Stay current with the latest Zero Trust pillars and enablement artefacts spanning identity, access, governance, and security.

Zero Trust Service Catalogue

UNIFY's identity-first catalogue spanning the core Zero Trust pillars.

IDENTITY

Capabilities that establish, migrate, and assure digital identities.

  • Trusted Sign-in

    Deliver secure workforce authentication with resilient cloud identity.

    Front-door sign-in experience.
  • Streamlined Identity Lifecycle

    Automate joiner, mover, and leaver processes with governance built in.

    Services
    Foundational lifecycle automation.
  • Verifiable Digital ID

    Enable verifiable credential ecosystems and decentralised identity patterns.

    Supports modern trust models.
  • Identity Protection

    Detect and remediate compromised identities using adaptive risk policies.

    Protects credentials and sessions.
  • Migration to Entra

    Plan and execute transitions from legacy directories to Microsoft Entra ID.

    Modernises identity platforms.
  • Identity Verification and Proofing

    Establish strong workforce and customer identity proofing workflows.

    Verifies users before granting trust.
  • Application Provisioning

    Provision and de-provision applications based on policy and lifecycle events.

    Delivers access at scale.
  • Identity SOC

    Deliver identity-focused security operations and monitoring services.

    Continuous identity threat monitoring.
ACCESS

Controls that govern how users, customers, and partners gain the right access.

  • Secure External Access

    Deliver frictionless yet secure access experiences for customers.

    Customer access journeys.
  • Organisational Identity Access Management

    Centralise workforce access management and governance across the enterprise.

    Core workforce IAM controls.
  • Controlled Delegation

    Enable secure delegation of administrative privileges and oversight.

    Services
    Delegation pattern for partner and internal admins.
  • Partner Identity Access Management

    Control partner access and collaboration across shared resources.

    Supports B2B collaboration.
  • Just-In-Time Privilege

    Control, monitor, and audit privileged accounts and sessions.

    JIT admin elevation.
  • Adaptive Access

    Enforce risk-aware access policies across identities and devices.

    Policy engine for Zero Trust decisions.
  • Multifactor Identification

    Implement adaptive MFA for workforce, customer, and partner identities.

    Strengthens authentication assurance.
  • Risk-Based Authentication

    Dynamically adjust authentication requirements based on risk signals.

    Aligns access with contextual risk.
GOVERNANCE

Oversight capabilities that enforce policy, compliance, and least privilege.

  • Enterprise Governance

    Orchestrate policy, entitlement lifecycle, and compliance controls.

    Unified governance framework.
  • Controlled Delegation

    Enable secure delegation of administrative privileges and oversight.

    Services
    Scoped admin controls.
  • Access Lifecycle

    Automate request, approval, and lifecycle workflows for entitlements.

    Driven by Microsoft Entra ID Governance features.
  • Entitlement Management

    Manage access packages and approvals across internal and external users.

    Lifecycle management of entitlements.
  • Data Protected

    Protect sensitive data through policy, detection, and response controls.

    Prevents data exfiltration.
  • Access Reviews

    Run periodic and event-driven access attestation campaigns.

    Keeps access least privilege.
  • Just-In-Time Privilege

    Control, monitor, and audit privileged accounts and sessions.

    Protects high-risk access.
  • Adaptive Access

    Enforce risk-aware access policies across identities and devices.

    Supports governance policy enforcement.
SECURITY

Security operations services that protect, detect, and respond across identities.

  • Intelligent Threat Detection

    Deliver endpoint detection, response, and analytics using SIEM and XDR.

    Unified endpoint threat detection.
  • Dark Web & Supply Chain Insight

    Detect compromised identities and supplier threats across external sources.

    Products
    Extends monitoring beyond the perimeter.
  • Information Protection and Governance

    Classify, protect, and govern sensitive information assets.

    Aligns information security controls.
  • Endpoint & Cloud Protection

    Secure hybrid environments spanning on-premises and cloud workloads.

    Hybrid security posture.
  • Vulnerability Management

    Surface, prioritise, and remediate vulnerabilities across cloud and on-prem assets.

    Products
    Powered by Tenable and Rapid7 platforms.
  • Security Operations Centre as a Service (SOCaaS)

    Provide 24x7 security monitoring, triage, and incident response.

    Managed SOC delivery.
  • Risk Management

    Assess, prioritise, and mitigate security and identity risks.

    Continuous risk oversight.