Search results

19 results found containing pam/ in All categories

Choose a category

Apply filters

Clear filters
Supplier type
User support
Staff security clearance
Minimum government security clearance
Pricing options
19 results found

pam

pam

pam enables success in local, multi-agency, cross-county, regional and national work. It is trusted, secure, cloud based software ideal for agencies fighting serious organised crime, protecting vulnerable people, and solving other complex collaboration or sensitive information sharing issues.

Privileged Access Management (PAM)

EACS Limited

Privileged Access Management (PAM) solution which provides real time detection in email and other business critical applications.

IAM and PAM Managed Services

IAME Ltd

Managed Services offering to support organisations with technical as well as operational support while running SaaS Identity Access Management and Privileged Access Management services internally.

Procurement Activity Manager (PAM)

Procurement Analytics

PAM is a Cross Functional Project Management System for developing, managing and reporting on Cost Improvement Programmes. PAM supports project management against defined milestones with planned, forecast and actual savings based on real-time spend. Workflow seamlessly connects multiple teams to generate project pipelines and provide teams with visibility and accountability.

Managed Privileged Access Management (PAM) Service

MTI Technology Ltd

MTI – Managed Privileged Access Management (PAM) Service provides centralised management and security of all your privileged accounts. The service is supported by a UK based 24x7 Security Operations Centre (SOC)

ISMS.online (Information Security Management System online)

pam

An online secure information security management system (ISMS) and data privacy solution with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS and supply chain collaboration for ISO 27001, EU GDPR, NIST, business continuity planning, audits and reviews, staff information security communications.

DXC Technology Privileged Account Management Services

EntServ UK Ltd part of the DXC Technologies Group

DXC's Privileged Account Management(PAM) is powered by industry-leading technology and expert advisory and managed security services, Privileged Account Management protects organizations' most critical assets by securing, managing, and monitoring privileged accounts and access. PAM helps clients gain control of their critical accounts, which leads to increased visibility, accountability, and efficiency.

Cyber Security- Identity and Access Management

KPMG LLP

This service will help you develop, design and deliver essential set of controls to prevent insider risk from inappropriate access to a cloud environment. The range of services include - Thematic audits & JML processes, Strategy and roadmaps development, deployment of Privileged Access Management solutions and providing solution support.

Identity and Access Management, Privileged Access Management Support

Rivington Information Security

Rivington’s SME's can support your organisation to define and deploy a robust Identity and Access Management (IAM) solutions. Our vendor agnostic approach enables us to support our clients in identifying the most suitable Identity Access Management (IAM), Privileged Identity Management (PIM) and Temporary Privilege Access Management (TPAM) solutions.

Bomgar Privileged Access Management (PAM)

Softcat Limited

Bomgar's Privileged Access enables security professionals to control, monitor and manage privileged access and privileged identities to critical systems by authorised employees, contractors and third-party vendors. Integrating with Bomgar Privileged Identity Manager (RED IM) means that we can discover, remediate and manage (rotation, randomisation, audit) privileged accounts with credential injection.

Cloud Cyber Security, Information Security and Information Assurance (Advisory and Delivery)

Rivington Information Security

Rivington provides expert Information Security support to enable clients to adopt, create and maintain secure Cloud systems. Our specialists use their security expertise, cloud delivery skills and extensive public-sector experience to identify the necessary strategy, architecture, tools, designs and configurations to deploy and secure your cloud service and strategy.

Micad4 Cleaning

Micad Systems (UK) Ltd.

The design, supply and support of web hosted Estates and Facilities software for cleaning and other audits. Cleaning audits for the NHS, HE and others.

Micad Property Management Software

Micad Systems (UK) Ltd.

The design, supply and support of web hosted Estates and Facilities software called the Micad IPR. Modules to help manage: Property, Space and Utilisation, Asbestos, Compliance, Planned and Reactive Maintenance, Appraisal, Cleaning Audits, Lease Management , Stock control, Purchasing, Contract/Contractor Management, Web call logging, Drawing Management, BIM and Document Publishing.

CACI - Cloud Network & Security Audit Service

CACI UK Ltd

CACI’s cloud security assessment and network audit service assesses the current cloud solution architecture and network estate vs. best industry standards and practices. This includes configuration hardening, security health check, IAM/PAM assessment of deployed cloud services. Thereby ensuring services deployed in the cloud are resilient, secure and compliant.

SBL Bomgar Privileged Access Management (PAM)

Software Box Limited (SBL)

Bomgar's Privileged Access enables security professionals to control, monitor and manage privileged access and privileged identities to critical systems by authorised employees, contractors and third-party vendors.

VitruCare Digital Patient Engagement Platform

Dynamic Health Systems Services Ltd

VitruCare is a digital Patient Engagement Platform. Enabling patient self-care and self-management, co-creating health with their healthcare team. VitruCare supports patient engagement at population level. Provides highly personalised digitally supported care to activate each patient taking account of their multi-morbidity needs. Broad digital services library supporting many therapeutic areas.

CLOUD IT SECURITY / CYBER SECURITY, INFORMATION ASSURANCE , GOVERNANCE RISK & COMPLIANCE

Carter Fenwick Ltd

Carter Fenwick's services span all aspects of cloud security enabling us to support our clients in assessing cloud options and designing, implementing and maintaining secure cloud system/solutions. Our consultants bring a blend of security, cloud, public sector experience enabling us to secure your cloud.

Seeker Software Services

Invigilatis

COMPONENTS INCLUDE: Property, (terrier, maps, floorplans/CAD links, BIM links via CoBiE, lease administration; asbestos register, legionella, utilities/energy management, utilisation/condition surveys). Compliance, inspections, risk assessments and audits. Estates and Asset management (CAFM/ISO55001) with planned maintenance, life-cycle planning, contractor management/badging. Room Bookings (clinical/meeting/parking). Real time dashboards/BI/KPI. STANDALONE AND FULLY INTEGRATED SOLUTIONS

10: Whole Lifecycle ERP Support Services in a Cloud Environment

Moore Stephens Insight Limited

Full ERP services including review, analysis, requirements definition, evaluation, procurement, planning, implementation, business change, engagement, transformation, data migration, interfaces, cutover and support. With over 25 years’ experience, we provide expertise, whichever system you are using or moving to. See Service_Definition document for complimentary services. ERP: Finance, Procurement, HR, Payroll, more…