Skip to main content
Public website
Public website surface Marketing and explanation content. This is not the canonical authenticated runtime.
Canonical runtime: app.identityfirst.net
Services

Identity security services
built for the UK enterprise

From a one-time assessment to continuous governance, we meet you where you are. Every engagement is read-only by default — no infrastructure changes, no risk.

  • Read-Only by Default
  • No Infrastructure Changes
  • Deploy in Days
  • Cyber Essentials Certified

Our service offerings

Four ways to work with IdentityFirst, from a single assessment to an ongoing security partnership.

Timeline: 2–5 days

Identity Health Assessment

A one-time assessment using our IdentityFirstMRI™ engine. We discover every identity across your connected directories, score drift and risk across all five pillars, and deliver a board-ready PDF report — without touching a single configuration.

  • Full identity estate discovery
  • Drift scoring and risk quantification
  • Privileged access analysis
  • Board-ready PDF with executive summary
  • Compliance mapping (ISO 27001, Cyber Essentials, NIST)
Timeline: Deploy in days

Continuous Identity Governance

A scoped path toward the Core product in the shared IdentityFirst™ platform. This is the next governed release path after MRI, focused on continuous monitoring, lifecycle controls, and supportable operating workflows rather than broad public self-serve promises.

  • Continuous monitoring and identity graph direction
  • Governed workflow and lifecycle management direction
  • Scoped rollout discussion rather than generic public packaging
  • Same shared installer path with tighter licence gating
  • Supportability, entitlement, and operational hardening before GA
  • Written scope required before activation

Enhanced and AISF remain beta-only and are not included here as GA services.

Timeline: 2 months

Proof of Concept

A fully scoped guided engagement. We connect read-only to your live systems where agreed, run the assessment activities defined in writing, and deliver the reporting and follow-up set out in scope. We do not advertise free offers or fixed public packages that may not fit the real requirement.

  • Read-only connector setup on your live environment
  • Initial full assessment run (week 1)
  • 8 weeks of continuous drift monitoring
  • Bi-weekly progress calls
  • Final board-ready report with ROI analysis

No free trial or free POC. Engagements are scoped and agreed directly.

Timeline: Scoped per engagement

Advisory & Implementation

Hands-on support to build out your identity security programme. Whether you need architecture review, connector configuration, policy design, or staff training, our team works alongside yours to deliver lasting change.

  • Identity architecture review
  • Connector configuration and validation
  • Policy design and SoD rule authoring
  • Privileged access programme design
  • Staff training and knowledge transfer
  • Ongoing fractional CISO support available

Sectors we serve

We work with regulated and complex identity environments across the UK.

  • Financial Services
  • Legal & Professional Services
  • NHS & Healthcare
  • Higher Education
  • Local Government
  • Technology

9 Beta connectors. 55+ Experimental connectors.

Active Directory, Microsoft Entra ID, AWS CloudTrail, GCP Audit Logs, Okta, ServiceNow, CrowdStrike, Datadog, Ping Identity, SailPoint, Delinea, Saviynt, Jamf MDM, Azure AD Sign-In Logs and more. Push-receiver and pull-API modes. No third-party data sharing.

View all connectors

Ready to start?

Talk to us about which service fits your situation. Most engagements begin with a short scoping call.

+44 7968 169571  ·  mark@identityfirst.net