19 results found containing pam/ in All categories
pam enables success in local, multi-agency, cross-county, regional and national work. It is trusted, secure, cloud based software ideal for agencies fighting serious organised crime, protecting vulnerable people, and solving other complex collaboration or sensitive information sharing issues.
Privileged Access Management (PAM) solution which provides real time detection in email and other business critical applications.
Managed Services offering to support organisations with technical as well as operational support while running SaaS Identity Access Management and Privileged Access Management services internally.
PAM is a Cross Functional Project Management System for developing, managing and reporting on Cost Improvement Programmes. PAM supports project management against defined milestones with planned, forecast and actual savings based on real-time spend. Workflow seamlessly connects multiple teams to generate project pipelines and provide teams with visibility and accountability.
MTI Technology Ltd
MTI – Managed Privileged Access Management (PAM) Service provides centralised management and security of all your privileged accounts. The service is supported by a UK based 24x7 Security Operations Centre (SOC)
An online secure information security management system (ISMS) and data privacy solution with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS and supply chain collaboration for ISO 27001, EU GDPR, NIST, business continuity planning, audits and reviews, staff information security communications.
EntServ UK Ltd part of the DXC Technologies Group
DXC's Privileged Account Management(PAM) is powered by industry-leading technology and expert advisory and managed security services, Privileged Account Management protects organizations' most critical assets by securing, managing, and monitoring privileged accounts and access. PAM helps clients gain control of their critical accounts, which leads to increased visibility, accountability, and efficiency.
This service will help you develop, design and deliver essential set of controls to prevent insider risk from inappropriate access to a cloud environment. The range of services include - Thematic audits & JML processes, Strategy and roadmaps development, deployment of Privileged Access Management solutions and providing solution support.
Rivington Information Security
Rivington’s SME's can support your organisation to define and deploy a robust Identity and Access Management (IAM) solutions. Our vendor agnostic approach enables us to support our clients in identifying the most suitable Identity Access Management (IAM), Privileged Identity Management (PIM) and Temporary Privilege Access Management (TPAM) solutions.
Bomgar's Privileged Access enables security professionals to control, monitor and manage privileged access and privileged identities to critical systems by authorised employees, contractors and third-party vendors. Integrating with Bomgar Privileged Identity Manager (RED IM) means that we can discover, remediate and manage (rotation, randomisation, audit) privileged accounts with credential injection.
Rivington Information Security
Rivington provides expert Information Security support to enable clients to adopt, create and maintain secure Cloud systems. Our specialists use their security expertise, cloud delivery skills and extensive public-sector experience to identify the necessary strategy, architecture, tools, designs and configurations to deploy and secure your cloud service and strategy.
Micad Systems (UK) Ltd.
The design, supply and support of web hosted Estates and Facilities software for cleaning and other audits. Cleaning audits for the NHS, HE and others.
Micad Systems (UK) Ltd.
The design, supply and support of web hosted Estates and Facilities software called the Micad IPR. Modules help manage: Property, Space Utilisation, Asbestos, Compliance, Planned, Reactive Maintenance, Appraisal, Cleaning Audits, Lease Management , Stock control, Purchasing, Contract/Contractor Management, Web call logging, Live Floor Plans Drawing Management, BIM and Document Publishing.
CACI UK Ltd
CACI’s cloud security assessment and network audit service assesses the current cloud solution architecture and network estate vs. best industry standards and practices. This includes configuration hardening, security health check, IAM/PAM assessment of deployed cloud services. Thereby ensuring services deployed in the cloud are resilient, secure and compliant.
Software Box Limited (SBL)
Bomgar's Privileged Access enables security professionals to control, monitor and manage privileged access and privileged identities to critical systems by authorised employees, contractors and third-party vendors.
Dynamic Health Systems Services Ltd
VitruCare is a digital Patient Engagement Platform. Enabling patient self-care and self-management, co-creating health with their healthcare team. VitruCare supports patient engagement at population level. Provides highly personalised digitally supported care to activate each patient taking account of their multi-morbidity needs. Broad digital services library supporting many therapeutic areas.
Carter Fenwick Ltd
Carter Fenwick's services span all aspects of cloud security enabling us to support our clients in assessing cloud options and designing, implementing and maintaining secure cloud system/solutions. Our consultants bring a blend of security, cloud, public sector experience enabling us to secure your cloud.
COMPONENTS INCLUDE: Property, (terrier, maps, floorplans/CAD links, BIM links via CoBiE, lease administration; asbestos register, legionella, utilities/energy management, utilisation/condition surveys). Compliance, inspections, risk assessments and audits. Estates and Asset management (CAFM/ISO55001) with planned maintenance, life-cycle planning, contractor management/badging. Room Bookings (clinical/meeting/parking). Real time dashboards/BI/KPI. STANDALONE AND FULLY INTEGRATED SOLUTIONS
Moore Stephens Insight Limited
Full ERP services including review, analysis, requirements definition, evaluation, procurement, planning, implementation, business change, engagement, transformation, data migration, interfaces, cutover and support. With over 25 years’ experience, we provide expertise, whichever system you are using or moving to. See Service_Definition document for complimentary services. ERP: Finance, Procurement, HR, Payroll, more…