-
Advania
Advania's Managed Device Service provides proactive support and maintenance, ensuring optimal endpoint device health, security and user experience. We prescribe and regularly updating security baselines and core business applications. Our Managed Device service supports Windows Operating System and mobile devices, leveraging Windows 10 or 11, Azure AD, Intune, and Autopilot.
-
Proact IT UK Limited
The Proact Hybrid Cloud (PHC) platform provides an Infrastructure as a Service including scalable compute, storage and network resources. The PHC platform is hosted within Proact’s data centre. The service includes 24x7x365 remote monitoring, support and management of the PHC platform.
-
PRICEWATERHOUSECOOPERS LLP
Specialist services to implement and use cloud eDiscovery systems, such as Nuix and Relativity, which enable clients to identify, collect, preserve, search, analyse and disclose data. Techniques such as forensic capture and imaging, evidence handling, data processing, data visualisation and keyword searching are used to find relevant information quickly.
-
I-NET SOFTWARE SOLUTIONS LTD
We will map your existing data sets and perform data quality analysis to determine the steps needed to transform and cleanse your data prior to migration to cloud services. Our experts have over 20 years experience with data analysis and data migration, specialising in cloud services and open data standards.
-
CLUSTER GREENS LIMITED
Our service is designed to help organisations navigate the complexities of cloud-adoption and create a robust-roadmap for successful implementation.Whether you’re considering a move to the cloud or need to optimise existing cloud environment,our expert consultants collaborate closely with your team to develop a tailored strategy that aligns with your business-objectives.
-
ALSCIENT LIMITED
Alscient's Service Management is comprised of two phases, Transition Phase (set up the Support Desk) and In-Life Phase (cover the provision of the Support Desk and inclusive hours). It includes system administration support, configuration, customisation, fixes and minor enhancements requested/driven by the customer or by Alscient's Continuous Improvement Programme.
-
GET SWARMS LIMITED
GSL can host your databases on Google Cloud Platform, offering scalable, reliable, and fully managed services. We provide solutions for relational databases like Cloud SQL, and NoSQL options such as Firestore and Bigtable, ensuring efficient storage, management, and analysis of both structured and unstructured data for your organization.
-
HYPER TALENT SOLUTIONS LTD
Hyper Talent Solutions Ltd specializes in Regression Testing services customized for government departments. Our thorough approach ensures the stability and reliability of software solutions by detecting any unintended changes. With advanced tools and expert testers, we deliver high-quality outcomes, ensuring compliance and minimizing risks for efficient Regression Testing solutions.
-
GOACO GROUP LTD
Goaco's ITSM/ITIL Delivery Management ensures efficient IT service delivery aligned with ITIL best practices. Our experts oversee service strategy, design, transition, and operation phases, optimising processes and resources. With robust governance and continuous improvement, we enhance service quality and customer satisfaction in line with business goals.
-
PHOENIX SOFTWARE LIMITED
Build , Evaluate and Deploy AI solutions all from one place.
-
IN-TEND LIMITED
In-tend's PCR (Public Contracts Regulations) compliant suite of modular software solutions caters for all end user requirements. From Procurement, DPS (Dynamic Purchasing System), evaluation, contract management, auctions, analytics and vendor management through to full system integration and spend analysis to provide the full end to end process. Secure by design.
-
KYNDRYL UK LIMITED
Offensive security refers to the process of identifying and exploiting vulnerabilities in an organisation's digital systems and infrastructure, to evaluate the effectiveness of its security defences. Offensive Security Services typically include a range of techniques such as Vulnerability Assessments, Penetration Testing, Red Teaming, Social Engineering, and other Ethical Hacking methods.
-
CYBERCX UK LTD
CyberCX offers two assessment types; a risk assessment and a maturity assessment. Both involve a review of the controls baselined against the control framework from the CSF core functions. For the risk assessment, the control gaps are identified and ranked in terms of risk using the bespoke risk management criteria.
-
Computacenter (UK) Ltd
IBM Blueworks Live is an easy-to-use business process discovery and process modelling tool designed for business users, process practitioners, lean and six sigma specialists. This is a software as a service (SaaS) offering.
-
BOOMERANG I-COMMS LTD
Boomcast delivers Broadcast conversational messaging, 2-way SMS, voice, and email bulk communications. Our multi-channel messaging can automatically match responses and deliver them to your email. Schedule automated messaging campaigns across individuals or dynamic groups and create inbound SMS, email, and voice campaigns. ISO-27001, Cyber Essentials and Cyber Essentials Plus accredited
-
PEN TEST PARTNERS LLP
PTP can offer data recovery services on a variety of storage mediums, including failing or clicking hard drives, RAID or server storage, and mobile phones or cloud hosted content. Using bespoke forensic tools and specialised techniques, PTP are able to retrieve lost, deleted or inaccessible data from storage devices.
-
EUROPEAN DYNAMICS UK LTD
CPMS is a virtual office for modern organisations. It offers a common workspace containing documents, deliverables, communications and procedures related to contracts. CPMS is tailored to public organisation requirements for contract management and supplier performance, allowing concurrent management of multiple contracts/suppliers. CPMS manages documents, projects, calendars, meetings, KPIs/costs and reporting.
-
ST-FOUR LIMITED
Design, Implement & Manage Software & Hardware endpoint management software to centrally discover & manage your endpoint devices. Centrally push out images, configure system settings, push out applications, remote control devices anywhere, encrypt devices, patch systems & produce reports. Novell, OpenText, Microsoft, ZENworks, Liquit, SCCM, MECM, Intune.
-
BLUEFORT SECURITY LIMITED
CrowdStrike Services delivers incident response, technical assessments, training, and advisory services that help you prepare to defend against advanced threats, respond to widespread attacks, and enhance your cybersecurity practices and controls.
-
Policy in Practice
Our benefits calculator is accurate, comprehensive and helps councils, local authorities, and welfare services identify residents eligible for Universal Credit, legacy benefits, local support schemes, and social tariffs. The Benefits Calculator supports benefit take-up campaigns, improves financial inclusion, and helps residents maximise income and reduce arrears by accessing unclaimed benefits
-
AVANTIS PERFORMANCE LTD
Avantis’ project, program and portfolio management services for cloud-based initiatives offer comprehensive oversight, coordination, and execution tailored to your specific needs, aligning with industry recognised best practice. From Portfolio balancing to project closeout, we ensure efficient delivery, cost optimisation, and seamless integration within your organisations cloud environment.
-
MH&A
MH&A align our quality assurance service to Prince2 and ISO 9001, using robust frameworks. Based on our public sector and domain expertise, we establish detailed assurance frameworks to ensure new services and functions are used as designed and approaches to improving implementation and take up are optimised.
-
Veracity Consulting
Specialist professional information technology support service across NHS and Healthcare transformation programmes including technical architecture, information and systems analysis, security consultancy, development, user research, product management, user interface design, content management, technical consultancy, test strategy and implementation, liaison and management with third parties and stakeholder engagement.
-
ARKE LTD
Arke’s approach to technology roadmapping is methodical, collaborative and actionable. We help you answer three fundamental questions - “Where are we now? Where do we want to be? How do we get there?”, Using this architecture as the foundation, we build compelling narratives and coherent visions informing actions and planning.
-
CYBEXER TECHNOLOGIES
Highly scalable, flexible and high availability cyber range platform. The main function of a cyber range is to provide realistic simulated environments for exercises, trainings, security/technology testing and other simulations. The platform also includes a target library and features that enable integration of special systems or creating custom scenarios.
-
COLOURS OF DATA LTD.
Specialising in IT project management, we excel at overseeing large data projects with a focus on data usage and analysis. Our approach integrates professional communication and IT expertise, ensuring alignment with business objectives and fostering collaboration. By leveraging our experience, we optimise project outcomes, driving efficiency and reliability.
-
Infonetica Ltd
"EthicsRM" is a cloud-based Research Ethics Compliance Review Management system helping researchers collaborate on, submit, track and manage ethics applications, ethics reviews and ethics approvals. Users include Research Administrators, Ethics Administrators, Research Office at research universities, hospitals, Institutional Review Boards and government bodies to manage workflows for Ethics Committees.
-
TRANSFORMCX LIMITED
TransformCX's Cloud Native Integration Services Development, Configuration, and Testing service offers comprehensive support for organizations seeking to develop, configure, and test cloud-native integration solutions. We provide end-to-end services, including architecture design, development, configuration, testing, and deployment, to enable seamless integration of cloud-based applications and services.
-
PHOENIX SOFTWARE LIMITED
Sophos MDR Essentials offers 24/7 threat hunting, detection, and response delivered by an expert team as a fully managed service.
You control how and when potential threats are escalated, what response actions (if any) you want Sophos to take, and who should be included in communications.
-
ADECCO UK LIMITED
Adecco analyse and develop cyber security architecture functions, strategic objections, and align the capability and Digital agenda. We undertake an organisational-wide review to understand threats and residual risks incorporating ISO27001, SIRA, CISSP and Cyber essentials, developing profile and risk levels, advising on suitable cloud migration software and technologies.