We started the engagement with a discovery process and began by reviewing all of technical, process and procedural documentation that was provided for each of the technology areas. This enabled us to understand the technology as described in the context of the IT estate and to choose appropriate cyber security frameworks to measure against.

The documentation was used to prepare sets of structured questions that were used to guide a series of workshops and interviews. Armed with all of this information, our consultants began analysing the data and identifying any areas of risk and opportunity. There was regular collaborative contact during the process to ensure that the work was in line with expectations.

The next step was to structure the findings in a consistent, readily digestible manner. During this process, some common elements and themes became apparent, so the scope was increased to demonstrate how each area of technology addressed higher level business requirements.

For each technology area, the final report provided:

  • an overview of associated methodology
  • a prioritised risk-based gap analysis
  • road-mapped recommendations for potential reconfigurations, scope increase, or alternative solutions needed to cover the gaps.

Additionally, an overarching alignment to the risks being addressed by each area was provided to help align the technology initiatives with business and compliance drivers.

Why Choose NCL?


For over a decade, we’ve developed a strong reputation amongst our customers and partners for consistently delivering services which help businesses perform optimally and securely. This is why the relationships we’ve developed over the years have become long-standing and deeply trusted.

We’re very proud to have provided continuous IT support to the MoD for over 12 years. This length of service is a testament to the trust the MoD place in our people to deliver results, time and time again. Today, we provide situational awareness of the MoD’s globally-deployed application performance while assisting in troubleshooting issues and collaborating with other delivery partners to solve problems faster.

The lessons we’ve learned in Defence are applied to our engagements with customers in the enterprise sector too, ensuring robust network and cyber management for medium to large scale organisations. We use our long-standing experience in end-to-end performance management as a foundation for all of our services, so we can better define a customer’s complete requirements and deliver a more effective solution, whatever the field of technology. Offering market-leading technology and trusted managed services from ‘Floodlight’ - our own UK sovereign SOC, we work closely with customers in Driving Digital Vigilance across industry sectors.