Search results

33 results found containing pam/ in All categories

Choose a category

Apply filters

Clear filters
Supplier type
User support
Staff security clearance
Minimum government security clearance
Pricing options
33 results found

Identity and Access Management & Priviliged Access Management - Strategy, Deployment and Support

Carter Fenwick Ltd

Specialist Identity and Access Management (IAM / IdAM) and PAM consultancy, implementation support and delivery. Skills across all IAM and PAM technologies including: SailPoint, CyberArk, Okta etc.

pam

pam

pam enables success in local, multi-agency, cross-county, regional and national work. It is trusted, secure, cloud based software ideal for agencies fighting serious organised crime, protecting vulnerable people, and solving other complex collaboration or sensitive information sharing issues.

CyberArk Privileged Access Management (PAM) Consultancy Services

CyberArk

CyberArk PAM Consultancy Services can assist with; design and implementation of CyberArk solutions, advice on industry best practises for PAM and program roadmap decisions, design and implement integrations with 3rd party vendor solutions, component installations and configurations, privileged account discovery, solution upgrades, major project cycles, onboarding cycles, knowledge transfer.

CyberArk Privileged Access Security Managed Service

MTI Technology Ltd

MTI's CyberArk Privileged Access Management (PAM) Managed Service provides centralised management and security of all your privileged accounts across an enterprise including password control and full auditing of administrator actions on all hosts. The service is supported by a UK based 24x7x365 Security Operations Centre (SOC)

CyberArk Core Privileged Access Security Managed Service

MTI Technology Ltd

MTI provide market leading CyberArk Privileged Access Security Licensing, Integration and Management Services. We can fully secure privileged accounts across your organisation including password control and full auditing of administrator actions on all hosts. The service is supported by our UK based 24x7x365 Security Operations Centre (SOC).

IAM and PAM Managed Services

IAME Ltd

Managed Services offering to support organisations with technical as well as operational support while running SaaS Identity Access Management and Privileged Access Management services internally.

Privileged Access Management (PAM)

EACS Limited

Privileged Access Management (PAM) solution which provides real time detection in email and other business critical applications.

Project Activity Manager (PAM)

Rembrace

PAM is a Workplan and Savings Tracking Service for managing and reporting on your Cost Improvement Programme (CIP). PAM supports project management against defined milestones with planned, forecast and actual savings based on real-time spend. Workflow seamlessly connects multiple teams to generate project pipelines and provide full visibility and accountability.

Reliance acsn Managed Priveleged Access Management (PAM - thycotic)

Reliance acsn

Reliance Privileged Access Management Service delivers an indispensable, comprehensive Privileged Account Management (PAM) solution protecting your most valuable information assets from cyber attacks and insider threats. Reliance PAM Service ensures the protection of privileged accounts. They fast and easy to deploy and use, and scale from SMB to enterprise.

CyberArk CorePAS Privileged Access Management (PAM)

Armadillo Managed Services

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

ISMS.online (Information Security Management System online)

pam

An online secure information security management system (ISMS) and data privacy solution with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS and supply chain collaboration for ISO 27001, EU GDPR, NIST, business continuity planning, audits and reviews, staff information security communications.

DXC Technology Privileged Account Management Services

EntServ UK Ltd part of the DXC Technologies Group

DXC's Privileged Account Management(PAM) is powered by industry-leading technology and expert advisory and managed security services, Privileged Account Management protects organizations' most critical assets by securing, managing, and monitoring privileged accounts and access. PAM helps clients gain control of their critical accounts, which leads to increased visibility, accountability, and efficiency.

Cyber Security Identity and Access Management

KPMG LLP

This service will help you develop, design and deliver essential set of controls to prevent insider risk from inappropriate access to a cloud environment. The range of services include - Thematic audits & JML processes, Strategy and roadmaps development, deployment of Privileged Access Management solutions and providing solution support.

Micad IPR Property Management Software

Micad Systems (UK) Ltd.

The design, supply and support of web hosted Estates and Facilities software: Micad IPR. Modules help manage: Property, Space Utilisation, Asbestos, Compliance, Planned, Reactive Maintenance, Appraisal, Cleaning Audits, Leases, Stock control, Purchasing, Contractor Management, Web call logging, Live Floor Plans Drawing Management, BIM, GIS MVP preparation and Document Publishing.

Micad4 Audit

Micad Systems (UK) Ltd.

The design, supply and support of web hosted Estates and Facilities software for cleaning and other audits. Cleaning audits for the NHS, HE and others.

BeyondTrust Privileged Access Management (PAM)

Softcat Limited

BeyondTrust's Privileged Access enables security professionals to control, monitor and manage privileged access and privileged identities to critical systems by authorised employees, contractors and third-party vendors. Integrating with BeyondTrust Privileged Identity Manager (RED IM) means that we can discover, remediate and manage (rotation, randomisation, audit) privileged accounts with credential injection.

Cloud Network & Security Audit Service

CACI UK Ltd

CACI’s cloud security assessment and network audit service assesses the current cloud solution architecture and network estate vs. best industry standards and practices. This includes configuration hardening, security health check, IAM / PAM assessment of deployed cloud services - thereby ensuring services deployed are resilient, secure and compliant.

DXC Technology CyberArc PAS Advisory Service

EntServ UK Ltd part of the DXC Technologies Group

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics

CyberArk Core Privileged Access Security (PAS)

CyberIAM Holdings Ltd

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

DXC Technology CyberArk Core PAS

EntServ UK Ltd part of the DXC Technologies Group

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics

CyberArk CorePAS

Softcat Limited

CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

Osirium Privileged Access Management (PAM / PxM)

Sapphire

Osirium’s PxM suite provides Privileged Access Management & Task Automation to protect your IT infrastructure, cloud services and critical assets. By separating users from privileged credentials Osirium enforces a " least privilege" policy which controls, monitors and audits authorised employees and third-party access.

CyberArk Core PAS

Truststream Security Solutions

CyberArk provides Privileged Access Management (PAM) software that can operate in the cloud or a DC. It is an end-to-end solution that protects, manages and audits, user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to real-time privileged activity using intelligent threat analytics.

IT SECURITY / CYBER SECURITY, CYBER STRATEGY, INFORMATION ASSURANCE , GOVERNANCE RISK & COMPLIANCE

Carter Fenwick Ltd

Carter Fenwick's services span all aspects of cloud security enabling us to support our clients in assessing cloud options and designing, implementing and maintaining secure cloud system/solutions. Our consultants bring a blend of security, cloud, public sector experience enabling us to secure your cloud.

PwC Identity & Access Management (IdAM) Services

PricewaterhouseCoopers (LLP) PwC

PwC provides a wide range of services that can help you assess, improve or establish the people, processes and technology you need for your IdAM capability. We view IdAM as a whole-organisation challenge, establishing the necessary culture in parallel with technology to aid rapid digital transformation for customers & partners.

Seeker Software Services

Invigilatis

STANDALONE/INTEGRATED SOLUTIONS components include: PROPERTY, (terrier, maps, floorplans/CAD links, BIM links via CoBiE, lease administration; asbestos register, legionella, utilities/energy management, utilisation/condition surveys). COMPLIANCE, (inspections, risk assessments, condition audits). ESTATES AND ASSET MANAGEMENT (CAFM/ISO55001) with planned maintenance, life-cycle planning, contractor management/badging. BOOKINGS (clinical/meeting/parking). DASHBOARDS, (Real time reporting/BI/KPI).

Desktop Services

Bedigital (a branch of DMSG Limited)

bedigital offers a full range of Desktop services including strategic planning, design, build, operation, support, architecture, Virtualisation, business and technical assessment, Migration services, application virtualisation. Our services give our customers a clearer view of their physical hardware, software and both cloud and on premises as-is and to-be estate

Privileged Access Management (PAM) Platform as a Service

Jacobs U.K. Limited

Jacobs will provide a Privileged Access Management Platform as an integrated solution that provides visibility and control over all your privileged accounts and users. By uniting the broadest set of privileged security capabilities, the platform simplifies deployments, reduces costs, improves usability and reduces excessive privilege risks.

CoreValue Cyber Security as a Service

Ethical Healthcare Consulting C.I.C.

Full end to end, flexible service providing Security support for organisations. Standard and enhanced packages to deliver a combination of on-site and off-site capability. Also offer our Cyber Assurance platform and a Cyber Essentials gap analysis and “Dark Web” reporting and our EPAS end user password protection and management system.

Cyber Security as a Service

PalisadeSECURE Ltd

Full end to end, flexible service providing Security support for organisations. Standard and enhanced packages to deliver a combination of on-site and off-site capability. Also offer our Cyber Assurance platform and a Cyber Essentials gap analysis and “Dark Web” reporting and our EPAS end user password protection and management system.

VitruCare Digital Patient Engagement Platform

Dynamic Health Systems Services Ltd

VitruCare is a digital Patient Engagement Platform. Enabling patient self-care and self-management, co-creating health with their healthcare team. VitruCare supports patient engagement at population level. Provides highly personalised digitally supported care to activate each patient taking account of their multi-morbidity needs. Broad digital services library supporting many therapeutic areas.

01: Whole Lifecycle ERP Support Services in a Cloud Environment

Moore Stephens Insight Limited

Cradle-to-Grave ERP services including review, analysis, requirements definition, evaluation, procurement, planning, implementation, business change, engagement, transformation, data migration, interfaces, cutover and support. With over 25 years’ experience, we provide expertise, whichever system you are using or moving to. See Service_Definition document for complimentary services. ERP: Finance, Procurement, HR, Payroll, more…

Cyber Security as a Service

Ethical Services Group

Full end to end, flexible service providing Security support for organisations. Standard and enhanced packages to deliver a combination of on-site and off-site capability. Also offer our Cyber Assurance platform and a Cyber Essentials gap analysis and “Dark Web” reporting and our EPAS end user password protection and management system.