or call +44 (0) 33 0162 6883
Ongoing identity and access operations for organisations that need consistent provisioning, SSO/MFA hygiene, access reviews, and optional PAM—without overloading internal IT or security teams.
Ongoing identity and access operations for organisations that need consistent provisioning, SSO/MFA hygiene, access reviews, and optional PAM—without overloading internal IT or security teams.
Identity programmes fail when day-two operations slip: stale accounts, excessive standing access, missed recertifications, or MFA gaps. Our managed service keeps IAM aligned to least privilege and your compliance obligations. We operate joiner–mover–leaver flows, role and group hygiene, SSO/MFA configuration and break-fix, periodic access reviews, and governance reporting suited to internal audit and external scrutiny. Scope scales from foundational directory and application provisioning through advanced IGA and PAM-aligned controls, with tiered per-user pricing so you can match spend to risk and maturity. Implementation and platform costs are typically separate from run operations; we document assumptions, tool ownership, and escalation paths up front so your security, IT, and business sponsors share one operating picture.
| Service Tier | Price (USD / INR Approx) |
|---|---|
| Basic IAM Operations | $2 - $4 / INR 170 - INR 340 |
| Standard IAM Management | $5 - $9 / INR 420 - INR 750 |
| Advanced IAM + IGA | $9 - $15 / INR 750 - INR 1,250 |
| Enterprise IAM + PAM | $15 - $25+ / INR 1,250 - INR 2,100+ |
| Add-On | Cost |
|---|---|
| Privileged Access Management (PAM) | +$5 - $10 per privileged user |
| Identity Analytics | +$2 - $4 per user |
| 24x7 SOC Integration | +$1 - $2 per user |
| Application Onboarding | $2K - $8K per application |
| Component | Estimated Cost |
|---|---|
| IAM Assessment & Strategy | $15K - $40K |
| IAM Implementation | $50K - $250K |
| PAM Deployment | $80K - $300K |
| Application Integrations | $3K - $10K per app |
What you can expect when we engage on this service line—concrete outputs you can use with your team.
IAM strategy and target-state architecture, with a phased roadmap tied to business and risk priorities
Automated or semi-automated JML and access request flows, with RBAC/role definitions and ownership
Scheduled access reviews, attestation evidence, and compliance-oriented access reports
Operations dashboards, incident and change patterns, and runbooks for backups, break-glass, and vendor handoffs