-
Savanti Consulting
Savanti has the technical expertise needed to create effective Privileged Access Management (PAM) strategies and solutions: ensuring that only individuals with an appropriate level of privilege can access specific systems or information; while monitoring privileged end-user account activity to detect and respond to attempts to bypass PAM controls.
-
pam
pam enables success in local, multi-agency, cross-county, regional and national work. It is trusted, secure, cloud based software ideal for agencies fighting serious organised crime, protecting vulnerable people, and solving other complex collaboration or sensitive information sharing issues.
-
CyberArk
CyberArk PAM Consultancy Services can assist with; design and implementation of CyberArk solutions, advice on industry best practises for PAM and program road-map decisions, design and implement integrations with 3rd party vendor solutions, component installations and configurations, privileged account discovery, solution upgrades, major project cycles, on-boarding cycles, knowledge transfer.
-
MTI Technology Ltd
MTI provide market leading CyberArk Privileged Access Security Licensing, Integration and Management Services. We can fully secure privileged accounts across your organisation including password control and full auditing of administrator actions on all hosts. The service is supported by our UK based 24x7x365 Security Operations Centre (SOC).
-
Smart Co Consulting Limited
Smartco help organisations deliver their Identity and Access Management (IAM / IdAM) and Privileges Access Management solution (PAM) with a cloud based Single Sign on, Identity Management and Multi Factor Authentication solution that fully Integrates with AD and Office365 for seamless user experience.
-
Brookcourt Solutions
Brookcourt provide a range of solutions and services:- Multi-factor authentication, Authentication-as-a-Service, DLP (data-loss-prevention), PAM, IAM, Endpoint-protection, data-security, cloud-security, web-security new solutions available upon enquiry.
-
Reliance acsn
Reliance Privileged Access Management Service delivers an indispensable, comprehensive Privileged Account Management (PAM) solution protecting your most valuable information assets from cyber attacks and insider threats. Reliance PAM Service ensures the protection of privileged accounts. They fast and easy to deploy and use, and scale from SMB to enterprise.
-
Accenture (UK) Limited
Accenture’s digital identity services help you to build a sustainable identity and access management (IAM) capability covering all the key IAM domains: enterprise IAM, privileged access management (PAM), citizen/customer IAM and data access governance. Accenture provides end-to-end services spanning strategy and governance design, through delivery, to managed IAM solutions.
-
pam
An online secure information security management system (ISMS) and data privacy solution with tools, policies and frameworks. To meet governance, regulatory, compliance of internal ISMS and supply chain collaboration for ISO 27001, ISO 27701, ISO 22301, GDPR, NIST, including; audits and reviews, staff information security communications and more.
-
IAME Ltd
Advisory Services
Implementation Services
Standard technical support
24/7 full managed services
-
EntServ UK Ltd part of the DXC Technologies Group
DXC's Privileged Account Management(PAM) is powered by industry-leading technology and expert advisory and managed security services, Privileged Account Management protects organizations' most critical assets by securing, managing, and monitoring privileged accounts and access. PAM helps clients gain control of their critical accounts, which leads to increased visibility, accountability, and efficiency.
-
Turnkey Consulting (UK) Limited
Turnkey's IAM services help assess, improve or establish solutions to control and govern access to systems. We improve security, reduce risk and improve user’s experience in accessing systems to perform their role across employees, third-parties, contractors, IoT devices, bots and your consumers; helping improve processes, increase productivity and reduce costs.
-
Innovate IT Ltd
Innovate IT Ltd has successfully delivered work packages for many Government departments in London and Scotland. Our information security architects can deliver customised work packages, tailored for bespoke applications and services. We also offer support services for our implementations.
-
KPMG LLP
This service will help you develop, design and deliver essential set of controls to prevent insider risk from inappropriate access to a cloud environment. The range of services include - Thematic audits & JML processes, Strategy and roadmaps development, deployment of Privileged Access Management solutions and providing solution support.
-
Innovate IT Ltd
Innovate IT Ltd has successfully delivered work packages for many Government departments in London and Scotland. Our information security architects can deliver customised work packages, tailored for bespoke applications and services. We also offer support services for our implementations.
-
Somerford Associates Limited
Zero Trust Privilege reduces data exposure by granting 'least privilege access' to whoever is requesting access. It validates the user's credentials, the context of the request and the risk of the environment. By implementing least privilege access, organisations minimise the attack surface, improve compliance visibility, reduce risk and lower costs.
-
In Your Element Ltd (Trading as Elemental Software)
Elemental helps organisations to enhance the impact of their social prescribing programmes via their award-winning digital social prescribing products and services. Elemental offers a range of social prescribing solutions designed to support the strategy and practice of self-care and independence in health, housing and the community.
-
IMPACT CONNECTION LTD
WHAT WE CAN DO FOR YOU
Cyber Security
Protection for your companies data
PAM: Privilege Access Management
Remediation
Vulnerabilities Management
We take care of all your information and data that can potentially vulnerable to outside attacks.
-
Turnkey Consulting (UK) Limited
A managed service for IAM allowing companies to access IAM software, in the cloud via a subscription. This helps smooth upfront implementation costs reducing capital expenditure. .
Our offering includes a fully managed support service, managing existing IAM solutions, on-premise or cloud-hosted (public/private), or providing one for them.
-
Sapphire
Osirium’s PxM suite provides Privileged Access Management & Task Automation to protect your IT infrastructure, cloud services and critical assets. By separating users from privileged credentials Osirium enforces a " least privilege" policy which controls, monitors and audits authorised employees and third-party access.
-
Micad Systems (UK) Ltd.
The Micad platform has a suite of modules that helps manage: Property, Locations, Space Utilisation, Asbestos, Compliance, Planned & Reactive Maintenance, Condition Appraisal, Audits, Leases, Stock control, Purchasing, Contractor Management, Web call logging, Live Floor Plans Drawing Management, BIM, GIS MVP preparation and Document Publishing.
-
Blue Cube Security Ltd
CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.
-
CACI UK Ltd
CACI’s cloud security assessment and network audit service assesses the current cloud solution architecture and network estate vs. best industry standards and practices. This includes configuration hardening, security health check, IAM / PAM assessment of deployed cloud services - thereby ensuring services deployed are resilient, secure and compliant.
-
Caretower Ltd.
CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.
-
EntServ UK Ltd part of the DXC Technologies Group
CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics
-
Softcat Limited
CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.
-
EntServ UK Ltd part of the DXC Technologies Group
CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics
-
Avari Solutions
CyberArk provide Privileged Access Management (PAM) software, this is an end-to-end solution that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring and responding to all real time privileged activity using intelligent threat analytics.
-
FRANCIS NORTH GROUP LTD
Privilege Access Management (PAM) /Identity Access Management (IAM) are critical components to enhancing its digital interactions between employees, clients / partners in a securely. We provide authentication services to limit /track employee and user access to protect systems from malicious entities, securing digital identities that drive online services.
-
CyberIAM Holdings Ltd
CyberArk CorePAS provides Privileged Access Management (PAM) solutions, these are end-to-end solutions that protects, manages and audits both user and application credentials, provides least privilege access and session isolation while recording, monitoring automation and response to all real time privileged activity using intelligent threat analytics.