Skip to main content

Help us improve the Digital Marketplace - send your feedback

Innovate IT Ltd

Identity Maturity Assessment (IAM)

Our identity maturity assessment gives you a quantitative output of your risk against NIST and NCSC. We discuss your risk appetite and score it, from this we are able to design you a roadmap with discrete work packages.

The report can be presented at board level to communicate your risk.

Features

  • Metrics against your status provide quantitative data.
  • Identity maturity assessments
  • Business-case-style presentation report
  • Alignment with NIST CSF 2.0
  • Alignment with NCSC
  • Gap analysis
  • Objectively and independently assist with discovery
  • Clear roadmap divided into horizons and work packages
  • Based on our unique model for scoring
  • Analyses people, process and technology

Benefits

  • Reduced cyber risk
  • Defines a clear direction, saving time and money
  • Secure cloud through effective IAM
  • Take advantage of modern IAM technology
  • Useful for tendering exercises, providing specific requirements
  • Quickly identify and enforce IAM security policies
  • Understand how you can secure your department
  • Reduce IAM overhead
  • Communicate the outcome easily to funding boards
  • Improved compliance and governance

Pricing

£385 to £1,425 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Hello@Innovate.Cloud. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 7 1 9 5 6 7 5 0 7 4 3 8 6 9

Contact

Innovate IT Ltd Paul Rawlinson
Telephone: +44(0)1233 800 102
Email: Hello@Innovate.Cloud

Planning

Planning service
Yes
How the planning service works
When assisting buyers with planning the implementation of cloud identity platforms, we start by understanding their people, processes and technology. Our unique identity maturity risk score tool enables us to identify high risk areas and plan mitigation strategies for the customer based on prioritising the highest risk. We provide a high level roadmap, related horizons to sign-post the way and discrete work packages.

Our implementation plans include clear timelines and milestones to ensure smooth execution. We provide ongoing support to overcome challenges and optimise performance, ensuring minimal disruption to operations. By partnering with us, buyers benefit from our expertise and commitment to delivering tailored solutions that drive business value and innovation.
Planning service works with specific services
No

Training

Training service provided
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
This service helps the Buyer understand what they need to do to securely migrate to cloud or between identity services. The gap analysis, roadmap and work packages lead the Buyer to a more secure cloud transition.

Innovate has experience of migrating identities between on-prem Microsoft Active Directory (AD) on-prem to cloud identity providers (Idp) as well as between different cloud identity providers. We thrive on simplifying the most complex or disparate processes.

We integrate applications with Idps that enable you to manage all your cloud services either from the cloud Idp, or from another source of truth.

We utilise a combination of migration tools and custom scripts to ensure the identities, and the required attributes, are migrated to the new cloud identity platforms intact.

We have experience in migrating single forests, single domains, complex resource and identity forest combinations and inter-cloud.

Once migrated, we can help with automating processes.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
Yes
How the quality assurance and performance testing works
Our deliverables are quality assured by our internal QA team to a set of company standards based on industry best practice.
We will also agree a set of QA deliverables with the Buyer to ensure service is delivered to a consistent high-quality set of baseline measurements that the you, and we, expect.

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security incident management
  • Security audit services
  • Other
Other security services
Identity security review (includes process and people)

Ongoing support

Ongoing support service
No

Service scope

Service constraints
Support for this services is in good faith and is limited to up to 2 weeks beyond the delivery. Any questions on the outcomes should be directed to the key contact.
This service is purely consultancy and discovery, no changes, implementation, integration etc. are included in this service.
It is incumbent on the Buyer to fact check the documentation during the review, as any details we have been provided with that are incorrect will affect the outcome.

User support

Email or online ticketing support
No
Phone support
No
Web chat support
No
Support levels
Good faith, up to 2 weeks beyond delivery at no additional cost

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
CARDAN Compliance Services
ISO/IEC 27001 accreditation date
03/05/2024
What the ISO/IEC 27001 doesn’t cover
Most controls relating to a physical place of work and software development are out of scope of our ISO 27001 accreditation.
Controls relating to physical security (place of work)
Physical security perimeters
Physical entry
Securing offices, rooms and facilities
Physical security monitoring (NEW)
Protecting against physical and environmental threats
Working in secure areas
Supporting utilities
Cabling security

Controls relating to software development
Secure development life cycle
Secure system architecture and engineering principles
Secure coding (NEW)
Security testing in development and acceptance
Outsourced development
Test information
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ICO

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

We measure our CO2 as part of our carbon reduction plan.

In collaboration with Carbon Footprints, we send trees to schools and communities, creating areas that are richer in plants and wildlife, whilst benefitting and educating local communities through school interaction. Every year, we ensure we offset more tCO2e that we use.

For each tree we donate, our tCO2e is also offset as part of a Verified Carbon Standard (VCS) scheme.

Our commitment supports the government’s plan for:
• creating or restoring 500,000 hectares of wildlife-rich habitat outside the protected site network, focusing on priority habitats as part of a wider set of land management changes providing extensive benefits
• increasing woodland in England in line with our aspiration of 12% cover by 2060: this would involve planting 180,000 hectares by end of 2042
• making sure that there are high quality, accessible, natural spaces close to where people live and work, particularly in urban areas, and encouraging more people to spend time in them to benefit their health and wellbeing

Tackling economic inequality

From PPN06/20
Social value - Theme 2 Tackling Economic Equality -
MAC 3.1 - we are a small (SME) business that uses a network of associates (often business sizes of 1-3 people) by choosing us, you are helping small organisations grow. We have a clear development path to take staff from apprenticeships to identity architects and beyond. Cybersecurity is an industry that is lacking in skills and resources.
MAC 3.3 - we provide scalable and future-proofed solutions, we deliver solutions that modernise the workforce.
MAC 3.5 - as cyber security specialists, we identify and manage cyber security risk, both our own and for the projects or support services we provide to the Buyer. We are Cyber Essentials certified and ISO 27001 certified

Equal opportunity

We have a strong ethical remit, which is to offer the products and services that give the best value to the Buyer. This sense of ethics is the underpinning principle that links our network of suppliers and partners, regardless of their social and ethnic backgrounds and of different genders, sexual orientations, neurodiversity etc.

We have a clear development path to take staff from apprenticeships to identity architects and beyond. We are registered with the Apprenticeships Service.

Although we don't have to implement a modern slavery policy due to our size, we have nevertheless done so.

Wellbeing

All staff have access to our combined Employee Assistance Programme and private healthcare package. Here they have access to physical and mental health support, as well as programmes to support them to increase their activity levels and stay healthy.

As our staff are remote workers, we run regular check-ins to build team work and ensure morale is maintained. When we are on a project, the team working on it will work closely with the Buyer's team, building lasting relationships that ultimately benefit one another.

Pricing

Price
£385 to £1,425 a unit a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Hello@Innovate.Cloud. Tell them what format you need. It will help if you say what assistive technology you use.