-
AKITA SYSTEMS LIMITED
Akita Intelligent Solutions will deploy a new instance of Microsoft Dynamics 365 Customer Insights (formerly Marketing) into your organisation for a fixed price.
-
4NET TECHNOLOGIES LTD
FourNet's Deception Based Breach Protection deploys decoy technology to create proactive security by tricking attackers into revealing themselves. Offering an innovative approach to network defence, enhancing threat detection and response through engagement with false vulnerabilities, thus protecting real assets by diverting and studying potential threats in a controlled environment.
-
NTT DATA UK LIMITED
This TOGAF-based methodology service analyses your current architecture, envisions the end-state architecture, and charts a roadmap for its realisation. We conduct comprehensive gap analyses, estimate high-level costs, and project the benefits of cloud deployment, ensuring a thorough understanding and effective transformation of your IT landscape through leveraging optimal modernisation strategies.
-
NINE23 LTD
Nine23 offers cloud-based RAS solutions for a secure remote connection for Public Sector organisations and their industry partners to connect back to the office networks, applications and data. The range of solutions includes connectivity for Tier 1 - OFFICIAL (including SENSITIVE) with 2-factor authentication, protective monitoring and full end-user support.
-
DEEPER THAN BLUE LTD
Our team of integration consultants specialises in seamlessly integrating diverse products and software within intricate environments to fulfill specific business requirements. With extensive expertise in patterns and tools, we adeptly unite modern online platforms with legacy applications, leveraging technologies; IBM App Connect Enterprise (ACE) and IBM App Connect Professional
-
CREDERA LIMITED
Credera provides consulting, architecture and engineering services in Machine Learning covering both model development and roll-out at scale within an enterprise environment. We help you adopt a best-practice framework for your in-house Data Science and MLOps functions that aligns to business drivers, supports rapid prototyping, and delivers measurable ROI.
-
CLARANET LIMITED
Internal management system audits are a requirement of ISO 27001. Internal audits are necessary because they assist in identifying and correcting weaknesses in your information security management systems. An expert Claranet ISO 27001 consultant can guide you through requirements and get the most from an internal audit.
-
CHR Solutions Ltd
The public sector software development consultancy service, a bespoke service aimed at enhancing software development capabilities within UK public sector. This service caters to DevOps engineers, software engineers, and frontend engineers at all levels, focusing on fostering innovation, efficiency, and best practices in software development tailored to public sector needs.
-
FULLPROXY LIMITED
F5 BIG-IP Virtual Editions are application delivery controllers that run on hypervisors and clouds, providing advanced traffic management, web application firewall, DNS services, and identity and access management. Multiple VEs can be purchased through an Enterprise Licensing Agreement for cost savings and flexible scaling.
-
CAPGEMINI UK PLC
Technology is transforming the way HR functions operate, focusing on digital first strategies, self-service, and automation to simplify processes and provide seamless experiences.
Capgemini's HR Strategy and Operating Model Transformation offer enables organisations to better understand how to apply HR cloud based technologies to meet needs of the modern workplace.
-
ENFUSE GROUP LTD
Our Project and Programme Management services are a comprehensive blend of traditional and agile methodologies, covering PRINCE2, MSP, APM, PMI, Scrum, Kanban, and Agile. Emphasising project governance, stakeholder management, and risk mitigation, we ensure successful delivery across the full lifecycle.
-
Knox Cyber Security Ltd
We can conduct code review as an integrated, iterative or stand-alone activity to support digital delivery via web applications utilising open source technologies.
Our approach identifies challenging issues to identify or exploit without access to the code. Options are available to balance thoroughness and cost to deliver an appropriate service.
-
ADAPTAVIST UK SERVICES LTD
We bring our expertise and hands-on techniques into your organisation to work on your issues. We start by helping to align around delivering business value. We will help embed the agile mindset across your people and culture and processes at every level of your organisatio, so agile practices can scale.
-
Nomensa Ltd
iOS mobile application development, driven by user research and user experience. Delivery from Discovery to Live. Design, implement, deliver and host mobile applications that work across all devices, browsers and operating systems. Working across platforms and integrating with existing cloud systems.
-
Google Cloud EMEA Limited
Google Cloud Identity-Aware Proxy is a tool that helps control access, based on a user's identity and group membership, to applications running on Google Cloud Platform.
-
NTT DATA UK LIMITED
We help organisations design useful and delightful services that span multiple channels and products for both customers and employees. Our approach is centred around user desirability, technical feasibility and business viability to ensure we deliver a holistic and actionable strategy for your people, processes and systems.
-
Nomensa Ltd
Project Management as a Service (PMaaS) provides Project Managers and Business Analysts using a flexible resource model at a predictable cost. We supply a complete range of Project Management services, including Project Management Office (PMO), undertaking assessments, delivering tools and people to improve your delivery capability and performance.
-
TMC3 LIMITED
tmc3’s Cyber Essentials Consultancy Services provide comprehensive guidance and support to help your organisation achieve Cyber Essentials certification. We assist in implementing essential security controls, ensuring your business is resilient against common cyber threats. This service supports the achievement or alignment to Cyber Essentials and Cyber Essentials +
-
CreateFuture
Establish a technology strategy and roadmap aligned to your organisational goals. Our enterprise architects will define principles guiding technology decisions for cloud migrations. These principles drive lightweight processes balancing your teams' freedom with alignment to your overall technology strategy.
-
SCRUMCONNECT LIMITED
Our AI-Driven Chatbot Solutions utilize advanced natural language processing and machine learning algorithms to create intelligent conversational agents that interact with users in real-time. These chatbots are designed to understand and respond to user inquiries, provide personalized recommendations, and perform tasks such as booking appointments, answering FAQs, and processing orders.
-
CAMBRIDGE MANAGEMENT CONSULTING LIMITED
Benefit from our years of experience focussing on the importance of Stakeholder Engagement/Management. Discover how vital this is for successful project delivery, and the success you gain from properly engaged people. Gain success with our benefits driven methodology for all stakeholders in your cloud-based project.
-
Go Vocal
Go Vocal is the all-in-one platform for community consultation and engagement. Reach your residents and other stakeholders using a wide set of methods, manage their input efficiently, and receive automated insights to better inform decision-making.
-
ROWE IT LIMITED
Provision of fully managed services, support and maintenance of bespoke solutions, developed inhouse or via a 3rd party, on AWS.
We provide secure, robust and scalable managed service, following our ISO9001 and ISO27001 processes. As AWS partners we are well versed in migrating, hosting, supporting and maintaining cloud systems.
-
4MOST (EUROPE) LIMITED
4most support end to end data transformation programmes throughout the lifecycle, including strategy, governance, design, build, test and run. As industry-leading experts in data management, our platform agnostic approach ensures we provide the best possible solutions for our clients.
-
SA GROUP LTD
We provide digital services across the full lifecycle of your smart programme or project. We are experienced in the implementation of UK Government GDS design principles and service standards and have successfully delivered digital programmes within the public sector using P3M/Cyber/Data/Culture/Technology model to ensure your project’s success end to end.
-
GHD
GHD will work with you and your stakeholders to break down complex problems into approachable statistically answerable questions and apply sophisticated modelling, machine learning and AI to solve them. Our technical experts bring with them a wealth of experience interrogating and producing insight from disparate and complex cloud data sources.
-
Chorus
We help organisations to implement Microsoft 365 to gain maximum value of all the products and features available to them across productivity, security and compliance. Through our proven roadmap and project methodology we ensure all features have been correctly implemented so you benefit from Zero Trust security and compliance.
-
KPMG LLP
We help our clients to make risk, policy, compliance, controls and assurance transformation simpler by combining business and sector knowledge with technology experience.
Our leading practice Target Operating Models (TOM) are designed specifically for Central Government, Local Government, Higher Education, Policing and Healthcare with pre-configured technology accelerators available on ServiceNow.
-
SQEPTECH LTD
Unified Human Capital Management combines our Cornerstone HR solutions, Recruiting & Onboarding, Learning and Performance Management with Cornerstone’s core HR Management solution. A single platform for Recruitment, Onboarding, Learning, Skills Development, Goals, Performance, Careers, Succession, HR and Planning. Cornerstone HCM Solutions are also available as standalone modules.
-
PENTEST PEOPLE LIMITED
CIE scenario led exercises where all representatives are in their normal work environment and respond to controlled injects (paper based or consultant-led technical attacks) to represent a cyber incident scenario. Activities and decisions are designed to happen in almost real-time, dictated by the exercise controller.