Stay current with the latest Zero Trust pillars and enablement artefacts spanning identity, access, governance, and security.
Zero Trust Service Catalogue
UNIFY's identity-first catalogue spanning the core Zero Trust pillars.
Capabilities that establish, migrate, and assure digital identities.
Trusted Sign-in
Deliver secure workforce authentication with resilient cloud identity.
ProductsFront-door sign-in experience.Streamlined Identity Lifecycle
Automate joiner, mover, and leaver processes with governance built in.
ServicesFoundational lifecycle automation.Verifiable Digital ID
Enable verifiable credential ecosystems and decentralised identity patterns.
ProductsSupports modern trust models.Identity Protection
Detect and remediate compromised identities using adaptive risk policies.
ProductsProtects credentials and sessions.Migration to Entra
Plan and execute transitions from legacy directories to Microsoft Entra ID.
Modernises identity platforms.Identity Verification and Proofing
Establish strong workforce and customer identity proofing workflows.
Verifies users before granting trust.Application Provisioning
Provision and de-provision applications based on policy and lifecycle events.
Delivers access at scale.Identity SOC
Deliver identity-focused security operations and monitoring services.
Continuous identity threat monitoring.
Controls that govern how users, customers, and partners gain the right access.
Secure External Access
Deliver frictionless yet secure access experiences for customers.
ProductsCustomer access journeys.Organisational Identity Access Management
Centralise workforce access management and governance across the enterprise.
Core workforce IAM controls.Controlled Delegation
Enable secure delegation of administrative privileges and oversight.
ServicesDelegation pattern for partner and internal admins.Partner Identity Access Management
Control partner access and collaboration across shared resources.
Supports B2B collaboration.Just-In-Time Privilege
Control, monitor, and audit privileged accounts and sessions.
JIT admin elevation.Adaptive Access
Enforce risk-aware access policies across identities and devices.
ProductsPolicy engine for Zero Trust decisions.Multifactor Identification
Implement adaptive MFA for workforce, customer, and partner identities.
Strengthens authentication assurance.Risk-Based Authentication
Dynamically adjust authentication requirements based on risk signals.
Aligns access with contextual risk.
Oversight capabilities that enforce policy, compliance, and least privilege.
Enterprise Governance
Orchestrate policy, entitlement lifecycle, and compliance controls.
Unified governance framework.Controlled Delegation
Enable secure delegation of administrative privileges and oversight.
ServicesScoped admin controls.Access Lifecycle
Automate request, approval, and lifecycle workflows for entitlements.
ProductsDriven by Microsoft Entra ID Governance features.Entitlement Management
Manage access packages and approvals across internal and external users.
Lifecycle management of entitlements.Data Protected
Protect sensitive data through policy, detection, and response controls.
ProductsPrevents data exfiltration.Access Reviews
Run periodic and event-driven access attestation campaigns.
ProductsKeeps access least privilege.Just-In-Time Privilege
Control, monitor, and audit privileged accounts and sessions.
Protects high-risk access.Adaptive Access
Enforce risk-aware access policies across identities and devices.
ProductsSupports governance policy enforcement.
Security operations services that protect, detect, and respond across identities.
Intelligent Threat Detection
Deliver endpoint detection, response, and analytics using SIEM and XDR.
ProductsUnified endpoint threat detection.Dark Web & Supply Chain Insight
Detect compromised identities and supplier threats across external sources.
ProductsExtends monitoring beyond the perimeter.Information Protection and Governance
Classify, protect, and govern sensitive information assets.
Aligns information security controls.Endpoint & Cloud Protection
Secure hybrid environments spanning on-premises and cloud workloads.
ProductsHybrid security posture.Security Operations Centre as a Service (SOCaaS)
Provide 24x7 security monitoring, triage, and incident response.
Managed SOC delivery.Risk Management
Assess, prioritise, and mitigate security and identity risks.
Continuous risk oversight.