-
MOTT MACDONALD LIMITED
Mott MacDonald provides a range of information security services for organisations that plan to use, or are currently using, cloud-based solutions. Our key security specialism is its application in the context of operational requirements, especially where there are interfaces to intelligent infrastructure outside the normal 'corporate IT' environment.
-
UBDS Digital
UBDS has a proven track record of designing, building, transitioning to, and managing next-generation Public and Private large enterprise networks using VMware SD-WAN technologies. We support our clients on their journey to rapidly transition to a Cloud-ready hybrid network and ultimately putting them on a path to a ‘zero-trust’ network.
-
LEFKE IT LIMITED
Lefke IT delivers Patch Management for Cloud Systems, ensuring government departments' cloud environments are up-to-date and secure against vulnerabilities. Our services automate patch deployment, prioritize critical updates, and monitor system integrity, minimizing security risks and downtime. Trust Lefke IT for reliable patch management, safeguarding cloud systems effectively.
-
LABSCAPE LTD
Manual accessibility testing for compliance with the Level AA requirements of the W3C Web Content Accessibility Guidelines (WCAG) 2.2 to assess how accessible a cloud-based service should be.
Note that an expert review or user testing with disabled participants is required to determine how accessible it actually is.
-
Intuitive Systems & Networks
Business security is changing from relying on a single firewall to a multi-layered approach, making it more difficult for bad actors to gain access to the network. SASE Using E-Mail security, Umbrella, AMP, Stealthwatch, ISE, Cloudlock all orchestrated by the cloud based Secure-X platform delivers next generation security and visibility.
-
Data Privacy Advisory Service
DPAS specialises in international data transfers and recognises the way we transfer data to third countries has changed. That is why we have established expertise in delivering the new EU Standard Contractual Clauses, Transfer Impact Assessments and the new UK International Data Transfer Agreements.
-
Farsight Consulting Ltd
This beta delivery service aligns with the Service Standard and Technology Code of Practice. Focus is on rapidly delivering testable functionality into users’ hands to validate iterative delivery of MVP, private and public beta services, tools and platforms. We work collaboratively to deliver outcomes that meet user and business needs.
-
SmartSurvey Limited
Our Survey Software for Universities offers a university-wide plan with unlimited users, enabling both staff and students to conduct academic research, gather feedback, and assess administrative services. It provides advanced analytics and data management tools to enhance educational outcomes.
-
Nomensa Ltd
We utilise user experience (UX) design to answer challenging problems and go beyond initial thinking in healthcare. We worked on the Test and Trace programme in research, service and content design, and with accessibility for NHS Digital (NHS England). Our work is inclusive and follows the NHS service standard.
-
TMC3 LIMITED
tmc3 supports organisations in implementing NIST Cyber Security Framework (NIST CSF) requirements. We help develop a profile that describes current and target cyber security activities and their outcomes using the NIST CSF. Our teams have extensive experience in delivering effective improvement programmes to help organisations embed NIST CSF methodologies.
-
CLEARROUTE UK LIMITED
Our platform engineering teams specialise in Google Cloud Platform (GCP). Our services are solely aimed at increasing release frequency, improving reliability, security and agility across the Route To Live (path to production). We find the 'clear route to live'.
-
COMET BUSINESS GLOBAL SOLUTIONS LTD
The Information Governance Lead assists clients on all Information Governance matters as mandated under the Data Protection laws, Records Management, Governance, Risk & Compliance, and Cyber Security. The Information Governance Lead will serve as an independent expert both internally and with regards to customers, staff or the Regulatory Authorities.
-
SOFTCAT PLC
Amazon Lookout for Metrics uses machine learning (ML) to detect anomalies in metrics. Lookout for Metrics automatically inspects data using ML to create accurate anomaly detection models. When anomalies are detected, Lookout for Metrics groups related anomalies together and provides a severity score to diagnose issues or maximize opportunities.
-
MICROSOFT LIMITED
The solution provides support enabling key Microsoft 365 security features across the Office 365 suite and Windows 10 clients. Planning security and compliance needs and implementing essential security and compliance capabilities, helping organisations know, protect, and govern their data, as well as protect their user's identities, applications, and devices.
-
Agile Business Process UK Limited
Camunda enables organisations to orchestrate, design and improve processes across people, systems and devises to continuously overcome complexity to increase efficiency, such as automation, standardization and improve compliance. Integrating into the major RPA vendors, Low-code platforms and enterprise applications.
-
OLIVE JAR DIGITAL LTD
Olive Jar’s team of Data specialists hold years of experience and skills to support the process of large-scale data solutions for cloud-based digital services. We work closely with our clients to define their structure and strategy to ensure the project is delivered smoothly and efficiently.
-
EXCEEDING LIMITED
eXceeding's Transformation Consultancy will assist with the development of tender documents, including contracts, PQQ and evaluation strategy to support invitation to tender (ITT). Our transformation consultants offer best practice advice without the jargon to develop a strong sourcing strategy
-
LEIDOS INNOVATIONS UK LTD
Leidos offers a data management service that comprises all disciplines related to managing data. Leidos’ services offer support to define, maintain and govern the process of ingesting, storing, maintaining and securing an organisation's data, along with data that is shared and consumed by key stakeholders and end-users.
-
Hitachi Vantara Limited
Hitachi Vantara provides end-to-end consulting services around the strategy, design and delivery of Pentaho solutions. Our edge intelligence, data cataloguing, data engineering and analytics solutions fast-track your ability to unlock data-driven insights. This is made possible by surfacing the value of business, human and machine data for better decision making.
-
REPLY LIMITED
Craft robust data architecture for seamless data management and integration, ensuring scalability and performance. Develop a comprehensive data strategy aligned with business objectives, leveraging data assets for competitive advantage.
-
SIERRA NEVADA CORPORATION MISSION SYSTEMS UK, LTD
SNCMSUK offers a turnkey big data, OSINT and analysis as-a-service capability. Provisioning tools and experienced security cleared analysts, to support defence and national security operations. Leveraging customer furnished and cloud hosted SNCMSUK data to generate operational insight to solve customer challenges. Available as a cloud hosted service.
-
PRICEWATERHOUSECOOPERS LLP
Procurement Analytics is a spend analytics reporting solution that enables organisations to gain visibility of and control third party spend. It integrates data from disparate systems, provides action-oriented insights enabling effective decision making. Leading analytics present graphics including actionable insights around spend visibility, compliance and environmental, social and governance features.
-
FACTORY INTERNET LTD
Our service is primarily aimed at Hosting Virtual Machine and Container workloads within UK based sovereign hosting facilities.
We can host and support complex compute workloads, applications and have methods to assure secure remote access to our services.
-
BOXXE LIMITED
Sophos Network Detection and Response (NDR) virtual appliance monitors traffic to identify suspicious network flows.
NDR detections can trigger an investigation into internal host connections to network servers. They can also be used to enrich threat hunts for endpoint activity to determine which devices are communicating
-
MICHAEL PAGE INTERNATIONAL RECRUITMENT LIMITED
Page Consulting’s Cyber Security service offers a review of your enterprise framework. Also encompasses the approach to securing the enterprise that combines the disciplines of cyber security, business continuity and enterprise resilience.
-
INOAPPS LIMITED
Inoapps provides an extensive range of Managed Services for Oracle PaaS platforms and resident applications. All services are delivered in accordance with ITIL best practice under a structured yet flexible service delivery model.
-
VISIONIST LIMITED
Our end-to-end application migration strategy enables the rearchitecting and rehosting of business-critical applications leveraging the AWS, GCP and Azure platforms. Our strategy includes a cloud readiness, data migration and integration assessment with clear roadmaps and reference architecture requirements for a seamless and secure transition of your legacy LOBs.
-
ACUITY APPLIED LIMITED
Acuity Applied Limited provides a flexible, cost-effective resource solution with whole or partial teams of specialists in Cloud, Digital, Data, and Technology.
Our Team as a Service model helps clients enhance capabilities while adhering to GDS standards, using methodologies like Agile, Scrum, PRINCE2, Lean, RAD, CI/CD, and DevOps.
-
SVL BUSINESS SOLUTIONS LIMITED
SVL supplies enhanced direct routing/operator connect services to deliver connectivity to MS Teams users that allows PBX voice calling capability internally and externally in your organisation. A dedicated SBC is used to securely and resiliently deliver traffic via the internet from your MS Teams users to the telephony network.
-
Chess CyberSecurity Ltd t/a CyberLab
Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization