Security for government cloud access, featuring protection platforms, secure VPN, and threat detection. Our services ensure real-time monitoring, policy enforcement, and vulnerability management, bolstering cloud data security. Clients can confidently adopt cloud computing while maintaining network integrity.
-
DIFFERENTIS LTD
Our cloud-centric cybersecurity service offers robust protection for UK public sector organisations, ensuring secure data handling and compliance with national standards. Key features include real-time threat detection, encryption, access control, and continuous monitoring, tailored to safeguard sensitive information against evolving cyber threats.
-
BYTES SOFTWARE SERVICES LIMITED
Proofpoint Essentials provides email security to protect business email both with the advanced protection of URL and Attachment Defence and Data Loss Prevention capabilities as well as comprehensive Email Continuity features to keep business communications up and running at all time. bssgc
-
CODE ENIGMA LIMITED
We'll keep your Drupal application secure with regular updates of both core and supported modules. Single monthly fee per Drupal core. Automated monitoring for update releases. Hands-on process to apply relevant updates and ensure your site isn't adversely affected. Approval stage before deploying to align updates with other development activity.
-
BOXXE LIMITED
Powered by Sophos Central Email Advanced, our Secure Email Gateway protects the customers network from advanced threats, known risks, using security controls to manage information flowing through the customers organisation, successfully protecting against spam, malware, spear-phishing and other email-borne threats. This can be used as a service or standalone.
-
BULLETPROOF CYBER LTD
Penetration Testing lets you uncover security weaknesses in your infrastructure, network, web app, mobile app or cloud. Meet compliance, supply chain & infosec best practices. Powerful dashboard-driven reporting with vital information about how to protect against attacks and keep your data and users secure.
-
YUDU Sentinel
Keep vital business communications running in a crisis, when all other systems fail.
Sentinel delivers mass notification, document hosting and collaboration tools to help manage an incident remotely from any device, to keep crisis response teams and key stakeholders updated throughout the life cycle of any critical event.
-
ABAVUS LIMITED
Our Regulatory Services module provides councils with an all-in-one digital solution for the processing and management of licensing and regulatory services (including public protection).