Skip to main content

Help us improve the Digital Marketplace - send your feedback

Pionen

Protecting against Cyber Attack – Policy & Identity

We develop risk-driven policies, processes and procedures to protect organisations from Cyber Attacks. Capabilities to enforce security measures are implemented to protect, networks, information systems, data and hosts.
Identity is managed, verified and access control enforced for all system users and devices. Privileged users are managed with greater scrutiny.

Features

  • Development of Identity Access Management Strategy to improve organisational security.
  • Support definition, implementation, communication and author appropriate policies and processes
  • Identity and Access Management design, Access Management Architecture.
  • Privileged User Access Management design and Architecture: reduce PAM risks.
  • Development, continual improvement of cyber security policies and processes.
  • Discovery and device trust of access to networks, systems, data.
  • NIST Identity Management: NIST Assurance and Implementation Support.
  • Simplify and Modernise user access: track access to protect systems.
  • Cyber Risk Assessment: assess policy and identity procedures.
  • Full knowledge of trusted devices: implement secure device policies.

Benefits

  • Adapt services to ensure consistency with existing organisational security.
  • Build stakeholder confidence with clearly articulated organisational strategy.
  • Embed effective security policies, improve policy uptake and security awareness.
  • Agile approach matched to risk appetite and data sensitivity.
  • Reduce risk of unauthorised access to your critical business systems.
  • Apply industry best practices to effective identity and access management.
  • Increase operational visibility to critical systems to improve resilience.
  • Manage privileges at an enterprise level through policy driven rules.
  • Control, Manage and Monitor privilege accounts: implement effective PAM controls.
  • Design and deliver privilege account management across all capabilities.

Pricing

£400 to £1,400 a unit a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.moran@pionen.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 9 8 8 3 1 5 2 0 5 2 4 4 2 2

Contact

Pionen Steve Moran
Telephone: 01743 296 535
Email: steve.moran@pionen.co.uk

Planning

Planning service
Yes
How the planning service works
We will always work closely and collaboratively with our client to understand their objectives, needs and capabilities and then agree how we can most effectively assist them in planning how they will implement cloud hosting or software services. We offer a tailor-able, full-lifecycle project and programme definition and delivery capability.
Planning service works with specific services
No

Training

Training service provided
Yes
How the training service works
We work closely with our clients throughout the project and service lifecycle to fully understand their training needs and build a customised approach to ensure your transition to cloud services is successful.
Training is tied to specific services
No

Setup and migration

Setup or migration service available
Yes
How the setup or migration service works
We provide a comprehensive set-up and migration service to support your transition to cloud hosting or cloud software. We follow a proven multi-stage migration path with full operational engagement to ensure secure and managed migration from legacy to new. We recognise the need to migrate with minimal disruption to operational services and reduce the risk of outage and data loss through structured planning, test and execution.
Setup or migration service is for specific cloud services
No

Quality assurance and performance testing

Quality assurance and performance testing service
No

Security testing

Security services
Yes
Security services type
  • Security strategy
  • Security risk management
  • Security design
  • Cyber security consultancy
  • Security incident management
  • Security audit services
  • Other
Other security services
  • Security Engineering
  • Security Capability Delivery
  • Security Operations Centre

Ongoing support

Ongoing support service
Yes
Types of service supported
  • Buyer hosting or software
  • Hosting or software provided by your organisation
  • Hosting or software provided by a third-party organisation
How the support service works
We can provide any ongoing support package that a client may require. We are able to flex levels of support to meet changes in demand, for example we can provide enhanced support during transition or roll-out phases.

Service scope

Service constraints
Our service model is flexible and has no absolute constraints. We are able to offer bespoke packages to clients that include only the features that they need to support their business or organisation.

User support

Email or online ticketing support
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Support levels
Our support levels include onsite, email and telephone assistance, our projects typically employ an account management structure as as part of our delivery, support and quality assurance processes.

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Centre for Assessment
ISO/IEC 27001 accreditation date
20/04/2022
What the ISO/IEC 27001 doesn’t cover
Out of Scope

Partner company Greenfield IT, Pink Spaghetti (Secretarial Services), Business Applications service providers, Microsoft Azure/ MS Office 365 and Atlassian environments. (in-line with the Shared Responsibility Model for SaaS)

Customer networks are also out of scope and covered by their own security programme.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

Pionen has a well developed method statement on the subject of fighting climate change. Depending on the time of year our activities will be varied in this domain. However we endeavour to measure and report, if requested, on the specific activities our team are participating in. This list if not exhaustive but includes things like reducing energy consumption, reducing travel when possible, investment in green technology and planting trees to offset carbon.

Pricing

Price
£400 to £1,400 a unit a day
Discount for educational organisations
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at steve.moran@pionen.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.