2016 Identity Summit
Solutions
Identity Management
Our consultancy led approach to service covers all aspects of Identity and Access Management for Enterprise, Cloud and Mobile.
Find out moreData Security and Privacy
Identity Methods offers comprehensive client data masking solutions, operating on a mixture of database platforms, using obfuscation, redaction, strong encryption and other masking techniques via enterprise deployment or as a service.
Find out moreCyber Security
We work with our clients to analyse cyber vulnerabilities and reduce the attack surface using such standards as ISO27001:2013, NIST 800-53, SANS 20 and OWASP. We focus down on the points that matter and create solutions that work.
Find out more
Professional Services
Architecture & Design
We focus on IDAM as a business process, not just on technology. Our people are industry veterans who have worked with the major international systems integrators and consulting and advisory houses.
Find out moreTechnical Delivery
We have designed, built and delivered many IDAM projects across all major industry verticals. We use a hybrid PRINCE2/Agile approach to ensure our clients get the service they bought in the timescale they require.
Find out moreBusiness Analysis
Using our knowledge of Business Process and Change Management, we can advise clients on how best to streamline the use of their IAM systems, strategically combining the needs of business units with those of governance and audit.
Find out moreStrategic Advisory
We are adept at advising clients on how best to tackle the business challenges they face in bringing in new business processes, developing or consuming new applications and embracing the Cloud. By using innovation methods to drive efficiency, collaboration and improvement we get the result you need.
Find out moreProject & Programme Management
We use a hybrid PRINCE 2/Agile methodology to our programme and project management services. Transition and Transformation projects are mapped and managed through to completion, on time and on budget.
Find out more
Products

IBM
IBM protect enterprises from complex IT security threats while reducing costs.

Camouflage
Camouflage is a leading provider of enterprise-class data masking solutions for securing sensitive data.

SecureAuth
Providers of frictionless user access controls for mobile, cloud, web and VPN that is so flexible and secure it meets today's access control needs and tomorrow's

SMS Passcode
A pioneer of a new generation of more intelligent, flexible and user-centric authentification, that gives you the power to balance strong security for your business with high convenience for your users.

Centrify
Identity Management and Auditing for Big Data. Centrify Server Suite secures even the most complex big data environments by leveraging an organization’s existing Active Directory infrastructure to deliver access control, privilege management and user-level auditing.

ForgeRock
Forgerock build digital identity ecosystems to connect users, devices and things for premier businesses and governments.

CyberArk
Focused on striking down targeted cyber threats that make their way inside to attack the heart of an enterprise.

Beta Systems
Beta Systems is a leading provider of IAM solutions designed for international companies and industries that process large volumes of data.

Fortinet
Fortinet is the World's leading provider of unified threat management solutions. With presence across most of the World's largest organisations Fortinet provides industry leading solutions to protect you rnetwork from cyber attack.
Download our FREE GDPR eBook

