We assist our customers with their IAM requirements via the following:


  • Governance and compliance
    Advisory and guidance in IAM related matters providing expertise from industry related experts, as well as from direct experience built over the past 20 years working for medium and large businesses within the IAM arena.
  • Implementation
    From automation of workflow processes with IAM solutions, to user access related processes such as entitlement review process automation and integration with IAM services, Cyberark implementation for safe and password management.
  • Analysis and Design
    From technical design of process architecture to analysis of business requirements and translation into IT processes and controls, via expertise across a number of organisational models and types.
  • Project Management
    Leading individuals and teams to strengthen the IAM landscape, assisting companies in setting IAM strategy, project planning, delivery of strategic roadmap for IAM processes.
  • Risk Management
    Such as information security risk assessments, IT control framework compliance, review of IT controls against regulatory frameworks, e.g. SOX and Solvency II facing sytems.
  • Staffing
    Includes the deployment of privacy officers, onsite audit, and other technical specialist.

Focus areas:

  • Privacy
  • Identity
  • Access Control
  • Authentication
  • Audit