-
CHARTERHOUSE VOICE & DATA LIMITED
Cirrus provides comprehensive and high quality support services. Our team are available to assist with service requests, incidents or problems and operate within defined service levels. We offer several tiers of support services so that you can select an option that best matches your organisation’s needs.
-
SOFTSERVE SYSTEMS LTD
SoftServe's Document Processing Automation Service uses AI and ML to automate data extraction, processing, and analysis from documents like invoices and claims. This enhances operational efficiency and accuracy for organisations managing high document volumes.
-
ABCONSULTANCY SERVICES LTD
Our Data Discovery Migration and Integration service ensures seamless discovery migration and transformation and integration of data into the database warehouse/lake, across various systems, platforms, and environments. From legacy databases to modern data lakes, we handle the migration process efficiently, minimizing downtime and maximizing data integrity.
-
THALES UK LIMITED
Thales SOC Advisory and Consulting offers a range of services that support organisations in planning, building, implementing, assessing, improving, or optimising Security Operations Centres
-
NIXINFINITY - AI LTD
Technology changes at a fast pace and keeping up with it can be difficult. Our analysis service can be called upon to support you through a range of technology challenges from specific technical issues (bugs etc) through to wider assessments of technology choice and utilisation.
-
Arch
Our specialized, dedicated web hosting solutions will ensure that you remain online no matter what! We will help design the perfect solution for you, including data replication, data security and encryption to give you peace of mind on the web.
-
BROOKCOURT SOLUTIONS LIMITED
Access Management tackles the task of overseeing user access across systems and applications. It empowers administrators to create conditional access policies, granting entry exclusively to users through suitable authentication methods. Elevate security with Multi-Factor Authentication (MFA) while simultaneously enhancing user ease Single Sign-On (SSO) and Passwordless authentication
-
HLE CONSULTING (UK) LIMITED
This service offers comprehensive support from design and implementation to the ongoing management of P3M PMO, ensuring effective P3G governance in cloud computing environments. Extensive experience within secure environments (Border Force, Criminal Justice, Defence, Regulatory and Law Enforcement).
-
APTVISION LIMITED
Self Service Registration and Patient Flow integrates with existing systems to allow a patient's mobile phone to be used to manage their journey through the healthcare department, allowing organisations to manage patient flow in a safer way helping them deal with the challenges caused by the COVID-19 pandemic
-
Airwalk Consulting Reply Ltd
Airwalk Reply’s Project and Programme Management Advisory and Delivery Service provides a wide range of modular services across the entire cloud project lifecycle. Our team of experienced and certified delivery professionals delivers in areas including project mobilisation, business case development, governance, planning, risk management, cost management, programme recovery, and closure.
-
DAEMON SOLUTIONS LIMITED
Daemon Solutions End to end maturity assessment of your cloud implementation.
We will look at how your AWS, Google Cloud Platform or Azure public cloud is architected, secured and scaled. Also how your provisioning is carried out and provide recommendations on best practice implementation and automation
-
PROSPECTIVE LABS LTD
FlowOS Baseline is Prospective’s data processing and analytics product designed to generate and report reliable metrics on existing service performance and the impact of schedule changes. It enables transport planning teams to identify opportunities to improve service delivery, prioritise interventions and monitor the impact of schedule adjustments on service performance.
-
LEFKE IT LIMITED
LefkeIT specializes in Mobile Device Management (MDM) and Mobile Security Consulting. Our expert team provides comprehensive assessments and designs tailored MDM solutions to secure and manage mobile devices across your organization. From policy development to implementation and ongoing support, we ensure data protection and compliance while optimizing productivity.
-
EBENI LIMITED
Ebeni's software development expertise coupled with our understanding of regulation and standards in the given markets in which we operate, means we are ideally qualified to support organisations in gaining approval and certification for innovative new systems and products in the most cost effective way.
-
Riskonnect Active Risk Limited trading as Riskonnect. Historic trading names include Xactium, Active Risk Manager (ARM), Castellan Solutions Ltd, ClearView and CAM Management Solutions Limited (CAMMS)
Active Risk Manager (ARM) is a web-based Project, Programme and Enterprise risk management solution that delivers a configurable range of solutions (Including Risk, Incidents, Controls, Dashboard, Bowtie and Reporting) that supports effective business decision making whilst satisfying requirements across all market sectors.
ARM deployment is offered via cloud or on-premise.
-
NDL SOFTWARE LIMITED
Automate and Connect combined enables access to information that is ‘trapped’ in legacy back-office systems and connect to complex web services quickly and easily. Create highly effective end-to-end integrations, between systems that have no integration capabilities and complex web services, accessing data and getting it where it needs to be.
-
CMC PARTNERSHIP CONSULTANCY LTD
CMC's People Change Management service focuses on managing the people side of change, ensuring that business changes, e.g. processes, tools or technologies, are not only implemented but adopted. This service includes preparing, equipping and supporting individuals to successfully adopt change, realising return on investment and improving organisational efficiency and effectiveness.
-
ADAPTIVE COMMUNICATION SOLUTIONS LTD
ESET's combination of spam filtering, anti malware scanning, anti phishing and cloud sandboxing helps protect your organization against infections and targeted attacks, as well as blocking new, never-before-seen types of threats, especially ransomware.
-
ELCOM SYSTEMS LIMITED
EVOLVE Hospital Inventory Management, stock management, central stores, PPE, stock locations, automatic reordering, barcoding, GS1, patient safety, Scan4Safety, patient costings, WHO checklist, product recalls, theatre loan kits, scanners, reduce stock holding.
Integration with legacy, supply chain and external systems.
-
I3WORKS LTD
Customer Centric Design is one of the high-quality services that i3Works offers. We provide Customer Centric Design practitioners at all levels, from lead to support. Our experience of Customer Centric Design and capability knowledge has been demonstrated across defence, home affairs, central government, infrastructure and local organisations.
-
LAYER 7 LIMITED
Highly skilled expertise in agile security architecture design and cyber assurance of Cloud and on-premise solutions to NCSC standards. Demonstrable experience in secure development, design and assurance of Digitally Secure Cloud Services (DSCS) , Cyber Support to improve cyber health and reduce cyber risk from malware and ransomware.
-
MICHAEL PAGE INTERNATIONAL RECRUITMENT LIMITED
Page Consulting provides Windows Azure Managed Support Services to meet client demands and stakeholder needs ensuring you get the best out of your Azure Cloud Platform. Our Professionals are readily available for deployment utilising excellent CI methodologies.
-
SOPRA STERIA LIMITED
Exit Management ensures the seamless transfer of service delivery responsibilities, encompassing TUPE if necessary, and provides post-exit support between suppliers or back to the customer's organisation. The exit project may cover a full service or specific designated services and may form part of a transition or transformation programme.
-
LOGICALIS UK LIMITED
IBM Power Virtual Server (PVS) is an infrastructure as a service offering management up to the operating system OS by IBM. pay-as-you-use billing, provision server capacity on-demand, and customise your server type including OS images. (AIX, IBMi & Linux).
-
SAPPHIRE TECHNOLOGIES LIMITED
CloudGuard Cloud Native Application Protection Platform (CNAPP), part of the CloudGuard Cloud Native Security platform, allows you to prevent threats and prioritize risks in the cloud across your applications, network, and workloads. From code-to-cloud, this centralized solution includes CSPM, DSPM, CIEM, Workload Protection, CDR, and Code Security.ks.
-
CISILION LIMITED
Liberty RPA is Netcall's AI-powered robotic process automation. It uses software robots to mimic the actions of people performing mundane and cumbersome repetitive tasks that frees-up people and enables them to be more productive.
-
ANS GROUP LIMITED
ANS offers cloud-based RAS solutions for a secure remote connection for Public Sector organisations and their industry partners to connect back to the office networks, applications and data. The range of solutions includes connectivity for Tier 1 - OFFICIAL (including SENSITIVE) with 2-factor authentication, protective monitoring and full end-user support
-
THALES UK LIMITED
As authors of the MoD DefStan for Secure by Design (SbD), Thales have extensive experience and expertise advising customers on the integration of the Secure by Design principles and adaption of Cyber Security Management Systems. Our integration service, product, or solution facilitates the transformation to embed a cyber-security culture.
-
MORSHEAD CONSULTING LIMITED
Modelling and simulation involves constructing abstractions of systems (models) to facilitate experimentation and assessment. A simulation is an imitation of the dynamics of a real-world process or system over time. M&S is used to study, predict or optimise the behaviour of the system(s) / phenomena under consideration.
-
ARMADILLO SEC LTD
Armadillo Sec Ltd are a NCSC CHECK green light approved company offering penetration testing (also known as an IT Health Check, ITHC or pentest) services. We cover all areas of penetration testing such as web/mobile applications, infrastructure, build reviews, cloud environment, wireless, database reviews and vulnerability assessments.