Our approved G-Cloud 14 Services

KEEP is honoured to have been approved as a G-Cloud 14 Supplier, further underlining the capability and services we can provide to clients. KEEP have 11 approved services in Lot 3 Cloud Support, as detailed below;

3rd Party Risk Review Service

Service Brief Overview:

3rd Party risk is becoming an ever-increasing problem. Various attacks originate from 3rd parties; via malicious software packages, hacked systems or poor cyber security governance. We work with you to understand your organisation, context, threats faced, risk appetite, senior management, nuances and supply chain.

Service Benefits:

  • Utilise our consultants and experience to identify risk and vulnerabilities
  • Reduce threats from your 3rd party suppliers
  • Reduce your vulnerabilities
  • Hold your suppliers to account
  • Increase your own cyber security resilience

Service Page & Rate Card:

G-Cloud 14: 3rd Party Risk Review Service

 

Attack Surface Mapping

Service Brief Overview:

This service allows you to understand your true risks in the context of your organisation, your risk appetite, the threats faced and the likely areas that will be targeted. These targeting opportunities form your organisations unique “Attack Surface”. Our Consultants highlight your attack surface(s).

Service Benefits:

  • Understand the extent of your “Attack Surface”
  • Work with our cyber security specialists to identify mitigations
  • Reduce your vulnerabilities
  • Understand the likely scenarios a threat actor can utilise

Service Features:

  • Attack Surface Mapping of your Employees & Contractors
  • Attack Surface Mapping of your Physical location(s)
  • Attack Surface Mapping of your Suppliers
  • Attack Surface Mapping of your Departments
  • Attack Surface Mapping of your Infrastructure

Service Page & Rate Card:

G-Cloud 14: Attack Surface Mapping

 

Cloud Security Consultancy

Service Brief Overview:

This service provides you with our Microsoft Azure & O365 baseline reviews, providing actionable priorities to understand any gaps or mis-configuration that may increase the risks and vulnerabilities to the organisation.

Service Benefits:

  • Utilise our consultants and experience to identify risk and vulnerabilities
  • Azure / O365 best practise baseline guidance
  • Reduce your vulnerabilities
  • Make risk informed decisions and allocate resources effectively
  • Tailored configuration recommendations to your own individual organisational needs

Service Features:

  • Microsoft Entra ID review and recommendations
  • Microsoft 365 Defender review and recommendations
  • Office 365 review and recommendations
  • Microsoft Exchange review and recommendations
  • Azure cost analysis review and recommendations
  • Azure Platform & Services review and recommendations

Service Page & Rate Card:

G-Cloud 14: Cloud Security Consultancy

 

Cyber Security Consultancy

Service Brief Overview:

This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and improve cyber security controls across your organisation to increase your overall cyber security posture and maturity.

Service Benefits:

  • Utilise our consultants and experience to identify risk and vulnerabilities
  • Practical and effective advice relevant to your risk appetite
  • Reduce your vulnerabilities
  • Make risk informed decisions and allocate resources effectively

Service Features:

  • Identify: Understanding your true assets whether technical, physical or human
  • Quantify: Your assets and their actual level of vulnerability/risk
  • Prioritise: Remediations to ensure effort is spent appropriately
  • Mitigate: Varying controls may be required dependent on risk appetite
  • Improve: Continuous improvement is required to increase Cyber Maturity
  • Transformation: Happens when the above are done correctly and consistently

Service Page & Rate Card:

G-Cloud 14: Cyber Security Consultancy

 

Cyber Security Transformation

Service Brief Overview:

This service provides you with access to our experienced consultants to identify, quantify, prioritise, mitigate and transform cyber security controls across your organisation to increase your overall cyber security posture and maturity.

Service Benefits:

  • Utilise our consultants and experience to identify risk and vulnerabilities
  • Practical and effective advice relevant to your risk appetite
  • Reduce your vulnerabilities
  • Make risk informed decisions and allocate resources effectively
  • Transform your current controls effectively

Service Features:

  • Identify: Understanding your true assets whether technical, physical or human
  • Quantify: Your assets and their actual level of vulnerability/risk
  • Prioritise: Remediations to ensure effort is spent appropriately
  • Mitigate: Varying controls may be required dependent on risk appetite
  • Improve: Continuous improvement is required to increase Cyber Maturity
  • Transformation: Happens when the above are done correctly and consistently

Service Page & Rate Card:

G-Cloud 14: Cyber Security Transformation

 

Cyber Threat Modelling (CTM)

Service Brief Overview:

This service provides you a true insight to your most prevalent cyber threats, likely attack scenarios and threat models depicted to help visualise, explain and mitigate the threats faced to your organisation.

Service Benefits:

  • Identify attack scenarios not already understood
  • Prioritise remediations based on likelihood, attacker effort and TTP’s
  • Reduce your vulnerabilities
  • Reduce wider cyber risks
  • Gain assurance from a trusted third party

Service Features:

  • Expert analysis from our experienced consultants
  • Contextual awareness of threats faced in relevant sectors
  • Actionable intelligence based on your actual live infrastructure
  • Practicable and prioritised advice to address issues found
  • Combined analysis across the threat spectrum
  • Tactic, Techniques and Procedures (TTP’s) likely to be utilised

Service Page & Rate Card:

G-Cloud 14: Cyber Threat Modelling (CTM)

 

Microsoft Defender 365 services

Service Brief Overview:

Our consultants have years of experience with Microsoft Defender 365, where we provide clients with engineering support, configuration assessments and new feature introductions alongside KQL support. To ensure you make the best use of Microsoft Defender 365 and associated services.

Service Benefits:

  • Utilise Microsoft Defender 365 to its fullest
  • Ensure relevant threats are identified, triaged and managed
  • Reduce your vulnerabilities
  • Understand Microsoft Security CoPilot capabilities
  • Tailored configuration recommendations to your own individual organisational needs

Service Features:

  • Microsoft Defender 365 review and recommendations
  • Microsoft Defender 365 configuration and guidance
  • Microsoft Defender 365 new feature enablement
  • Microsoft Defender 365 integration(s) with wider security tooling
  • License analysis review and recommendations
  • Azure Platform & Services review and recommendations

Service Page & Rate Card:

G-Cloud 14: Microsoft Defender 365 services

 

Microsoft Kusto Query Language (KQL) support

Service Brief Overview:

Our consultants have years of experience with Microsoft KQL and can help you with advanced hunting and queries required in both Microsoft Defender 365 and Microsoft Sentinel to extract, report, dashboard, alert and monitor specific threats or requirements.

Service Benefits:

  • Utilise our experience to craft and implement complex queries
  • Increased oversight and monitoring to more “bespoke” threats
  • Reduce time to triage and mitigate threat(s)
  • Utilise queries to provide actionable dashboards
  • Utilise advanced queries to increase automations via Azure Logic App’s

Service Features:

  • Defender 365 advanced hunting queries
  • Microsoft Sentinel hunting queries
  • Configure specific alerts based on advanced queries provided
  • Monitor and Alert effectively
  • Optimize current queries for efficiency
  • Wider configuration reviews

Service Page & Rate Card:

G-Cloud 14: Microsoft Kusto Query Language (KQL) support

 

NCSC Cyber Assessment Framework (CAF)

Service Brief Overview:

This service provides clear guidance regarding the NCSC CAF, understanding your current readiness, identifying gaps and assisting you to implement strategies, roadmaps, tooling and projects to align compliance with the NCSC CAF requirements.

Service Benefits:

  • Practical and effective advice to address NCSC CAF requirements
  • Access our cyber security specialists who deliver CAF assessments globally
  • Cost effective guidance / support ensuring CAF alignment is beneficial
  • Identification of technical inefficiencies / vulnerabilities to reduce costs
  • Alignment with UK government best practise(s) and future requirement(s)

Service Features:

  • Gap analysis against the NCSC Cyber Assessment Framework (CAF)
  • Definition of strategies, resources or tooling to address those gaps
  • Support of wider cyber security activities to meet CAF requirements
  • Pragmatic guidance to address weak cyber security controls and capability
  • Cyber Security workshops and one-to-one guidance where required

Service Page & Rate Card:

G-Cloud 14: NCSC Cyber Assessment Framework (CAF)

 

NIS / NIS2 Consultancy

Service Brief Overview:

Our consultants hold a wealth of experience in reviewing, understanding, prioritising and assisting organisations meet the control requirements of the NIS2 directive alongside the completion of Operators of Essential Services (OES) returns.

Service Benefits:

  • Utilise our consultants and experience to identify risk and vulnerabilities
  • NIS OES returns best practise guidance
  • Reduce your vulnerabilities
  • Make risk informed decisions and allocate resources effectively

Service Features:

  • NIS2 control gaps review
  • NIS2 Operators of Essential Services (OES) returns assistance
  • NIS2 control requirements planning
  • NIS2 best practise and guidance

Service Page & Rate Card:

G-Cloud 14: NIS / NIS2 Consultancy

 

virtual Chief Information Security Officer (vCISO)

Service Brief Overview:

This service provides you with a dedicated and experienced consultant who becomes the trusted adviser to the organisation. Providing your organisation with Chief Information Security Officer (CISO) capabilities without the associated full-time costs.

Service Benefits:

  • Immediately increase your cyber security maturity
  • Cost efficiencies; hiring and retaining suitably experienced talent is costly
  • Utilising vCISO fractionally helps your organisation thrive, increasing cyber security
  • Access to an experienced and dedicated individual consultant
  • Flexibility; we can provide surge capability when required

Service Features:

  • Establishment of cyber security capability / extending current in-house capabilities
  • Agile and flexible; support projects or overall cyber security management
  • Dedicated consultant who becomes the trusted adviser to the organisation
  • Identification of risks, vulnerabilities and control gaps
  • Practicable and actionable advice relevant to your organisation
  • Ability to present complex findings to senior leadership

Service Page & Rate Card:

G-Cloud 14: virtual Chief Information Security Officer (vCISO)

 

What is G-Cloud?

As defined by Crown Commercial; “G-Cloud 14 has replaced G-Cloud 13. It will continue to provide a large variety of cloud based services from a range of suppliers. Services include:

  1. Lot 1 – Cloud Hosting
  2. Lot 2 – Cloud Software
  3. Lot 3 – Cloud Support
  • G-Cloud 14 will run for 18 months from 29 October 2024. 
  • Any call-off contract will initially last for up to 36 months (3 years).
    • You can extend once by a maximum of 12 months (1 year), but you must specify this in the initial contract terms.
  • The total call-off length should not be for more than 48 months (4 years).
    • This includes the initial call-off duration plus the extension option.
    • Certain restrictions apply to central government contract extensions.
Get in Touch

Contact us

KEEP cyber security services

Get in Touch

Close form