Skip to main content

Help us improve the Digital Marketplace - send your feedback

Phoenix Software Ltd

CyberArk Workforce Password Management SaaS

"The service offers a password vault for business users to store any secrets such as (business) personal usernames and passwords to unconnected (non federated) services and any secrets including file attachments.

Features

  • Secure secret storage (Vault)
  • Single interface for access to federated applications
  • Land and catch automation to onboard credentials for web interfaces
  • Sharing with peers either directly to via folder sharing management
  • Avoid password re-use/use of known compromised credentials
  • Company governance enforcement such as unsanctioned applications, MFA strength

Benefits

  • Single interface to store passwords and secrets
  • Single interface to automatically connect to non connected applications
  • Easily & safe sharing of secrets with peers
  • Safe storage of passwords and secrets
  • Company governance enforcement
  • Audit & reporting on used applications, compromised credentials etc.
  • Avoid the use of unsanctioned apps

Pricing

£4.20 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 9 7 5 9 4 2 7 2 4 9 1 8 8 6

Contact

Phoenix Software Ltd Jonny Scott
Telephone: 01904 562200
Email: ccs@phoenixs.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
The Service is only delivered as SaaS. To manage access of on-prem/private cloud applications and/or to connect to on-prem/private cloud directories (AD, LDAP), it includes a gateway to deploy in the on-prem/private cloud environment. The service includes browser plugins.
System requirements
  • Compatible web browser.
  • The Identity Gateway requires Windows 2016 server (or later)
  • 8GB memory and 2 CPU cores.
  • Ability to deploy browser plugins for password management

User support

Email or online ticketing support
Email or online ticketing
Support response times
"2 hours for critical events
4 hours for serious events
6 hours for moderate events
12 hours for minor events"
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
"24x7 Helpdesk support
Professional Services for deployment and post-installation modifications
Technical Account Management as an ongoing service
Customer Success assistance to guide the IAM Program"
Support available to third parties
Yes

Onboarding and offboarding

Getting started
"CyberArk provides detailed documentation on the CyberArk Docs site as well as video tutorial. CyberArk and it's partners can also provide Professional Services to new and existing customers for this purpose.
Online training and certifications are available."
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Videos
  • Powerpoint slides
End-of-contract data extraction
Data is made available upon request.
End-of-contract process
After a specified period of time the tenant and the data is holds it deleted from the cloud service. For legal reasons some information about the contact can be witheld for a longer period.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The web interface is fully responsive as such it can be used on a mobile device, with all features enabled. In addition we deliver an optionnal mobile app that can be used for MFA and access to the user portal.
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
"- The solution is fully managed with a web interface. There is no other UI available.
The business users will make use of the web interface only."
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
The web interface has been developed and tested with full respect of standards, and as such shouldn't prevent usage of assistive technologies.
API
Yes
What users can and can't do using the API
"The whole solution is build upon documented microservices. Any action that can be done via the web interface can be done via API calls. On top of this additional API's are available.
The solution comes with a runbook orchestration engine that offers a visual no-code interface to automate tasks based upon API calls."
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Customisation options includes :
- logos, colors, background images (ie the web interface can be made to fits a customer's visual identity)
- support links (help, contact us, about, etc...)
- email templates

Scaling

Independence of resources
The service has been designed to sacle automatically. Plus the standard service instanciation can withstand several thousands requests per minutes

Analytics

Service usage metrics
Yes
Metrics types
Active users, logins, failed logins, Application usage insights & activity monitoring including recording of web sessions.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
CyberArk

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
CyberArk uses advanced encryption algorithms to protect data at rest.
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Except for privacy regulation purpose, the nature of the service doesn't require users to export their data.
Data export formats
Other
Other data export formats
N/A
Data import formats
Other
Other data import formats
N/A

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
CyberArk uses advanced encryption algorithms to protect data at rest.

Availability and resilience

Guaranteed availability
"99.99% Availability.
Service credit allocation in case of lower uptime :
- Less than 99.99% but equal to or greater than 96% : 10% of annual Subscription Fees
- Less than 96% : 20% of annual Subscription Fees"
Approach to resilience
"CyberArk Identity is architected to run on multiple Availability Zones which ensures redundancy within
each region. Additionally, every region has designated DR region. In event of a catastrophic failure
across all 3 Availability Zones, CyberArk will restore services to a designated DR site. Additionally,
we also take frequent backups in al DR regions so that in the event of a failure we can restore the
service gracefully.
Outage reporting
"1. Public dashboard
2. Email subscription to alerting
3. SMS subscription to alerting
4. Webhook call to automate response workflows"

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication
"This depends upon the configured policies. For example username + password (from a connected datastore such as AD, LDAP or any federated directory such as Entra, Google, etc) with 2nd factor enforcement if desired.
The 2nd factor to choose from is configurable by policy and can be with the use of the related mobile app, TOTP via email & SMS, Hardware integration such as platform authenticators, FIDO keys or smartcards, QR-code, Biometrics and more.
The whole solution works in an adaptive way based on policies set and user behaviour.
Access restrictions in management interfaces and support channels
Management interface is controlled by RBAC. Support access with CyberArk requires users to be registered and also take have completed training and passed the appropriate examinations
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Other
Description of management access authentication
This depends upon the configured policies. For example username + password (from a connected datastore such as AD, LDAP or any federated directory such as Entra, Google, etc) with 2nd factor enforcement if desired.
The 2nd factor to choose from is configurable by policy and can be with the use of the related mobile app, TOTP via email & SMS, Hardware integration such as platform authenticators, FIDO keys or smartcards, QR-code, Biometrics and more.
The whole solution works in an adaptive way based on policies set and user behaviour.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
The Standards Institute Israel
ISO/IEC 27001 accreditation date
14/03/2023
What the ISO/IEC 27001 doesn’t cover
Certificate is Applicable to Business processes: Research, development, sales and support of information security solutions and technologies.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • ISO 9001
  • Common Criteria
  • NISA Certified
  • VPAT 508
  • FIPS 140-2
  • NIST 800
  • SOC2 certified

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
CyberArk has the following additional accreditations: ISO 9001, Common Criteria, NISA Certified, VPAT 508, FIPS 140-2, NIST 800 & SOC2 type2 certified.
Information security policies and processes
"The InfoSec Department provide direction and technical expertise to ensure that CyberArk’s information is properly protected. This includes consideration of confidentiality, integrity, and availability of information and the systems that handle it. They act as liaison on InfoSec matters between all departments, and must be the focal point for all InfoSec activities throughout CyberArk. The Department performs risk-assessments, prepares action-plans, evaluates vendor-products, participates on in-houseIT system development projects, Implementations, investigates information security breaches, trains staff members. The InfoSec Department has the authority to create and periodically modify both technical standards and standard operating procedures that supports the InfoSec policy. When approved by appropriate CyberArk management, new requirements have the same scope and authority as if they were included in existing policy documents.

An information security steering committee, consisting of the CEO, GM, CIO and CISO must meet bi-weekly to review the current status of information security at CyberArk, approve and later review information security projects, and perform other necessary high-level information security management activities. Other employees may join the committee according to necessity and relevance. An information security Audit committee is being updated with information security work plan and risks management on a bi-quarterly basis."

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
"CyberArk Workforce Identity is a modern multi-tenant SaaS application that is deployed utilizing a SecureSDLC with proper CI/CD tooling. Tooling and process are considered part of the product and are subject tochange over time as we improve them. Infrastructure and application deployments are done through the samemechanism. The same process is used for both sandbox and production customer’s tenants. CyberArk currently adopts industry practices suchas Open Web Application Security Project (OWASP), Application Security Verification Standard(ASVS) and CSA Consensus Assessments Initiative Questionnaire (CAIQ), and further conductsthreat modeling (based on STRIDE methodology).
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
CyberArk uses various tools to continuously track and monitor security vulnerabilities. As part of theongoing information security activities, the security vulnerabilities are prioritized and assigned anappropriate remediation process according to the type of vulnerability, its severity and exposure.CyberArk’s security vulnerability steering committee gathers on a bi-monthly basis to track andmonitor open issues and remediation progress.
Details available on demand
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Infrastructure monitoring is accomplished through a series of modern tooling utilizing traces, timeseries metrics, and logs. Appropriate SLO's and SLI"s are developed to trigger alerts and respondaccordingly. Data is collected from devices and applications in the network and aggregated into theSecurity Information and Event Management (SIEM) in order to detect and respond to possibleanomalies and threats. The SIEM is monitored by a dedicated 24/7 security operation center (SOC)to help rapidly detect and mitigate risks.
Incident management type
Supplier-defined controls
Incident management approach
"CyberArk maintains a formalized, documented Incident Response Plan (IRP) and runs annual IRP
drills. The IRP outlines how incidents are identified, classified, reported, remediated, and mitigated
throughout the incident response process including post-incident assessments."

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Fighting climate change
Effective stewardship of the environment with activities that deliver additional environmental benefits in the performance of the contract including working towards net zero greenhouse gas emissions.
We can support customers environmental goals by providing annual carbon emissions on contract and reduction plans.

We will run free of charge sustainability infrastructure reviews for customers to understand how they can reduce carbon emissions of their IT services.

We are working towards 2040 Net-Zero GreenHouseGas emissions.
Since 2021 we have been Carbon Neutral with Gold Standard Certified carbon credits - partner Ecologi.
By 2026 we aimed to reduce Scope 1 and 2 emissions by 50% from a 20/21 baseline year and which we have now achieved.
By 2030 we aim to reduce all of our emissions (including Scope 3) by 50% this is from a 22/23 baseline year.

Achievement of 2030 50% reduction targets (based on last FY) would mean a minimum carbon reduction of 142tCO2e per year for the public sector.

We record and monitor our usage/ conversion to carbon emissions monthly and progress is published annually on the website in accordance with PPN06/21 and SECR guidelines. We are ISO14001 certified, and our targets are currently being verified by SBTi.

Overall, the business:
-Generates solar energy (85%) with REGO renewable purchased energy.
-Zero waste to landfill waste management
-Minimises travel emissions by 60%
-Uses water wisely – reduced by 15%

Influence staff, suppliers, customers and communities through the delivery of the contract to support environmental protection and improvement.

We work hard to influence others and change behaviours to help fight climate change.

Workforce:
-Sustainability inductions
-Sustainability training
-Staff campaigns
-Volunteering opportunities
-Family woodland tree planting

Suppliers:
-Supply-chain reviews
-Sustainability training
-Blogs/ media content
-Sustainability training

Customers:
-Sustainability Infrastructure Review
-Hardware Carbon-Assessments
-Circular-Economy support
-Sustainability training

Covid-19 recovery

COVID-19
Help local communities to manage and recover from the impact of COVID-19 with activities in the delivery of the contract which:
Create employment, re-training and other return to work opportunities for those left unemployed by COVID-19, particularly new opportunities in high growth sectors.
- Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme
Support organisations and businesses to manage and recover from the impacts of COVID-19, including where new ways of working are needed to deliver services.
-Phoenix Small Business Digital Skills Outreach programme – webinars supporting cyber security, accessibility and licensing.
-Phoenix VCSE Digital Skills Outreach Programme – webinars supporting cyber security, accessibility and licensing.
Support the physical and mental health of people affected by COVID-19, including reducing the demand on health and care services.
-Phoenix Digital Skills Outreach Programme – Supporting people to access services services online e.g NHS app and Banking apps.
Examples of our working with London and Quadrant Housing Association to deliver befriending calls for tenants who were lonely and isolated as a result of Covid19.
We have also worked with Liverpool City Council to promote employability courses to those left unemployed by Covid-19 and who are now in employment.
We provided free of charge IT service desk to 15 charities during the pandemic and have worked closely with them to support them with returning to full operation again.

Tackling economic inequality

Tackling economic inequality
Create new businesses, new jobs and new skills with activities that, in the delivery of the contract:
Create opportunities for entrepreneurship and help new, small organisations to grow, supporting economic growth and business creation.
-60% of our supply chain are SME’s
-We are signatories and adhere to the Prompt Payment Code
-Host Dragons Den SME supply chain sessions for new suppliers to showcase their services for our customers.
Create employment opportunities particularly for those who face barriers to employment and/or who are located in deprived areas.
- The Phoenix Employability Outreach Programme provide unique access to Microsoft Career Essentials digital literacy programme, career talks and employability advice.
Create employment and training opportunities, particularly for people in industries with known skills shortages or in high growth sectors.
-Graduate work placements
-Phoenix Employability Outreach Programme - Unique access to Microsoft Career Essentials programme for certifications to skill up for roles in the IT sector.
-We work with our supply-chain to create job roles with shared apprenticeship heads and promotion to permanent employment.
Support educational attainment relevant to the contract, including training schemes that address skills gaps and result in recognised qualifications.
-Apprenticeships whereby we aim for c.10 graduating apprentices and all are moved into permanent employment with Phoenix.
-Skills City Bootcamp where we deliver career talks and provide projects to 19+ year olds seeking to upskill for employment in the technology sector.
Influence staff, suppliers, customers and communities through the delivery of the contract to support employment and skills opportunities in high growth sectors.
-Our programmes are delivered in partnership with our customers, supply chain and workforce, including Career talks, mentoring and IT challenge activities.

Equal opportunity

Equal opportunity
Reduce the disability employment gap with activities that:
Demonstrate action to increase the representation of disabled people in the contract workforce.
-We are certified Disability Confident Employers (level 2).
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We are exploring the use of the Voluntary Reporting Framework for understanding the disability makeup of the workforce.
Tackling workforce inequalities with activities that demonstrate action to identify and tackle inequality in employment, skills and pay in the contract workforce.
- We focus on ensuring an inclusive and unbiased recruitment strategy, with unconscious-bias training, blind recruitment processes, and reviewing language and placement of advertisements.

-All staff trained receive mandatory EDI training annually.

Various initiatives include
-Signatories of the Race at Work Charter,
-Disability Confident Committed Employer
-Signatories of the Armed Forces Covenant
-Gender-Neutral toilets
-Prayer room
-Milk-pumping room
-Sponsor York Pride
-We have specific policies for Menopause, and LGBTQ+.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology
-We monitor our workforce statistics and report on them:
Gender 65% male /35% female (industry-average 20%)
Ethnicity 5.6% (local-area 3.9%)
Staff turnover 12.3% (industry-average 13.2%)
Using the Voluntary Reporting Framework, we are working on what and how we can report metrics around disabled people in the workforce, including those with hidden disabilities.

We have been recertified as a Great Place to Work™ and UK's Best Workplaces™ for Women.

Wellbeing

Wellbeing
The mental health and well-being (MHWB) of our staff is of the utmost importance to us and our MHWB Policy aims to provide a working environment that promotes and supports the MHWB of all employees.
Activities that demonstrate action to support the health and wellbeing, including physical and mental health, in the contract workforce at Phoenix include:
-We utilise different resources not least those from Mental Health at Work Commitment, NHS Every Mind Matters, and the MIND employer toolkit to improve our employee MHWB programme.
-All our staff heavily discounted private health insurance includes mental wellness. Plan members access a range of health treatments including face to face counselling and cognitive behaviour therapy.
-Phoenix invests in the St Johns Ambulance Mental Health First Aid training course to ensure we have MH first aiders in the business and the skills to address MH in the workplace.
-The new challenges the pandemic has raised, on our employee’s MHWB, has led to the creation of a staff network group who meet monthly, to ensure that all we do and say truly covers all aspects of MHWB.
-All employees are given a monthly wellbeing hour to take for their own personal time and are also supported with monthly tea and toast sessions discussing and normalising MHWB topics.

We influence staff, suppliers, customers and communities through the delivery of the contract to support health and wellbeing, including physical and mental health.
-We provide Digital Accessibility training for all staff so we can communicate with each other and our customers in an inclusive manner.
-We have established an Accessibility-Centre-of-Excellence to display the latest technology to the workforce, supply chain and our customers
-We deliver digital accessibility training to customers
-We are sponsors of the Neurodiversity Awards

Pricing

Price
£4.20 a unit a month
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
30 days free trials, unlimited features
Link to free trial
https://www.cyberark.com/try-buy/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at ccs@phoenixs.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.