Frameworks & Certifications
The UK Government G-Cloud is an initiative targeted at easing procurement by public-sector bodies. Focusing in UK Government of commodity information technology services that use cloud computing.
Somerford have been providing services through G-Cloud for many years and have a wealth of experience of successful deployments in Government.
Somerford Associates have been a supplier on G-Cloud since 2018
All of our product offerings can be found on the Digital Marketplace:
Discover Our Partner Listings
Splunk G-Cloud Listings
Splunk Enterprise Security Advanced Threat Detection, Investigation and Response (TDIR) Suite
Splunk Advanced Threat Detection, Investigation and Response (TDIR) Suite features all of Splunk's leading Security Technologies including SIEM: Enterprise Security (ES), Security Orchestration Automation and Response (Splunk SOAR), User Behaviour Analytics (Splunk UBA), Threat Intelligence Management (Splunk TIM), Mission Control and Attack Analyzer . Providing End-to-End Security Detection, Investigation and Response.
Splunk Edge Hub - simplifies the ingest of IoT and Sensor based data
Splunk Edge Hub is a fully integrated solution with in built sensors and all necessary connectivity libraries already integrated into it. Providing a quick and easy to use solution of getting data from their environmental sensors, IoT devices and industrial equipment into their Splunk environment.
Splunk Observability Cloud
Splunk's Observability Suite addresses your need to analyse customer experiences and detect, troubleshoot and find root causes to incidents across a cloud-native or hybrid environment. Consisting of Splunk IT Service Intelligence (ITSI), Infrastructure Monitoring (SIM), Application Performance Monitoring (APM), Real User Monitoring (RUM), Splunk Synthetic Monitoring and Splunk On-Call.
PowerConnect for SAP solution and Splunk
PowerConnect is certified SAP add-on which can extract high-fidelity, real-time and historical SAP telemetry data ready for analysis and visualisation in Splunk.
Splunk Cloud and Enterprise
Splunk Enterprise monitors and analyses machine data from any source to deliver operational intelligence that optimises your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, it is a leading enterprise-wide analytics platform.
Splunk on AWS Marketplace
Splunk Enterprise monitors and analyses machine data from any source to deliver operational intelligence that optimises your IT, security and business performance. With intuitive analysis features, machine learning, packaged applications and open APIs, it is a leading enterprise-wide analytics platform.
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
Okta G-Cloud Listings
Okta - Identity Access (IAM) Single Sign-On, Multi-factor Authentication, Lifecycle Management
Okta is a leading identity and access management solution providing single-sign on, multi-factor authentication and provisioning capabilities for all applications. Okta is the foundation for secure connections between people & technology. Using identity information to grant access to applications on any device at any time, enforcing strong security protection.
Okta - Auth0 - Identity Management Platform
Auth0 Identity Platform is a cloud-based identity management service that helps organisations leveraging applications by providing a secure cloud-based identity platform to better understand, efficiently manage and intelligently engage their users. Auth0 provides an easy way to implement the most complex identity solutions across any technology stack or platform.
Varonis G-Cloud Listings
Varonis SaaS Data Security Posture Management (DSPM)
Varonis is a leader in data security. The cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, helps improve compliance and detects advanced threats with AI-powered automation. Helping to mitigate risk in M365 inc Co-Pilot, Windows file-shares, Active Directory and available on AWS Marketplace.
Netskope G-Cloud Listings
Netskope - Secure Web Gateway and Cloud Access Security Broker
Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.
Netskope on AWS Marketplace - Secure Web Gateway and Cloud Access Security Broker
Netskope is an agile data-centric next generation Secure Web Gateway (SWG) that protects data when accessing cloud services, applications and the web, providing real-time insights of advanced threats and user behaviour. Acting as a Cloud Security Access Broker (CASB), Netskope monitors and enforces security policies.
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
HashiCorp G-Cloud Listings
HashiCorp HCP Boundary - secure, automated, remote access for critical systems
HCP Boundary is a fully-managed, cloud-based, workflow that enables secure connections to remote hosts and critical systems across cloud and on-premise environments. As a managed service, HCP Boundary enables zero-trust networking without needing to manage the underlying infrastructure.
HashiCorp HCP Terraform - Infrastructure as Code, Manage any Cloud Infrastructure
HCP Terraform is HashiCorpās managed service offering, providing organisations with a single workflow to provision; their cloud, private data center, SaaS infrastructure and continuously manage the infrastructure throughout its lifecycle. It eliminates the need for unnecessary tooling and documentation for practitioners, teams, and organizations to use Terraform in production.
HashiCorp Vault - Secrets Management, Policy-as-Code and Data Encryption
HashiCorp Vault secures, stores and tightly controls access to tokens, passwords, certificates and encryption keys to protect sensitive data. Security in static infrastructure relies on dedicated servers, static IP addresses and a defined perimeter. Security in dynamic infrastructure is defined by ephemeral applications and servers, verified identities and software encryption.
HashiCorp HCP Vault - Manage secrets and protect sensitive data with identity-based security.
HashiCorp HCP Vault Dedicated simplifies security automation and secret lifecycle management. Vault secures, stores and tightly controls access to tokens, passwords, certificates and encryption keys in order to protect your sensitive data.
HashiCorp Terraform - Infrastructure as Code, Provision/Manage any Cloud, Infrastructure, or Service
Terraform Cloud is HashiCorpās managed service offering, providing organisations with a single workflow to provision; their cloud, private data center, SaaS infrastructure and continuously manage the infrastructure throughout its lifecycle. It eliminates the need for unnecessary tooling and documentation for practitioners, teams, and organizations to use Terraform in production.
HashiCorp Nomad - Application Scheduling as Code
Nomad is a simple and flexible scheduler and orchestrator for managing containers and non-containerised applications across on-prem and clouds at scale.
HashiCorp HCP Packer Image Creation
HCP Packer stores metadata about the artifacts you build using Packer: when the artifact was created, associated platform, and which Git commit is associated with your build. HCP Packer bridges the gap between artifact creation and deployment by allowing cross-organizational teams to create, manage, and consume artifacts using centralised workflows
HashiCorp Consul - Cloud Network Automation, Service Discovery and Service Mesh
Consul is a service networking solution to automate network configurations, discover services, and enable secure connectivity across any cloud or runtime.
HashiCorp Boundary - secure, automated, remote access for critical systems
Boundary provides access to applications and critical systems with fine-grained authorizations without managing credentials or exposing your network.
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
Lacework G-Cloud Listings
Lacework - Cloud Security, Polygraph Data Platform
Lacework offers automated anomaly detection providing consistent visibility, context, and security across cloud environments, providing customers with the ability to detect attack activity stemming from known and unknown threats. Lacework uses data and automation facilitating the security of multi-cloud environments, helping customers prioritise risk, so they can innovate with confidence.
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
Confluent G-Cloud Listings
Confluent Kafka - Real-time Data Stream Processing & Analytics, Data in Motion, Apache Flink
Kafkaās founders Confluent sets Organisationsā data in motion Real-time/Digital Transformation/Edge/Citizen Data 360 View/Personalisation/Self-Service/Continuity/Data connectivity Streamlining Defence/Central Agencies' Operational decisions Cross-Departmental Data sharing Smart Supply Chain/Logistics Event-driven microservices, modernising legacy & connecting hybrid cloud systems Delivering real-time usage/analytics, streaming ETL. Flink/Stream processing Available on AWS Marketplace
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
Securiti G-Cloud Listings
Securiti - unified data access & intelligence, controls & orchestration across hybrid multicloud
Securiti AI is an AI-powered platform for data security and compliance. It offers features such as data discovery, classification, and risk assessment to help organizations protect sensitive information. Securiti AI uses advanced machine learning algorithms to detect threats, automate compliance tasks, and ensure data privacy across cloud environments.
mnemonic G-Cloud Listings
mnemonic - Endpoint Detection and Response (EDR)
The Argus Endpoint Responder is a service that extends the Argus Managed Defence service directly to Customerās endpoints, including servers, laptops and desktops. This service module adds detection capabilities, powerful triage tools, and added efficiency to the incident response process. Compromised endpoints can be isolated.
mnemonic - Cloud Security Assessment
Mnemonic's cloud security assessment helps organizations identify technical risks and architectural flaws within their public cloud deployments.
mnemonic - Penetration Testing
Applications, systems, networks and people form the technological foundation for any business. By having security experts test this foundation they will identify risks, isolate vulnerabilities and prioritize remediation before exposures can be exploited by attackers.
mnemonic - Continuous Azure Security Review
Threat actors are targeting insecure configurations and architectures within cloud deployments. mnemonic's continuous azure security review helps organizations identify and keep track of technical risk in the volatile world of Azure security.
mnemonic - Managed Detection and Response (MDR)
Argus MDR provides 24x7 managed protection against cyberattacks and security threats. With complete enterprise coverage, including cloud, data centre, network and endpoint, our expert team of security analysts, incident responders and threat researchers will act as an extension of your security team to help you defend against todayās complex cyberattacks.
mnemonic - Kubernetes Security Assessment
mnemonic's Kubernetes security assessment helps organisations identify and remediate vulnerabilities & attack paths in the complex world of Kubernetes deployments.
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
KnowBe4 G-Cloud Listings
KnowBe4 - Email Phishing and Security Awareness Training
KnowBe4 empowers your workforce to make smarter security decisions every day. Over 65,000 organisations worldwide trust the KnowBe4 platform to strengthen their security culture and reduce human risk. KnowBe4 builds a human layer of defence so organisations can fortify user behaviour with new-school security awareness and compliance training.
OneSpan G-Cloud Listings
OneSpan Sign - Electronic Signature, eSign, Digital Signature, Digital Agreements
OneSpan Sign allows to securely, view, approve, automate and eSign documents and forms using digital signatures in accordance with Trust Services and Electronic Identification (eIDAS). The platform is offered as āout-of-the-boxā application and as a tool for application developers to rapidly integrate e-signature functionality.
BlueVoyant G-Cloud Listings
BlueVoyant - Supply Chain Defence Cyber Risk Management
We help government organisations obtain clear visibility into cybersecurity risks across their supply chain by proactively identifying, prioritising and remediating cyber risks posed by business partners and supply chain relationships.
BlueVoyant - Digital Risk Protection (DRP)
Digital Risk Protection, detects and eliminates cyber threats before impact. Continuously monitoring, threat data sources, proprietary global DNS data sets, private cybercriminal instant messaging channels. Identify and validates threats, providing actionable countermeasures. Always accessible to add context and facilitate takedown phishing sites, domain lookalikes, social media impersonations, fraudulent apps.
BlueVoyant - Managed Detection and Response (MDR) Security Services
BlueVoyant provides a comprehensive range of Managed Detection and Response services. BlueVoyantās 24Ć7 SOC provides MDR and SIEM management services for Microsoft Sentinel and Defender, Splunk and leading EDR tools from Microsoft, SentinelOne and CrowdStrike
Somerford Associates Support and Augmented Support
Support desk and services to ensure our Buyers gain continued value from the solutions we provide.
Island G-Cloud Listings
Island - Enterprise Browser / Secure Browser
Island is an Enterprise Browser that provides policy control over every facet of a userās interaction with a web application giving you limitless visibility, control and compliance with your most critical applications. Island can serve as the platform for the future of productive and secured work.
SecurityScorecard G-Cloud Listings
SecurityScorecard - Cybersecurity Risk Ratings Platform
SecurityScorecard is a comprehensive cyber security risk ratings platform that continuously monitors the cyber security health of organisations to inform cyber security risk management. SecurityScorecard identifies public facing vulnerabilities that create a security risk. Use cases include self monitoring, peer bench-marking, third party risk management and cyber insurance.
SecurityScorecard - Attack Surface intelligence, Secure Supply Chain
SecurityScorecardās Attack Surface Intelligence detects more unknown unknowns, including those of your third-party vendors and how they pose a risk to your business, arming you with deep contextual insights and attribution to prioritize your next steps - all in one single platform.
SecurityScorecard Managed Service (MAX)
SecurityScorecardās Managed Cyber Risk Services bridge the gap between vendor risk and cybersecurity by helping organizations augment their existing third-party risk cyber programs with a team of cybersecurity professionals with experience in incident response to uncover vulnerabilities and improve cyber hygiene across their vendor landscape
Delinea G-Cloud Listings
Delinea - Privilege Manager - (Zero Trust & PEDM)
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
Delinea Platform - Privileged & Identity Access Management (PIM & PAM)
Manage privileges across all identity types through unified and centralised management platform and seamlessly extend PAM to optimise productivity while enhancing security with just-in-time access, activity monitoring, easy adaptive controls, policy automation, and privileged behaviour analytics that help IT and security reduce risk while enabling growth, efficiency, and scalability.
Delinea - Secret Server Privileged Access Management (PAM)
Delinea Secret Server is a Privilege Access Management (PAM) Solution available on-premise or cloud SaaS hosted in MS Azure, and on the Delinea Platform. Providing password management, with layered built-in security, easy access management for IT admins, robust segregation of role based duties, AES256 encryption, built-in reports to demonstrate compliance.
Delinea - Privilege Manager Zero Trust & PEDM (Cloud Hosting)
Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Removing excess privileges from endpoints prevents malware attacks, policy-based application control keeps people productive, and actionable reporting demonstrates progress and compliance to executives and auditors.
Imprivata G-Cloud Listings
Imprivata MAC Mobile Access and Control (formerly MDA & Ground Control)
Imprivata Mobile Access and ControlĀ® Enables secure real time access to shared, iOS, Android devices and applications, simplified inventory management, device fleet management and loss prevention.
Imprivata Identity governance and Adminstration (IGA) - formally Identity Governance
Imprivata Mobile Access and ControlĀ® Enables secure real time access to shared, iOS, Android devices and applications, simplified inventory management, device fleet management and loss prevention.
Imprivata Vendor and Privileged Access Management
Imprivata Privileged Access Management addresses critical security and compliance challenges by protecting privileged administrator access to an organizationās most sensitive IT systems and digital assets. Enterprise credential vaulting and session management of privileged users and Enterprise remote access to control and secure inbound 3rd party access to critical systems data
Imprivata Enterprise Access Management - EAM (formally OneSign Single Sign On and confirm ID)
Imprivata Enterprise Access ManagementĀ® provides secure, No Click and password less and multi factor authentication (MFA) for remote access, connected devices, workstations, virtual desktops, critical applications, Electronic Health Records (EHRs), and other systems containing patient data.
SoSafe G-Cloud Listings
SoSafe Human Risk Management - Security Awareness Training
SoSafe offers effective awareness training for companies. With our interactive E-Learning Platform and customised Phishing Simulation, we continuously educate our customers, employees and raise awareness of cyber security, data protection and compliance.
Get in Touch
Schedule a call with one of our certified engineers and pre sales team, or drop us a line if you have any questions.