Cloud Identity Management, Migration and Consolidation
This service provides expert support to address your challenges in managing identity on cloud services, including migration, consolidation from multiple systems, Joiner/Mover/Leaver (JML) processes, synchronisation, deduplication, security and day-to-day management.
Features
- End-to-end Service from Discovery to Early Life or Ongoing Support.
- Consolidates identities from multiple Microsoft365 or Google Workplace Domains
- Develops your identity management strategy for cloud / multi-cloud
- Migrates identity between on-premise and cloud, or between clouds.
- Improves/Establishes joiner/mover/leaver (JML) processes
- Implements identity / authentication security and identity monitoring
- Implements Privileged Identity Management tools and processes
- Effective collaboration with third-party suppliers and internal teams
- Supports or leads business engagement and communication
- Supports business case creation, quantifying and measuring benefits
Benefits
- Improve user experience and security by removing duplicate identities
- Improve efficiency and user experience by consolidating systems
- Reduce license costs for multiple systems & environments
- Improve security and license spend with effective JML processes
- Identify and remove dormant accounts & license costs
- Define / Develop effective identity strategy for cloud & multi-cloud
- Expert supplier, experienced on with large central government identity management
- Microsoft Gold Partner, but Technology agnostic supplier.
- Fix identity issues holding back your digital and technology strategy
Pricing
£300 a unit a day
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 3 2 4 1 8 2 2 7 1 0 5 1 5 0
Contact
Through Technology Limited
Peter Hanney
Telephone: +44 (0)7913334794
Email: enquiries@throughtechnology.uk
Planning
- Planning service
- Yes
- How the planning service works
- Identity migration and consolidation can be a complex process where you have multiple cloud systems or thousands of users. We undertake a comprehensive discovery exercise, then plan any required changes to ensure that they are designed, tested and delivered on time and to budget. We work with or oversee any internal or third-party technical teams required along with your business users to ensure any user-impacting changes are well communicated, scheduled and managed. We can work within your existing planning and operational change processes or bring our own standard agile processes and tools should this be required. Where identity management forms part of a larger cloud implementation or migration project, we can either undertake the other elements (such as data migration and scheduling) or work openly and collaboratively with your internal teams or other suppliers to deliver the project's overall objectives.
- Planning service works with specific services
- Yes
- Hosting or software services the planning service works with
-
- Any identity management solution, including but not limited to..
- Microsoft Azure Active Directory (AAD) and Microsoft Active Directory (AD)
- Azure AD Connect and Active Directory Federation Services (ADFS)
- Google Workspace / Directory
- Amazon AWS Directory Services
- Okta
- Palo Alto Cloud Identity
Training
- Training service provided
- Yes
- How the training service works
- For any user-impacting changes, we will provide user guidance in plain-English and an appropriate format, either providing the technical content for your user engagement team or producing written or video guidance directly for your end users. We will also train service desk teams in what changes to expect during any migration activity and in early life support, providing knowledgebase articles and service desk guidance to ensure the best possible user experience and high first-time-fix rates.
- Training is tied to specific services
- No
Setup and migration
- Setup or migration service available
- Yes
- How the setup or migration service works
-
We provide an end-to-end service for cloud migration and identity management, starting from initial discovery where we take onboard user requirements, security/compliance requirements, infrastructure dependencies, business requirements, source and target systems, through design, planning, testing, implementation, early life support and onward if required. We are toolset agnostic and will work with your chosen migration tooling or recommend the best option. We also help establish identity management processes, including identity monitoring, privileged identity management and Joiner/Mover/Leaver (JML) to improve security, reduce costs and ensure identity remains well-managed in your organisation. All of our work aligns to the Technology Code of Practice, NCSC guidance and principles, applicable legislation (e.g. GDPR) ,best practice and is undertaken in accordance with our ISO27001 certified Security management system and processes.
We have previously led identity management and consolidation work for environments up to 100,000 users in central government. Please get in touch at any point to discuss your requirements or clarify any aspect of this service. - Setup or migration service is for specific cloud services
- No
Quality assurance and performance testing
- Quality assurance and performance testing service
- Yes
- How the quality assurance and performance testing works
-
Through Technology is ISO9001 Quality Management certified and utilise our certified Quality Management System in all deliveries. Identity management is literally the key to our digital and technology platforms and services. We apply rigorous quality assurance and testing to all of our work and, where required, to your third-party suppliers and internal teams.
All of our work is subject to our own quality management processes and assessment. Performance planning is undertaken from initial discovery of your infrastructure and then any migration or processing activities will be performance tested to ensure we understand realistic throughput figures to feed into planning and scheduling activities. Our expert engineers can troubleshoot any performance issues with your existing cloud services or infrastructure.
Security testing
- Security services
- Yes
- Security services type
-
- Security strategy
- Security risk management
- Security design
- Cyber security consultancy
- Security testing
- Security incident management
- Security audit services
- Other
- Other security services
-
- Implementing Authentication and Security measures including:
- Privileged Identity Management
- Authentication Solutions (Multi-factor & passwordless)
- Identity Management & SIEM Implementation & Integration
- Identity Protection
- Certified security testers
- Yes
- Security testing certifications
-
- CHECK
- CREST
Ongoing support
- Ongoing support service
- Yes
- Types of service supported
-
- Buyer hosting or software
- Hosting or software provided by your organisation
- Hosting or software provided by a third-party organisation
- How the support service works
-
We tailor support to the customer's requirements and project scope, providing 1st-3rd line and early-life support as needed. We will work with your IT Service Management Tooling where this is preferable (e.g. as part of a wider service model) or can supply our own.
All customers' will have a named service manager responsible for any ongoing support and aftercare required.
Service scope
- Service constraints
- None. Any potential constraints would come from specifics of the customers' requirements and environment and be identified in our proposal.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Service levels, Service Hours and Service management tooling would be driven by customer need and discussed in procurement or through pre-procurement clarification of our service offering.
We either provide our own service management tooling, or utilise our customers' systems where joining an existing service model. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
-
We typically use the same chat tools that your users are familiar with and using day-to-day, such as Microsoft Teams, Slack, Google or chat in your existing IT Service Management toolset. This removes the need to teach users (and their assistive technology) a new chat platform.
We fully recognise the importance of providing a great support experience for all users and will work with you to ensure this is well-managed. - Support levels
- Service levels, Service Hours and Service management tooling would be driven by customer need and discussed in procurement or through pre-procurement clarification of our service offering.
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Standards Institute (BSI) - BSI Certificate Number IS 743920
- ISO/IEC 27001 accreditation date
- 13/10/2021
- What the ISO/IEC 27001 doesn’t cover
- Nothing, it covers the full scope of our G-Cloud Services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Through Technology is a Carbon Negative Business and formally assessed and certified as such with the PAS2060 Carbon Neutral Plus standard. This means that our services are operated to remove more carbon dioxide from the atmosphere than our business has created or will create in future, already significantly exceeding HM Government's Net Zero targets. Our business was designed with a very carbon-efficient business model. Building on this foundation, we have a process of continual improvement. We annually calculate our carbon footprint using the reputable carbonfootprint.com service, identify further reductions in our environmental impact, then offset -double- the residual carbon footprint of our business through the same scheme reputable UK tree-planting scheme used to offset HM Government ministerial travel. Measuring our footprint every year, optimising it and offsetting double, scales with our business and automatically applies to every service we provide (through G-Cloud or elsewhere). Furthermore, because trees last for many years, our positive impact on carbon capture and storage will continue to grow greater and greater across the lifetime of our business. As a business, we are also focussed upon helping our customers achieve your outcomes. We consider environmental impact in the work we undertake as part of our services many of which involve carbon reduction through modernisation of systems and migration to the cloud. Fighting Climate Change is something we are passionate about. We are proud of the contribution we make as UK Small Business. It also shows our commitment to not only meet, but exceed government targets for fighting climate change and goals of Procurement Policy Notes PPN 06/20 (Social Value) and PPN 06/21 (Taking account of Carbon Reduction in major contracts). Further detail, including "Beyond Net Zero - The Through Technology Environmental Impact Plan" available at www.throughtechnology.uk/carbonreductionCovid-19 recovery
Through Technology are a UK SME Businesses, paying all our taxes in the UK and operating in full compliance with UK Tax regulations. In Through Technology, we have a very strong focus on achieving value for the tax-payers money and on supporting the UK economy. We are signatories to the UK Government Small Business Commissioner’s Prompt Payment Code. Meaning we commit to paying our supply chain within 30 days and have never yet failed to do so, even when we ourselves have faced delays in our payments. Our company principles include sharing knowledge and building capability with our customers’ internal teams. This can be seen in our “Insource Transition Support” service published on G-Cloud. Helping our customers insource and develop their internal teams will drive upskilling and job creation within our public sector customers. We have a defined standard business process to actively seek out opportunities for savings and cost avoidance for our customers in everything we do. This process has resulted in savings and cost avoidance of over £10M in the last 3 years, saving our customers more than we have cost them while we have also delivered all of our contracted scope. We have also created new jobs in our business during and after the Covid 19 pandemic and support our staff volunteering in education, to support the generation most affected by Covid Lockdown.Tackling economic inequality
Through Technology are committed to fighting economic inequality. As a modern business without strong geographic ties, our hiring policy is to prioritise recruitment from areas of high social deprivation as identified in the Department for Levelling Up, Housing and Communities' English Indices of Deprivation). At present, 40% of our staff are from these areas and as our business grows, so will this percentage, ensuring that most of the tax-payer money spent on our services ends up in the local UK communities that need it the most. We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society.Equal opportunity
We are an equal opportunities employer that recognises and actively seeks out the benefits of diverse and inclusive teams to our business, to our customers and to wider society. This is built into our policies, procedures and contracts, and lived day to day. We have worked to remove any bias from our organisational processes, including subconscious bias where it may exist. An example is that the first stage of our recruitment process is anonymised, minimising the impact of any potential bias in CV and Application evaluation. We are signatories to the Armed Forces Covenant and seek proactively to recruit ex-forces personnel, overcoming some of their challenges in returning to civilian life. Our recruitment process for opportunities is intentionally designed to be accessible and open to all. Our teams working through G-Cloud are diverse and include people from different parts of the UK, age groups, ethnic origin, gender, disability and faith.Wellbeing
Through Technology’s defining characteristic is the quality of our people, so we take well-being very seriously and have a number of measures in place to support the well-being of our staff and people they work with. Despite our relative small size, we have a board member responsible for staff wellbeing and a number of policies and processes which we live every week to maintain it. Examples include: Providing private health cover for all employees, offering time out for voluntary work in our local communities (including current staff acting as school governors, sports coaches, volunteering careers guidance in schools, acting as community representatives and teaching practical philosophy/life skills), funding a qualified Mental Health First Aider within the business, fostering a culture that welcomes private or public discussion of mental health and well-being (including open discussion of our CEO’s personal experiences). We also care about the well-being of those we work with in our supply chain, our customers, and their third-party suppliers. If we identify any well-being or stress-related issues with colleagues outside our organisation, then we handle these sensitively through the appropriate process or channel.
Pricing
- Price
- £300 a unit a day
- Discount for educational organisations
- No