Search results

42 results found

42 results found containing pam/ in All categories

  • Privileged Access Management (PAM)

    Savanti Consulting

    Savanti has the technical expertise needed to create effective Privileged Access Management (PAM) strategies and solutions: ensuring that only individuals with an appropriate level of privilege can access specific systems or information; while monitoring privileged end-user account activity to detect and respond to attempts to bypass PAM controls.

  • pam

    pam

    pam enables success in local, multi-agency, cross-county, regional and national work. It is trusted, secure, cloud based software ideal for agencies fighting serious organised crime, protecting vulnerable people, and solving other complex collaboration or sensitive information sharing issues.

  • CyberArk Privileged Access Management (PAM) Consultancy Services

    CyberArk

    CyberArk PAM Consultancy Services can assist with; design and implementation of CyberArk solutions, advice on industry best practises for PAM and program road-map decisions, design and implement integrations with 3rd party vendor solutions, component installations and configurations, privileged account discovery, solution upgrades, major project cycles, on-boarding cycles, knowledge transfer.

  • MTI Privileged Access Security Managed Service

    MTI Technology Ltd

    MTI provide market leading CyberArk Privileged Access Security Licensing, Integration and Management Services. We can fully secure privileged accounts across your organisation including password control and full auditing of administrator actions on all hosts. The service is supported by our UK based 24x7x365 Security Operations Centre (SOC).

  • Identity and Access Management (IdAM) Services

    Smart Co Consulting Limited

    Smartco help organisations deliver their Identity and Access Management (IAM / IdAM) and Privileges Access Management solution (PAM) with a cloud based Single Sign on, Identity Management and Multi Factor Authentication solution that fully Integrates with AD and Office365 for seamless user experience.

  • Brookcourt Security Software Solutions and Services

    Brookcourt Solutions

    Brookcourt provide a range of solutions and services:- Multi-factor authentication, Authentication-as-a-Service, DLP (data-loss-prevention), PAM, IAM, Endpoint-protection, data-security, cloud-security, web-security new solutions available upon enquiry.

  • Reliance acsn Managed Priveleged Access Management (PAM - thycotic)

    Reliance acsn

    Reliance Privileged Access Management Service delivers an indispensable, comprehensive Privileged Account Management (PAM) solution protecting your most valuable information assets from cyber attacks and insider threats. Reliance PAM Service ensures the protection of privileged accounts. They fast and easy to deploy and use, and scale from SMB to enterprise.

  • Accenture Digital Identity Services

    Accenture (UK) Limited

    Accenture’s digital identity services help you to build a sustainable identity and access management (IAM) capability covering all the key IAM domains: enterprise IAM, privileged access management (PAM), citizen/customer IAM and data access governance. Accenture provides end-to-end services spanning strategy and governance design, through delivery, to managed IAM solutions.

  • ISMS.online (Information Security Management System online)

    pam

    An online secure information security management system (ISMS) and data privacy solution with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS and supply chain collaboration for ISO 27001, ISO 27701, ISO 22301, GDPR, NIST, including; audits and reviews, staff information security communications and more.

  • Privileged Access Management Services

    IAME Ltd

    Advisory Services Implementation Services Standard technical support 24/7 full managed services

  • DXC Technology Privileged Account Management Services

    EntServ UK Ltd part of the DXC Technologies Group

    DXC's Privileged Account Management(PAM) is powered by industry-leading technology and expert advisory and managed security services, Privileged Account Management protects organizations' most critical assets by securing, managing, and monitoring privileged accounts and access. PAM helps clients gain control of their critical accounts, which leads to increased visibility, accountability, and efficiency.

  • IAM Consulting & Advisory Services

    Turnkey Consulting (UK) Limited

    Turnkey's IAM services help assess, improve or establish solutions to control and govern access to systems. We improve security, reduce risk and improve user’s experience in accessing systems to perform their role across employees, third-parties, contractors, IoT devices, bots and your consumers; helping improve processes, increase productivity and reduce costs.

  • Information Security - InfoSec

    Innovate IT Ltd

    Innovate IT Ltd has successfully delivered work packages for many Government departments in London and Scotland. Our information security architects can deliver customised work packages, tailored for bespoke applications and services. We also offer support services for our implementations.

  • Cyber Security Identity Management

    KPMG LLP

    This service will help you develop, design and deliver essential set of controls to prevent insider risk from inappropriate access to a cloud environment. The range of services include - Thematic audits & JML processes, Strategy and roadmaps development, deployment of Privileged Access Management solutions and providing solution support.

  • Cloud Transition Management Professional Services

    Innovate IT Ltd

    Innovate IT Ltd has successfully delivered work packages for many Government departments in London and Scotland. Our information security architects can deliver customised work packages, tailored for bespoke applications and services. We also offer support services for our implementations.

  • Centrify - Privileged Access Management (PAM)

    Somerford Associates Limited

    Zero Trust Privilege reduces data exposure by granting 'least privilege access' to whoever is requesting access. It validates the user's credentials, the context of the request and the risk of the environment. By implementing least privilege access, organisations minimise the attack surface, improve compliance visibility, reduce risk and lower costs.

  • Social Prescribing Software

    In Your Element Ltd (Trading as Elemental Software)

    Elemental helps organisations to enhance the impact of their social prescribing programmes via their award-winning digital social prescribing products and services. Elemental offers a range of social prescribing solutions designed to support the strategy and practice of self-care and independence in health, housing and the community.

  • IT Managed Service ie Cyber Security copy

    IMPACT CONNECTION LTD

    WHAT WE CAN DO FOR YOU Cyber Security Protection for your companies data PAM: Privilege Access Management Remediation Vulnerabilities Management We take care of all your information and data that can potentially vulnerable to outside attacks.

  • IAM-as-a-Service, Managed Service & Support (Bedrock)

    Turnkey Consulting (UK) Limited

    A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. . Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.

  • Osirium Privileged Access Management (PAM / PxM)

    Sapphire

    Osirium’s PxM suite provides Privileged Access Management & Task Automation to protect your IT infrastructure, cloud services and critical assets. By separating users from privileged credentials Osirium enforces a " least privilege" policy which controls, monitors and audits authorised employees and third-party access.

  • Micad Estates and Facilities Management Platform

    Micad Systems (UK) Ltd.

    The Micad platform has a suite of modules that helps manage: Property, Locations, Space Utilisation, Asbestos, Compliance, Planned & Reactive Maintenance, Condition Appraisal, Audits, Leases, Stock control, Purchasing, Contractor Management, Web call logging, Live Floor Plans Drawing Management, BIM, GIS MVP preparation and Document Publishing.

  • CyberArk CorePAS

    Blue Cube Security Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • Cloud Network & Security Audit Service [S12]

    CACI UK Ltd

    CACI’s cloud security assessment and network audit service assesses the current cloud solution architecture and network estate vs. best industry standards and practices. This includes configuration hardening, security health check, IAM / PAM assessment of deployed cloud services - thereby ensuring services deployed are resilient, secure and compliant.

  • CyberArk CorePAS

    Caretower Ltd.

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.

  • DXC Technology CyberArk Core PAS

    EntServ UK Ltd part of the DXC Technologies Group

    CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics

  • CyberArk CorePAS

    Softcat Limited

    CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

  • DXC Technology CyberArc PAS Advisory Service

    EntServ UK Ltd part of the DXC Technologies Group

    CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics

  • CyberArk CorePAS

    Avari Solutions

    CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.

  • Access Control and Identity Access Management

    FRANCIS NORTH GROUP LTD

    Privilege Access Management (PAM) /Identity Access Management (IAM) are critical components to enhancing its digital interactions between employees, clients / partners in a securely. We provide authentication services to limit /track employee and user access to protect systems from malicious entities, securing digital identities that drive online services.

  • Privileged Access Managment - CyberArk CorePas

    CyberIAM Holdings Ltd

    CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.