NEXOR CONFIRMED AS G-CLOUD 5 SUPPLIER
May 2014
G-Cloud 5 is now officially live and we are pleased to confirm that once again Nexor has been confirmed as a supplier to provide a range of cloud-related security services.
The framework itself is a multi-supplier vehicle for the purchase of cloud-based IT Services (“G-Cloud Services”) by public bodies in UK Central Government and across the wider public sector. It enables qualified suppliers to display their service offerings in a purpose-built online catalogue which is hosted on the Government eMarketplace (“GeM”).
The latest incarnation of the streamlined procurement process aims to make buying even easier and now offers over 17,000 Cloud services. With sales now past £175m this shows continued growing awareness and support for the framework.
We look forward to working with all our customers who use this route for procuring trustworthy technology solutions from Nexor to meet their cloud-related security needs. Earlier this year Nexor was recognised as an official cyber security supplier to the UK Government.

RECENT BLOG POSTS
Press Release – Guardian 3.1 – High Availability
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
Making Effective Use Of Zero Trust Security
One year on from our introductory blog on Zero Trust Architecture, what has changed and what friction points have started to appear for organisations after implementation? Crucially, where does Zero Trust fit within the to-do list, or the essential security risk...
Cyber Essentials – Under The Bonnet
What does Cyber Essentials cover? Cyber Essentials is a UK Government backed scheme that helps protect your business against a range of the most common cyber-attacks. Cyber-attacks can come in many forms and may be carried out against businesses of any size of...
Be the first to know about developments in secure information exchange