Full Platform · from £14/user/mo

IdentityFirst‑Enhanced

Includes FortifyX   Includes IdentityFirst   Includes IdentityFirstMRI

The complete IdentityFirst platform. Everything in IdentityFirst, plus FortifyX near-real-time enforcement, active containment, JIT privilege elevation, and executive governance dashboards.

Everything in the platform — in one tier

IdentityFirst-Enhanced builds on every capability in IdentityFirstMRI and IdentityFirst, adding the FortifyX active enforcement layer for organisations that need to act, not just observe.

FortifyX™ — Active Enforcement

  • Real-time policy enforcement at point of access
  • Active identity containment — isolate without disrupting business
  • JIT privilege elevation with approval workflow
  • Zero standing privilege (ZSP) enforcement
  • Blast radius modelling before any action
  • Incident workflow orchestration
  • Forensic evidence collection

Governance & Reporting

  • Executive governance dashboards
  • Identity Coverage Ratio (ICR) tracking
  • Entitlement valuation engine
  • Board-ready PDF reports
  • SoD violation detection & enforcement
  • Access review campaigns

Everything in IdentityFirst

  • 14 Beta connectors (HR, PAM, IGA, SaaS, SIEM)
  • Access orchestration & advisory controls
  • Drift detection & policy enforcement
  • SOC 2 / ISO 27001 / NIST compliance automation
  • SCIM 2.0 provisioning
  • Anomaly detection & alerting

Everything in IdentityFirstMRI

  • Identity discovery across all connected sources
  • AI-powered risk scoring per identity
  • Privileged account enumeration
  • Non-human identity (NHI) detection
  • Temporal identity graph

How FortifyX™ Enforcement Works

FortifyX adds the active enforcement layer on top of IdentityFirst's monitoring and governance. Every enforcement action passes through blast radius analysis before execution.

1
Risk Signal Received

Fabric Agent detects anomaly — high-risk access attempt, SoD violation, or privilege escalation

2
Blast Radius Analysis

BlastRadiusEngine models the impact of any proposed action before it executes

3
Approval Gate (HITL)

Human-in-the-loop approval required for high-impact actions; low-risk actions auto-approved

4
Containment Action

Targeted containment: session revocation, account disable, privilege strip — scoped to identity

5
Rollback-Ready Journal

Every action is journalled. One-click rollback if the containment was a false positive

6
Forensic Evidence

Tamper-evident audit trail with full evidence package for incident response

FortifyX™ Core Capabilities

Near-Real-Time Policy Enforcement

Act at the moment of risk, not after the fact

Enforce access policies in near-real-time at the point of request. Risk-based authentication step-ups, dynamic MFA challenges, and governed response to high-risk signals — all without disrupting legitimate users.

  • Risk-based step-up MFA
  • Context-aware access decisions
  • Adaptive policy engine
  • Entra ID Conditional Access integration

JIT Privilege Elevation

Zero standing privilege, time-bound access

Replace permanent privileged accounts with just-in-time elevation. Users request elevated access, the approval workflow triggers, access is granted for a defined window, then automatically expired. No standing privilege remains.

  • Time-bound elevation requests
  • Approval workflow with HITL gate
  • Automatic expiry enforcement
  • Full audit trail per elevation

Active Containment

Isolate threats without a service desk ticket

When a threat is confirmed, containment executes within seconds — not hours. Session revocation, account disable, privilege strip. Blast radius is computed first; rollback is always one click away.

  • Blast radius pre-computation
  • Session revocation
  • One-click rollback
  • No blast radius — read-only by default

Forensic Evidence & Audit Chain

Tamper-evident record for compliance and IR

Every enforcement action generates a forensic evidence package: timeline, affected identities, before/after state, and approver chain. Audit entries are cryptographically chained — any tampering is immediately detectable.

  • HMAC-SHA256 audit chain
  • Chain integrity verification endpoint
  • Designed to satisfy SOC 2 CC7.2
  • Exportable evidence packages

Why Upgrade to Enhanced?

MTTC Under 60 Seconds

Mean time to containment drops from hours (service desk) to seconds. FortifyX executes containment the moment the approval gates clear.

Zero Standing Privilege

Eliminate permanent admin accounts. JIT elevation means privileged access exists only for the duration it's needed — then it's gone automatically.

Rollback Guarantee

Every containment action is journalled. If a response was a false positive, reverse it in one click. No runbooks, no manual cleanup.

IdentityFirst-Enhanced Pricing

Per-user, per-month pricing billed annually. Volume discounts apply automatically as your user count grows — no negotiation required.

IdentityFirst-Enhanced

Full platform · includes FortifyX enforcement

User band Per user / month Billing
Up to 2,500 users £22 Annual, billed upfront
2,501 – 10,000 users £18 Annual, billed upfront
10,000+ users £14 Annual, billed upfront

All prices ex. VAT. Minimum 12-month term. Upgrade from IdentityFirstMRI or IdentityFirst at any time — remaining contract value credited.

Book a Demo Full Pricing Page

Not sure which tier is right for you?

Compare All Products

Enforcement Integration Points

FortifyX enforcement integrates with your existing identity infrastructure — no rip-and-replace required.

Microsoft Entra ID

Conditional Access + PIM integration

AWS IAM

CloudTrail + IAM policy enforcement

Active Directory

Group membership + account disable via WEF

CyberArk / BeyondTrust

PAM session revocation

Okta / Ping Identity

Session management + policy push

Webhook Event Bus

Outbound events to SIEM / SOAR

Ready for the Full Platform?

IdentityFirst-Enhanced gives you everything: discovery, governance, and active enforcement. Deploy in days. Read-only by default. Enforcement only when you're ready.