Identity and Access Solutions: Lock down security risk and open up new ways of working

Digital Transformation, the adoption of cloud and the race to new security platforms and models such as SASE, all have a dependency on effective Identity and Access Management (IAM) solutions. With identity information, particularly privileged identities, a high value target for hackers, implementing a robust IAM capability is a high priority for most organizations.


Computacenter helps design and implement IAM and PAM solutions and services. Our Professional Services organization provides the expertise from years of experience to support our customers journey to a zero-trust operating environment. We can help with vendor assessments and selection, license procurement and terms negotiation, solution design and implementation, as well as ongoing management and operations of the platform.

Selected examples from our Solutions portfolio

Managed Services


Managed Privileged Access

Building on Privileged Access Managed design and build Consultancy Services, Computacenter also offers extensive in life support of the PAM platforms and the administration of the PAM service on behalf of the customer.

Consultancy and Professional Services


Identity Governance and Administration

Covering everything from Privileged Access Management solutions, to Identity and Access Management solutions to single sign-on, our consultancy offers insight, guidance, vendor selection and design / architecting services.

Identity Governance Assessment

Helping our customers formulate their Identity strategy and understand how to best implement a Digital Identity solution. Provides insight into the vendor / technology options and includes design and implement of Digital Identity solutions.

Access Management

Professional services covering all aspects of Access Management from design, installation and integration of the technology to process review and documentation of best practice.

Privileged Access Management

Consultancy service to help organisation select and procure the PAM solutions that best fit their needs. We also offer design, build and configuration of the chosen solution.

Public Key Infrastructure (PKI)

Services to support the implementation and usage of Public Key Infrastructure solutions. Covering PKI management, PKI automation and the integration into DevOps and Cloud solutions.



Computacenter has long established relationships with all the leading Security vendors.


In addition, we offer a number of product sourcing capabilities to help our customers navigate the complex security vendor marketplace.


More information about our partner status and awards

Vendor Product assessment and testing

Our four-stage process covers requirements definition and vendor shortlisting, shortlisted vendor evaluation and assessment, detailed product comparison and testing using our BattleDays solution and full proof or Concept design and hosting.

Procurement Services

We offer a comprehensive set of commercial services that support Security product sourcing. These include technical design validation, Bill of Materials management, E-business including AWS Marketplace, stock holding, forecasting & planning, commercial management and advice, Financing Solutions, Product Roadmap Management, Renewals management and product Disposal.

145 KB

Logistical Services

We support our customers at every stage of sourcing security Hardware. Our Logistics services includes Customer Inventory Management including buy & store, staging and delivery, datacenter ‘rack n roll’ trolley deployment, complete rack deployment, specialist delivery services and packaging recycling

3805 KB

Technical Services

With capability spanning solution integration, build management, asseting and registration, Secure environments and disposal – data center decommissioning and data removal – our Technical Services help to support our customers beyond the initial transaction of security licencing or security hardware.

212 KB


Solutions & Services

Cyber Defence

Defend and react faster using security monitoring, vulnerability management, Endpoint Detection & Response, incident response services and threat intelligence.

Cloud Security

Protect critical information, support regulatory compliance and secure privacy with flexible, scalable policies, controls, procedures and technologies covering public, private and multi-cloud environments.

Infrastructure Security

Enhance infrastructure availability and support agility by optimising and consolidating infrastructure security controls and helping to implement new Security architectures.

Workplace Security

Secure the workplace, protect users and guard data with a comprehensive set of services including Windows 10 security solution design, M365 Security Advisory services and Managed Endpoint Detection and Response.

Identity & Access

Balance user productivity with data security, lock down security risks and open up new ways of remote working.

IT Governance, Risk & Compliance

Support and maintain IT governance frameworks with technology solutions that protect customer policies, processes and people. Understand how to adapt working practices to monitor and manage governance, minimise risk and ensure your organisations achieves compliance.

Industrial Security

IT expertise combined with OT know-how to make your organisation ready for Industry 4.0. Develop, implement and maintain IT infrastructures to deliver high-performing and secure architectures from the factory to the Data center.

Our Solutions

Workplace - Cloud & Applications - Data Center - Networking - Security