We use some essential cookies to make this service work.
We’d also like to use analytics cookies so we can understand how you use the service and make improvements.
You can change your cookie settings at any time.
Beta Help us improve the Digital Marketplace - send your feedback
35 results found containing "SA Group" in Lot 3: Cloud support in the category Security services
SA Group Ltd
Our Secure by Design (SbD) Assurance service provides assurance of information systems and services at Official, Secret and Above Secret, including on premise and cloud environments. We integrate with project teams to implement Secure by Designs principles throughout the project or product lifecycle, at the strategic, programme and project level.
We implement business transformation and cloud solutions, including delivering requirements, user stories and business analysis justification for change. Using best practice methodologies with proven success in delivering organisational and business change. Our analysts document the current state, the future/target state and a route for transition of a business solution.
We will deliver Risk Management with qualified, experienced professionals using tailored, best practice risk methodologies and Risk Management Tools to identify, evaluate, and prioritise risk profile. This is consolidated by the co-ordinated and economical application of resources to minimise, monitor, and control the impact of risks or to maximize opportunities.
Our Secure by Design (SbD) Assurance for Defence service is tailored to customers operating with or within UK Defence. We provide assurance of information systems and services at Official, Secret and Above Secret, including on premise and cloud environments. We integrate SbD with specific MOD standards, policies and procedures.
The Risk Assessment service captures your security baseline, identifying risks and vulnerabilities with remediation recommendations. A Cyber Security Risk Assessment identifies the information assets that could come under Cyber attack and the risks that affect those assets. This allows the creation and maintenance of an effective cyber security plan.