-
PHOENIX SOFTWARE LIMITED
Build , Evaluate and Deploy AI solutions all from one place.
-
IN-TEND LIMITED
In-tend's PCR (Public Contracts Regulations) compliant suite of modular software solutions caters for all end user requirements. From Procurement, DPS (Dynamic Purchasing System), evaluation, contract management, auctions, analytics and vendor management through to full system integration and spend analysis to provide the full end to end process. Secure by design.
-
KYNDRYL UK LIMITED
Offensive security refers to the process of identifying and exploiting vulnerabilities in an organisation's digital systems and infrastructure, to evaluate the effectiveness of its security defences. Offensive Security Services typically include a range of techniques such as Vulnerability Assessments, Penetration Testing, Red Teaming, Social Engineering, and other Ethical Hacking methods.
-
CYBERCX UK LTD
CyberCX offers two assessment types; a risk assessment and a maturity assessment. Both involve a review of the controls baselined against the control framework from the CSF core functions. For the risk assessment, the control gaps are identified and ranked in terms of risk using the bespoke risk management criteria.
-
Computacenter (UK) Ltd
IBM Blueworks Live is an easy-to-use business process discovery and process modelling tool designed for business users, process practitioners, lean and six sigma specialists. This is a software as a service (SaaS) offering.
-
BOOMERANG I-COMMS LTD
Boomcast delivers Broadcast conversational messaging, 2-way SMS, voice, and email bulk communications. Our multi-channel messaging can automatically match responses and deliver them to your email. Schedule automated messaging campaigns across individuals or dynamic groups and create inbound SMS, email, and voice campaigns. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
PEN TEST PARTNERS LLP
PTP can offer data recovery services on a variety of storage mediums, including failing or clicking hard drives, RAID or server storage, and mobile phones or cloud hosted content. Using bespoke forensic tools and specialised techniques, PTP are able to retrieve lost, deleted or inaccessible data from storage devices.
-
EUROPEAN DYNAMICS UK LTD
CPMS is a virtual office for modern organisations. It offers a common workspace containing documents, deliverables, communications and procedures related to contracts. CPMS is tailored to public organisation requirements for contract management and supplier performance, allowing concurrent management of multiple contracts/suppliers. CPMS manages documents, projects, calendars, meetings, KPIs/costs and reporting.
-
ST-FOUR LIMITED
Design, Implement & Manage Software & Hardware endpoint management software to centrally discover & manage your endpoint devices. Centrally push out images, configure system settings, push out applications, remote control devices anywhere, encrypt devices, patch systems & produce reports. Novell, OpenText, Microsoft, ZENworks, Liquit, SCCM, MECM, Intune.
-
BLUEFORT SECURITY LIMITED
CrowdStrike Services delivers incident response, technical assessments, training, and advisory services that help you prepare to defend against advanced threats, respond to widespread attacks, and enhance your cybersecurity practices and controls.
-
Policy in Practice
Our benefits calculator is accurate, comprehensive and helps councils, local authorities, and welfare services identify residents eligible for Universal Credit, legacy benefits, local support schemes, and social tariffs. The Benefits Calculator supports benefit take-up campaigns, improves financial inclusion, and helps residents maximise income and reduce arrears by accessing unclaimed benefits
-
AVANTIS PERFORMANCE LTD
Avantis’ project, program and portfolio management services for cloud-based initiatives offer comprehensive oversight, coordination, and execution tailored to your specific needs, aligning with industry recognised best practice. From Portfolio balancing to project closeout, we ensure efficient delivery, cost optimisation, and seamless integration within your organisations cloud environment.
-
MH&A
MH&A align our quality assurance service to Prince2 and ISO 9001, using robust frameworks. Based on our public sector and domain expertise, we establish detailed assurance frameworks to ensure new services and functions are used as designed and approaches to improving implementation and take up are optimised.
-
Veracity Consulting
Specialist professional information technology support service across NHS and Healthcare transformation programmes including technical architecture, information and systems analysis, security consultancy, development, user research, product management, user interface design, content management, technical consultancy, test strategy and implementation, liaison and management with third parties and stakeholder engagement.
-
ARKE LTD
Arke’s approach to technology roadmapping is methodical, collaborative and actionable. We help you answer three fundamental questions - “Where are we now? Where do we want to be? How do we get there?”, Using this architecture as the foundation, we build compelling narratives and coherent visions informing actions and planning.
-
CYBEXER TECHNOLOGIES
Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.
-
COLOURS OF DATA LTD.
Specialising in IT project management, we excel at overseeing large data projects with a focus on data usage and analysis. Our approach integrates professional communication and IT expertise, ensuring alignment with business objectives and fostering collaboration. By leveraging our experience, we optimise project outcomes, driving efficiency and reliability.
-
Infonetica Ltd
"EthicsRM" is a cloud-based Research Ethics Compliance Review Management system helping researchers collaborate on, submit, track and manage ethics applications, ethics reviews and ethics approvals. Users include Research Administrators, Ethics Administrators, Research Office at research universities, hospitals, Institutional Review Boards and government bodies to manage workflows for Ethics Committees.
-
TRANSFORMCX LIMITED
TransformCX's Cloud Native Integration Services Development, Configuration, and Testing service offers comprehensive support for organizations seeking to develop, configure, and test cloud-native integration solutions. We provide end-to-end services, including architecture design, development, configuration, testing, and deployment, to enable seamless integration of cloud-based applications and services.
-
PHOENIX SOFTWARE LIMITED
Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service.
You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
ADECCO UK LIMITED
Adecco analyse and develop cyber security architecture functions, strategic objections, and align the capability and Digital agenda. We undertake an organisational-wide review to understand threats and residual risks incorporating ISO27001, SIRA, CISSP and Cyber essentials, developing profile and risk levels, advising on suitable cloud migration software and technologies.
-
ERNST & YOUNG LLP
Technology-enabled transformation; merging Artificial Intelligence (AI), generative AI, Robotic Process Automation (RPA) and analytics to accelerate processes and make human-like decisions. More than digital tools, a route to strategic, transformational change through Intelligent Automation; meeting policy objectives and citizen needs, combining skilled people and ‘digital workers’ for holistic process improvement.
-
PHOENIX SOFTWARE LIMITED
Rapidly deploy and manage private 5G networks at the enterprise edge
-
LEADERSHIP THROUGH DATA LTD
Providing Microsoft 365 consultancy such as:
Tenancy reviews, Information 365 Design, Information Governance and Assurance, Migration plans, Information strategy, Information Discovery and Information Architecture.
-
APPLIED DATA SCIENCE PARTNERS LTD
ADSP offers strategic planning and a clear roadmap for AI adoption through our AI Strategy and Roadmap Development service. We guide organisations through the complexities of integrating AI into their operations, ensuring alignment with business goals for long-term success.
-
CDW LIMITED
Microsoft Entra ID Governance is an identity governance solution that enhances productivity, strengthens security, and facilitates compliance. It automates identity and access lifecycle management, provides visibility, and allows delegation to business groups. Key features include identity lifecycle management, access governance, and secure privileged access for administration.
-
SPECIALIST COMPUTER CENTRES PLC
Effortlessly integrate PSTN calling into Teams across desktop and mobile. Our comprehensive solution, including SIP, contact centre, call recording, and devices is designed to replace outdated PBXs and ISDN reliance. Enjoy ongoing management automation, referenceable deployment, expert support and innovative integration for a seamless transition to cloud communications.
-
SOFTCAT PLC
Competencies across our key vendors - VMware, Microsoft, Dell, HPE, Nutanix, Cisco, Cisco Meraki, Fujitsu, Netapp and Pure - Softcat Architecture capabilities cover a multitude of technology design options. These are inclusive of but not limited to: Migrations, Virtualisation, Optimisation, Architecture and Design, Cloud Ops, Cloud Security and Cloud Modernisation.
-
EAPPSYS LIMITED
• Support and development of extensions via Visual Builder, SOA Cloud service integrations and RESP APIs
• Level 3 support for Integrations configured via OIC
• Development of new enhancements to extensions / integrations
• Visual Builder developments
• Code deployments with Visual builder
-
Node4 Ltd
Our Solution Architecture service collaborates closely with clients to design scalable, secure digital or cloud solutions, ensuring alignment with business objectives and technical requirements. It provides architectural oversight, governance, and expert advice, facilitating successful implementation and integration across multiple technology stacks.