Protecting against Cyber Attack – Policy & Identity
We develop risk-driven policies, processes and procedures to protect organisations from Cyber Attacks. Capabilities to enforce security measures are implemented to protect, networks, information systems, data and hosts.
Identity is managed, verified and access control enforced for all system users and devices. Privileged users are managed with greater scrutiny.
Features
- Development of Identity Access Management Strategy to improve organisational security.
- Support definition, implementation, communication and author appropriate policies and processes
- Identity and Access Management design, Access Management Architecture.
- Privileged User Access Management design and Architecture: reduce PAM risks.
- Development, continual improvement of cyber security policies and processes.
- Discovery and device trust of access to networks, systems, data.
- NIST Identity Management: NIST Assurance and Implementation Support.
- Simplify and Modernise user access: track access to protect systems.
- Cyber Risk Assessment: assess policy and identity procedures.
- Full knowledge of trusted devices: implement secure device policies.
Benefits
- Adapt services to ensure consistency with existing organisational security.
- Build stakeholder confidence with clearly articulated organisational strategy.
- Embed effective security policies, improve policy uptake and security awareness.
- Agile approach matched to risk appetite and data sensitivity.
- Reduce risk of unauthorised access to your critical business systems.
- Apply industry best practices to effective identity and access management.
- Increase operational visibility to critical systems to improve resilience.
- Manage privileges at an enterprise level through policy driven rules.
- Control, Manage and Monitor privilege accounts: implement effective PAM controls.
- Design and deliver privilege account management across all capabilities.
Pricing
£400 to £1,400 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 8 8 3 1 5 2 0 5 2 4 4 2 2
Contact
Pionen
Steve Moran
Telephone: 01743 296 535
Email: steve.moran@pionen.co.uk
Planning
- Planning service
- Yes
- How the planning service works
- We will always work closely and collaboratively with our client to understand their objectives, needs and capabilities and then agree how we can most effectively assist them in planning how they will implement cloud hosting or software services. We offer a tailor-able, full-lifecycle project and programme definition and delivery capability.
- Planning service works with specific services
- No
Training
- Training service provided
- Yes
- How the training service works
- We work closely with our clients throughout the project and service lifecycle to fully understand their training needs and build a customised approach to ensure your transition to cloud services is successful.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
- We provide a comprehensive set-up and migration service to support your transition to cloud hosting or cloud software. We follow a proven multi-stage migration path with full operational engagement to ensure secure and managed migration from legacy to new. We recognise the need to migrate with minimal disruption to operational services and reduce the risk of outage and data loss through structured planning, test and execution.
- Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- No
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security incident management
- Security audit services
- Other
- Other security services
-
- Security Engineering
- Security Capability Delivery
- Security Operations Centre
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
- We can provide any ongoing support package that a client may require. We are able to flex levels of support to meet changes in demand, for example we can provide enhanced support during transition or roll-out phases.
Service scope
- Service constraints
- Our service model is flexible and has no absolute constraints. We are able to offer bespoke packages to clients that include only the features that they need to support their business or organisation.
User support
- Email or online ticketing support
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Support levels
- Our support levels include onsite, email and telephone assistance, our projects typically employ an account management structure as as part of our delivery, support and quality assurance processes.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Centre for Assessment
- ISO/IEC 27001 accreditation date
- 20/04/2022
- What the ISO/IEC 27001 doesn’t cover
-
Out of Scope
Partner company Greenfield IT, Pink Spaghetti (Secretarial Services), Business Applications service providers, Microsoft Azure/ MS Office 365 and Atlassian environments. (in-line with the Shared Responsibility Model for SaaS)
Customer networks are also out of scope and covered by their own security programme. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
Pionen has a well developed method statement on the subject of fighting climate change. Depending on the time of year our activities will be varied in this domain. However we endeavour to measure and report, if requested, on the specific activities our team are participating in. This list if not exhaustive but includes things like reducing energy consumption, reducing travel when possible, investment in green technology and planting trees to offset carbon.
Pricing
- Price
- £400 to £1,400 a unit a day
- Discount for educational organisations
- No