Skip to main content

Help us improve the Digital Marketplace - send your feedback

Search results

224 results found

224 results found containing keep information security services in All lots

  • virtual Chief Information Security Officer (vCISO)

    KEEP Information Security Services

    virtual Chief Information Security Officer (vCISO) by KEEP. This service provides you with a dedicated and experienced consultant who becomes the trusted adviser to the organisation. Providing your organisation with the CISO capabilities without the associated full-time costs.

  • Cloud Security Consultancy

    KEEP Information Security Services

    Cloud Security Consultancy by KEEP. This service provides you with our Microsoft Azure & O365 baseline reviews, providing actionable priorities to understand any gaps or mis-configuration that may increase the risks and vulnerabilities to the organisation.

  • Cyber Security Transformation

    KEEP Information Security Services

    Cyber Security Transformation by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and transform cyber security controls across your organisation to increase your overall cyber security posture and maturity.

  • Cyber Security Consultancy

    KEEP Information Security Services

    Cyber Security Consultancy by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and improve cyber security controls across your organisation to increase your overall cyber security posture and maturity.

  • Microsoft Defender 365 services

    KEEP Information Security Services

    Microsoft Defender 365 services by KEEP. Our consultants have years of experience with Microsoft Defender 365, where we provide clients with engineering support, configuration assessments and new feature introductions alongside KQL support. To ensure you make the best use of Microsoft Defender 365 and associated services.

  • 3rd Party Risk Review

    KEEP Information Security Services

    3rd Party Risk review by KEEP. 3rd Party risk is becoming an ever-increasing problem. Various attacks originate from 3rd parties; via malicious software packages, hacked systems or poor cyber security governance. We work with you to understand your organisation, context, threats faced, risk appetite, senior management, nuances and supply chain.

  • NCSC Cyber Assessment Framework (CAF)

    KEEP Information Security Services

    NCSC Cyber Assessment Framework (CAF) by KEEP. This service provides clear guidance regarding the NCSC CAF, understanding your current readiness, identifying gaps and assisting you to implement strategies, roadmaps, tooling and projects to align compliance with the NCSC CAF requirements.

  • Security By Design

    Experienced Management Consultants Limited

    Security by Design helps ensure organisations keep information and other assets secure by design and by default. We specify, design, plan and implement how security runs as a "golden thread" through the organisation and its service solutions. We have led creation of pan-government tier-2 services, the implementation of micro-segmentation etc.

  • NIS / NIS2 Consultancy

    KEEP Information Security Services

    NIS2 Consultancy by KEEP. Our consultants hold a wealth of experience in reviewing, understanding, prioritising and assisting organisations meet the control requirements of the NIS2 directive alongside the completion of Operators of Essential Services (OES) returns.

  • Attack Surface Mapping

    KEEP Information Security Services

    Attack Surface Mapping by KEEP. This service allows you to understand your true risks in the context of your organisation, your risk appetite, the threats faced and the likely areas that will be targeted. These targeting opportunities form your organisations unique “Attack Surface”. Our Consultants highlight your attack surface(s).

  • Cyber Security Services

    Keep IT Simple Limited

    Our Cyber security services specialise in keeping systems secure, protected and compliant in collaboration with public sector. Our personnel are highly efficient, knowledgeable and operate to all known security frameworks and industry best practice providing both hands on technical skills and information security assurance.

  • Cloud and Cyber Security Service

    MOBILISE CLOUD SERVICES LIMITED

    Mobilise provide a range of security services to protect critical workloads from Well Architected Reviews through to Security Event and Information Management (SIEM) Services. Working across cloud and hybrid cloud environments, Mobilise strengthen the security posture of interconnected systems and datasources in accordance with GDS and NCSC cybersecurity principles.

  • Cyber Threat Modelling (CTM)

    KEEP Information Security Services

    Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.

  • Microsoft Kusto Query Language (KQL) support

    KEEP Information Security Services

    Microsoft Kusto Query Language (KQL) support by KEEP. Our consultants have years of experience with Microsoft KQL and can help you with advanced hunting and queries required in both Microsoft Defender 365 and Microsoft Sentinel to extract, report, dashboard, alert and monitor specific threats or requirements.

  • Data Security and Protection Toolkit (DSPT)

    INFORMATION GOVERNANCE SERVICES LIMITED

    We are an information governance and data protection consultancy firm who provide expert advice. We can assist in drafting and submitting any necessary documentation and work with you to get that practice in place before the submission is due.

  • ISO/IEC 27001:2022 Certification Consultancy

    Fortis Cyber Security Limited

    Fortis offers a range of ISO 27001 implementation and certification consultancy support services from a one-off gap assessment to complex multi-standard integrated management system projects, in addition to the ongoing maintenance and assurance of your ISMS. All services can be tailored to suit your organisation’s specific objectives, budget and timeline.

  • Data Protection Policies and Procedures

    INFORMATION GOVERNANCE SERVICES LIMITED

    We specialise in drafting data protection and information governance policy documentation. We can draft policies from scratch, or we can review and revise current policies you already have. We will work with the Buyer to ensure that the policies are also followed in practice.

  • Data Protection and IG Training

    INFORMATION GOVERNANCE SERVICES LIMITED

    We are an information governance and data protection consultancy firm who provide expert advice to organisations on how to enact best practices and be lawful and compliant with data protection legislation. We work with a multitude of different clients, and we help organisations make the most of their data.

  • Data Protection Consultancy

    INFORMATION GOVERNANCE SERVICES LIMITED

    We are an information governance and data protection consultancy firm who provide expert advice to organisations on how to enact best practices and be lawful and compliant with data protection legislation. We work with a multitude of different clients, and we help organisations make the most of their data.

  • Data Protection Officer services (DPO) / IG Lead

    INFORMATION GOVERNANCE SERVICES LIMITED

    Our trained consultants are experts in data protection law, and we offer DPO as a service for organisations. One of our experienced consultants will be appointed as the named Data Protection Officer for your organisation.

  • Data Protection Impact Assessments (DPIAs)

    INFORMATION GOVERNANCE SERVICES LIMITED

    As an organisation, you may be required to undertake a data protection risk assessment (DPIA) . With us, you get the safety and security of trained professionals undertaking a deep dive in a particular project to assess any associated risks, before they develop.

  • Cloud Platform Assessment - AWS

    NCC Group Security Services Limited

    To provide assurance that Amazon Web Service (AWS) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of AWS cloud services within the business.

  • Cloud Platform Assessment – Google Cloud Platform

    NCC Group Security Services Limited

    To provide assurance that Google Cloud Platform (GCP) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of GCP cloud services within the business.

  • NCC Group Cloud Platform Assessment – Azure

    NCC Group Security Services Limited

    To provide assurance that Azure cloud services, including O365, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of Azure cloud services within the business.

  • Amazon Web Services (AWS) Training Courses for Security Engineers

    QA LIMITED

    The courses in this listing teach learners how to efficiently use AWS security services to stay secure in the AWS Cloud. They learn AWS-recommended security practices for enhancing security of data and systems in the cloud, and security features of AWS key services including compute, storage, networking and database services.

  • Netscout Arbor Enterprise Manager (DDoS Protection)

    Khipu Networks Limited

    This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.

  • UK GDPR / GDPR and Data Protection Health Check

    INFORMATION GOVERNANCE SERVICES LIMITED

    Before you can address any issues which may exist, you need to conduct a health check or a gap analysis of your organisation. We provide thorough gap analyses and health checks for organisations, regardless of your size or industry, unique to each client.

  • e2e Secure Cloud Website Hosting Service

    e2e-assure Ltd

    A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.

  • Informu Information Asset Register and Management System

    INFORMU SOLUTIONS LIMITED

    The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.

  • Endpoint Security for Cloud Access

    LEFKE IT LIMITED

    Lefke IT offers tailored Endpoint Security for government cloud access, featuring protection platforms, secure VPN, and threat detection. Our services ensure real-time monitoring, policy enforcement, and vulnerability management, bolstering cloud data security. Clients can confidently adopt cloud computing while maintaining network integrity.