Feeds

Capgemini and HP gain ground in public sector marketplace

Two winners in ICT supply battle

High performance access to file storage

Capgemini and Hewlett Packard have gained the most ground in the rankings of top suppliers to the public ICT market.

New research from Kable shows that Capgemini rose from seventh to fourth place, while HP shot up from thirteenth to fifth place.

BT, EDS and Fujitsu retained the first three positions, while IBM, Dell and Capita all slipped a couple of places.

The supplier landscape in the UK public sector marketplace, shows that a few big players enjoyed a notable growth in sales in 2006. These included: Fujitsu, on the back of a number of infrastructure upgrade project wins; Capgemini, which had its first full year delivering the huge HMRC Aspire contract; Hewlett Packard, benefiting from major infrastructure upgrades in health and central government; and O2, which has benefited from additional revenues from the expansion of Airwave.

The report shows that the larger service and systems integrators are continuing to increase their influence at the expense of the smaller generalists.

Kable emphasises, however, that while the leading service providers have increased their influence over recent years, this does not guarantee continuing success. The winners of tomorrow will resist the pressure to chase inappropriate opportunities, pick their targets carefully, and recognise that public sector buyers choose strategic commitment over opportunism.

Models for this approach can be found among suppliers who anticipated the maturing of the ICT outsourcing market, and built added value around elements of business process outsourcing, business transformation or infrastructure engineering. Virtually all of the high growth service providers in the league table below developed one of these approaches in good time.

Success is also increasingly dependent on a healthy partner strategy and a compelling partner proposition.

This remains a dynamic market, with many new players coming in and a large, ambitious group of mid-size players. The marketplace is increasingly dominated by customer demands for better use of existing assets, incremental improvements (rather than big new schemes) and improving value for money in replacement contracts.

The report includes analysis of the leaders in each main segment, based on Kable estimates of the 2006 business performance of leading suppliers and Kable databases of contract activity in the UK public sector. It describes the supplier landscape as it stands in early 2007, and explores current trends and likely developments over the medium term.

League Table Summary of Top 20 Suppliers to UK Public Sector ICT Market, 2006
2006 rank 2005 rank Supplier 2006 UK Public sector ICT £m sales (estimates, see below)
1 1 BT 2,078
2 2 EDS 1,429
3 3 Fujitsu 1,145
4 7 Capgemini 800
5 13 HP 680
6 4 IBM 614
7 5 Dell 596
8 6 Capita 543
9 9 Serco 526
10 8 Computacenter 378
11 12 O2 363
12 10 LogicaCMG 339
13 11 Accenture 317
14 14 NTL 289
15 17 Microsoft 265
16 15 Research Machines 259
17 18 Cable and Wireless 220
18 21 Cisco 206
19 20 CSC 203
20 25 Atos Origin 182
Total of the above 11,432
Source: Kable, The supplier landscape in the UK public sector marketplace.

Note: The supplier sales figures above include goods and services bought in from other suppliers and sales made via intermediaries. This data shows the size of the market influence of the big suppliers and is not the same as market share.

Anyone wanting a full copy of the report can contact Stephen O'Sullivan on 020 7061 3238 or stephen.o'sullivan@kable.co.uk.

Note: The supplier sales figures above include goods and services bought in from other suppliers and sales made via intermediaries. This data shows the size of the market influence of the big suppliers and is not the same as market share.

Anyone wanting a full copy of the report can contact Stephen O'Sullivan on 020 7061 3238 or stephen.o'sullivan@kable.co.uk.

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.