Redscan is delighted to be recognised as a G-Cloud 9 supplier of cyber security services on the Digital Marketplace, a free online procurement platform for public sector organisations that need help selecting IT products and services.
By listing suppliers that meet exacting standards, the G-Cloud 9 framework enables organisations across local and central government to quickly identify companies offering cloud hosting, software and support services, while avoiding the need to conduct a full tender or procurement process.
It’s now even easier for public sector organisations to seek help identifying and nullifying threats
As a provider of managed cyber security services for organisations with physical and virtual infrastructure, Redscan is delighted to offer ThreatDetect™, its flagship and award-winning managed threat detection and response service, as well as CREST Penetration Testing & IT Health Checks, in accordance with this latest initiative.
By promoting its services via the Digital Marketplace, Redscan ensures that public bodies such as the NHS, local authorities and councils have even greater visibility and access to the expert services they need to minimise information security risk.
The Redscan security services available to source via the G-Cloud 9 framework
ThreatDetect™ combines leading security expertise, cutting-edge detection technology and global intelligence to provide a complete managed detection and response service for public sector organisations that want to quickly identify and remediate cyber-attacks. Acting as a virtual extension of in-house IT resources, ThreatDetect affords the wide-ranging capabilities organisations operating on limited resources need to thwart the latest threats and comply with industry standards such as PCI-DSS and the GDPR.
Redscan’s CREST-approved penetration testing and IT-health check service assesses technology, applications, people and processes to identify vulnerabilities that could leave public sector organisations exposed to criminal activity. The company’s certified ethical hackers use the latest tools and methodologies to comprehensively test internal and external networks and provide clear and actionable remediation advice to help address exposures.