Skip to main content

Help us improve the Digital Marketplace - send your feedback

Akita Systems Ltd

Cyber Security Consultancy

Akita is a leading provider of cyber security consultancy services. We work with public and private sector organisation to proactively improve defences and reduce risk profiles.
With in-house experts in a broad range of security disciplines, we can provide an offering that’s tailored to organisations’ requirements.
ecurity policy assessment.

Features

  • Wide reaching cyber security consultancy services
  • Cyber security for public and private cloud environments
  • Network security gap analysis and testing
  • Threat profiling
  • User security awareness reviews
  • Data protection assessment
  • IT security policy assessment
  • Available for one-off projects or ongoing assessment

Benefits

  • Customised cyber security solutions tailored to organisational needs
  • Experience with public and private sector cyber security requirements
  • Proactively defends against threats with up-to-date expertise
  • Reduces risk of data breaches
  • Offers regulatory compliance guidance and support
  • Helps safeguard reputation and customer trust
  • Ongoing improvement plan for long-term security resilience

Pricing

£150 a unit an hour

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@akita.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 7 4 9 6 3 6 4 1 5 0 6 8 2 9

Contact

Akita Systems Ltd Akita
Telephone: 0330 058 8000
Email: info@akita.co.uk

Planning

Planning service
Yes
How the planning service works
Our cyber security consultancy provides gap analysis around cloud security, ensuring environments have the correct configuration and necessary defences in place
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
Akita can deliver wide-reaching cyber security training. Most commonly this comes in the form of user awareness training for employees
Training is tied to specific services
No

Setup and migration

Setup or migration service available
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Our consultancy is tailored to meet specific industry standards and organisational requirements. Our quality assurance processes include gap analysis processes that comprehensively test IT environments. Specific performance testing measures, such as penetration testing, vulnerability scanning and user awareness training can then be utilised as necessary.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security testing
  • Security incident management
  • Security audit services
Certified security testers
Yes
Security testing certifications
  • CHECK
  • Cyber Scheme
  • Other
Other security testing certifications
  • Cyber Essentials (CE) Assessor
  • Offensive Security Certified Professional

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
Akita offers ongoing cyber security consultancy and support for organisations in the form of banked time that can then be used as required over a 12 month period

Service scope

Service constraints
Cyber security consultancy sessions will operate from 9am to 5pm, Monday to Friday unless otherwise agreed/stipulated.
Consultancy sessions are booked in advance at a time agreeable to both parties unless otherwise agreed.
Some consultancy services may attract additional licensing costs - this will be stipulated as part of any agreement.
The service is offered solely as consultancy: remediation of any issues identified can be undertaken by Akita, subject to additional costs and scoping.

User support

Email or online ticketing support
Email or online ticketing
Support response times
Service dependant
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Support levels
Cyber security consultancy support comes in the form of banked time. This can be booked with our consultants. Wider IT support services are also available separately with Akita.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
11/03/2024
What the ISO/IEC 27001 doesn’t cover
The organisation does not perform software development
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

At Akita, our people are our greatest asset. Our team are chosen for their intelligence, adaptability and – above all – dependability. And as a company, we’re committed to cultivating a culture of learning and development that empowers them to reach their full potential. They're also supported in their wellbeing through provision of healthy in-house meals, provision of personal support measures and enhanced annual leave.

Pricing

Price
£150 a unit an hour
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@akita.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.