Founded in 1976, CGI is among the largest IT and business consulting services firms in the world.
We are insights-driven and outcomes-based to help accelerate returns on your investments. Across hundreds of locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are informed globally and delivered locally.
Share
Main office address
14th Floor
20 Fenchurch Street
London
EC3M 3BY
Key Products / Services / Sectors (USPs)
At the forefront of cyber excellence, we proudly stand as one of the leading providers for cyber security solutions across all industries in the UK.
With a comprehensive understanding of security—encompassing technology, business, and compliance—we redefine cybersecurity as a strategic cornerstone. Our specialist team integrates cybersecurity seamlessly into business operations, driving agility, efficiency, and a competitive edge.
Beyond safeguarding, our services catalyse progress, guiding organisations through privacy intricacies and fortifying business resilience.
When it comes to protecting the future of your enterprise, choose the unparalleled expertise that we can provide.
Services
Backup and disaster recovery
Backup solutions
Incident response
Disaster recovery solutions
Disaster Recovery as a Service (DRaaS)
Penetration testing
Vulnerability scanning
Automated test tools
Web app PEN tests
Mobile app/IoT PEN tests
Social engineering PEN tests
Red Teams
Cybersecurity awareness training programs
On-site training programs
Online training
Interactive training videos
Quizzes
Automated phishing simulations
Cybersecurity consultancy
Compliance assistance
Security assessment, policy help, strategic advise
Information risk assessment
Privacy Impact Assessment services
Security architecture
Digital forensics and investigation services
Security and data protection audit
Network security
Data Loss Prevention (DLP)
Distributed denial of service (DDoS) prevention
Email security
Firewalls and web access firewalls (WAF)
Network segmentation
Security information and event management (SIEM)
Other intrusion detection (Machine Learning / AI based)
Endpoint security solutions
Mobile security
Anti-malware
IoT security
Endpoint Detection and Response (EDR)
Network infrastructure controls, e.g. Firewalls, switches, security policy enforcement
Sandboxes
URL filters
Security email gateway
VPN
Print management and security
Threat intelligence monitoring and detection
Consultancy and advice
User and Entity Behavior Analytics (UEBA)
Security information and event management (SIEM)
Network Traffic Analysis Framework
Web Proxy
Cybersecurity Platform
Phishing detection
Fraud detection
Rogue or Fake Mobile App Detection
Surface, “Deep” and “Dark” Web Monitoring
Social media monitoring
Brand Monitoring
Managed security services (MSSP)
Protective monitoring
Incident response
Vulnerability management
Threat management
Telco security
Security help desk and support
Staff training
Identity and access management
Identity provisioning (IDP)
Data verification
Data orchestration services
Identity hub
Authentication (credential) of citizens
Authentication (credential) of employees and other internal persons
Anti-fraud services, e.g. behavioural monitoring
Attribute provisioning and verification
Identity networks
Identity apps
Privacy and consent management
Privileged access management (PAM)