-
KEEP Information Security Services
virtual Chief Information Security Officer (vCISO) by KEEP. This service provides you with a dedicated and experienced consultant who becomes the trusted adviser to the organisation. Providing your organisation with the CISO capabilities without the associated full-time costs.
-
KEEP Information Security Services
Cloud Security Consultancy by KEEP. This service provides you with our Microsoft Azure & O365 baseline reviews, providing actionable priorities to understand any gaps or mis-configuration that may increase the risks and vulnerabilities to the organisation.
-
KEEP Information Security Services
Cyber Security Transformation by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and transform cyber security controls across your organisation to increase your overall cyber security posture and maturity.
-
KEEP Information Security Services
Cyber Security Consultancy by KEEP. This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and improve cyber security controls across your organisation to increase your overall cyber security posture and maturity.
-
KEEP Information Security Services
Microsoft Defender 365 services by KEEP. Our consultants have years of experience with Microsoft Defender 365, where we provide clients with engineering support, configuration assessments and new feature introductions alongside KQL support. To ensure you make the best use of Microsoft Defender 365 and associated services.
-
KEEP Information Security Services
3rd Party Risk review by KEEP. 3rd Party risk is becoming an ever-increasing problem. Various attacks originate from 3rd parties; via malicious software packages, hacked systems or poor cyber security governance.
We work with you to understand your organisation, context, threats faced, risk appetite, senior management, nuances and supply chain.
-
KEEP Information Security Services
NCSC Cyber Assessment Framework (CAF) by KEEP. This service provides clear guidance regarding the NCSC CAF, understanding your current readiness, identifying gaps and assisting you to implement strategies, roadmaps, tooling and projects to align compliance with the NCSC CAF requirements.
-
Experienced Management Consultants Limited
Security by Design helps ensure organisations keep information and other assets secure by design and by default.
We specify, design, plan and implement how security runs as a "golden thread" through the organisation and its service solutions.
We have led creation of pan-government tier-2 services, the implementation of micro-segmentation etc.
-
KEEP Information Security Services
NIS2 Consultancy by KEEP. Our consultants hold a wealth of experience in reviewing, understanding, prioritising and assisting organisations meet the control requirements of the NIS2 directive alongside the completion of Operators of Essential Services (OES) returns.
-
KEEP Information Security Services
Attack Surface Mapping by KEEP. This service allows you to understand your true risks in the context of your organisation, your risk appetite, the threats faced and the likely areas that will be targeted.
These targeting opportunities form your organisations unique “Attack Surface”. Our Consultants highlight your attack surface(s).
-
Keep IT Simple Limited
Our Cyber security services specialise in keeping systems secure, protected and compliant in collaboration with public sector. Our personnel are highly efficient, knowledgeable and operate to all known security frameworks and industry best practice providing both hands on technical skills and information security assurance.
-
MOBILISE CLOUD SERVICES LIMITED
Mobilise provide a range of security services to protect critical workloads from Well Architected Reviews through to Security Event and Information Management (SIEM) Services. Working across cloud and hybrid cloud environments, Mobilise strengthen the security posture of interconnected systems and datasources in accordance with GDS and NCSC cybersecurity principles.
-
KEEP Information Security Services
Cyber Threat Modelling by KEEP. This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.
-
KEEP Information Security Services
Microsoft Kusto Query Language (KQL) support by KEEP. Our consultants have years of experience with Microsoft KQL and can help you with advanced hunting and queries required in both Microsoft Defender 365 and Microsoft Sentinel to extract, report, dashboard, alert and monitor specific threats or requirements.
-
INFORMATION GOVERNANCE SERVICES LIMITED
We are an information governance and data protection consultancy firm who provide expert advice. We can assist in drafting and submitting any necessary documentation and work with you to get that practice in place before the submission is due.
-
Fortis Cyber Security Limited
Fortis offers a range of ISO 27001 implementation and certification consultancy support services from a one-off gap assessment to complex multi-standard integrated management system projects, in addition to the ongoing maintenance and assurance of your ISMS.
All services can be tailored to suit your organisation’s specific objectives, budget and timeline.
-
INFORMATION GOVERNANCE SERVICES LIMITED
We specialise in drafting data protection and information governance policy documentation. We can draft policies from scratch, or we can review and revise current policies you already have. We will work with the Buyer to ensure that the policies are also followed in practice.
-
INFORMATION GOVERNANCE SERVICES LIMITED
We are an information governance and data protection consultancy firm who provide expert advice to organisations on how to enact best practices and be lawful and compliant with data protection legislation. We work with a multitude of different clients, and we help organisations make the most of their data.
-
INFORMATION GOVERNANCE SERVICES LIMITED
We are an information governance and data protection consultancy firm who provide expert advice to organisations on how to enact best practices and be lawful and compliant with data protection legislation. We work with a multitude of different clients, and we help organisations make the most of their data.
-
INFORMATION GOVERNANCE SERVICES LIMITED
Our trained consultants are experts in data protection law, and we offer DPO as a service for organisations. One of our experienced consultants will be appointed as the named Data Protection Officer for your organisation.
-
INFORMATION GOVERNANCE SERVICES LIMITED
As an organisation, you may be required to undertake a data protection risk assessment (DPIA) . With us, you get the safety and security of trained professionals undertaking a deep dive in a particular project to assess any associated risks, before they develop.
-
NCC Group Security Services Limited
To provide assurance that Amazon Web Service (AWS) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of AWS cloud services within the business.
-
NCC Group Security Services Limited
To provide assurance that Google Cloud Platform (GCP) cloud services, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of GCP cloud services within the business.
-
NCC Group Security Services Limited
To provide assurance that Azure cloud services, including O365, within an organisation are deployed and operated in a secure and consistent manner. To review existing people, process and technology to develop a cloud strategy to support the ongoing deployment of Azure cloud services within the business.
-
QA LIMITED
The courses in this listing teach learners how to efficiently use AWS security services to stay secure in the AWS Cloud. They learn AWS-recommended security practices for enhancing security of data and systems in the cloud, and security features of AWS key services including compute, storage, networking and database services.
-
Khipu Networks Limited
This service provides a scalable inline threat prevention capability which can tune for your environment and keep the mass of online threats at bay from your infrastructure and your important business services.
-
INFORMATION GOVERNANCE SERVICES LIMITED
Before you can address any issues which may exist, you need to conduct a health check or a gap analysis of your organisation.
We provide thorough gap analyses and health checks for organisations, regardless of your size or industry, unique to each client.
-
e2e-assure Ltd
A secure yet simple IaaS and/or PaaS service built to suit web servers and web services, with unique value-added services designed keep your service running, secure and resilient to cyber-attacks.
-
INFORMU SOLUTIONS LIMITED
The Informu Information Asset Register / Management system stores asset data gathered during an information / system audit, as well as managing your Records of Processing Activities. It also stores your records retention policies, to which assets are tagged. You can keep an audit trail of actions related to assets.
-
LEFKE IT LIMITED
Lefke IT offers tailored Endpoint Security for government cloud access, featuring protection platforms, secure VPN, and threat detection. Our services ensure real-time monitoring, policy enforcement, and vulnerability management, bolstering cloud data security. Clients can confidently adopt cloud computing while maintaining network integrity.