Welcome to Perennial Consultancy

The Complete IAM
Solution for
MAS TRM Compliance

Device, and access management platform bundled with Anti-virus, Data Loss Prevention and VPN

Tailored for Singapore Financial Institutions

Sign up now and get a complimentry VAPT*


Difficulty meeting MAS TRM Requirements?

g

With our Package

Compliance is now hassle-free

Easily support mixed OS Environment

Support Windows & MacOS. Streamline application deployment, push out security policies, Anti-virus, DLP and VPN. 

Centralized Admin
Console

Control user access & devices, track Anti-Virus alerts, device compliance, VPN and DLP alerts all from a single admin console instead of using multiple tools

Effortlessly achieve and maintain compliance with MAS TRM, PDPA, or ISO27001, while meeting local data requirements (solution hosted on AWS Singapore)

Facilitate Flexible Work Arrangement by Dec 2024

100% intuitive Cloud based platform lets you securely manage, support and enforce compliance wherever your users are, as long as they are connected to internet


Comprehensive Packages for
MAS TRM Compliance

Control

Complete cross-platform identity and device management for Windows, Mac and Linux, plus integrated Anti-Virus, where malware and virus alerts can be monitored on the same console.

Provides device baseline scanning to ensure continuous compliance 

 

USD 4 Per User /Month

Best Value

Comply

Satisfy MAS TRM with Identity, device, and access management. 

Integrated with endpoint Data Loss Prevention (DLP) with policies that trigger alerts or block the transmission of sensitive information
 

*Redeem a FREE VAPT after sign up (Register your interest by Dec 2024)   

USD 6 Per User /Month

*T&C Applies for free VAPT, contact us for more details

Complete

Provides VPN that allows end users to connect to VPN tunnel with encryption for internal network access

Bundled with Secure Web Gateway that acts as an intermediary between users and the Internet for content inspection

 

USD 8 Per User /Month


Our Professional Services

g

Evaluation Support

Guidance to speed up your evaluation with any integration issues you might have, concerning your IT environment

Free VAPT (read more)

VAPT is part of MAS TRM requirements and has to be performed annually. This is included at no extra cost with our Comply and Complete packages for a limited time. Terms and Conditions apply. Contact us for more details.

Implementation

Professional Service for User and Device onboarding, Directory integration, Application integration, Policy Management etc

Best Practices & Training


Provide guidance on best implementation practices and walk you through important considerations. Training is also provided for administrator for on going support

CISO-as-a-Service / Cyber Essential Mark

We Offer CISO-as-a-Service for companies seeking enhanced security capabilities or aiming to achieve the Cyber Essentials certification

Custom Scripting


Provide custom scripting based on your specific requirements eg. scripts for integration, customized reports

g

FAQ's

It is a Software-as-a-Service (SaaS) that helps organizations manage and secure user identities, devices, and access to Company’s IT resources through the cloud. Unlike Windows Domain, there is no need to set up and maintain a hardware server for that purpose. You can easily scale as your Company grows.

Managing users and IT devices is essential for ensuring security, preventing unauthorized access, and protecting sensitive data. It helps enforce compliance, streamline device updates, and improve operational efficiency. Proper management also allows for quick onboarding, remote troubleshooting, and controlled access, safeguarding both the organization and its resources.

As a company grows, managing an increasing number of users, devices, and applications becomes difficult to enforce manually. This is where an Identity and Access Management (IAM) solution comes into play. A cloud-based IAM solution allows you to efficiently manage users and devices, no matter where they are located—ideal for today’s remote and distributed workforce

The short answer is Yes. Because of today’s increasingly mobile workforce and the ever-present prospect of compulsory work from home. A Domain laptop is no longer managed once it leaves the office, whereas an IAM-managed laptop is managed as long as it is connected to the internet.

Our IAM solution can manage devices side by side with MS AD, so that devices stay managed whether in or out of the office.

At the same time, it can also replace MS AD if you want to streamline your management platform.

Our Comply package covers almost all aspects of MAS TRM (Technology Risk Managment Guidelines).

From pushing out policies, applications, patching to Data Leak Prevention and enforcing and monitoring Cloud activities, It is specially tailored for Financial Institution to meet TRM requirements effortlessly. 

Read more here

Yes, our solution is highly modular.

Additional modules such as Anti-Virus, SSO, DLP, VPN, Secure Web Gateway are available as add-on.

Just contact us via form or at sales@perennialconsultancy.com and let us know your requirements. We will work out a budget-friendly quotation for you.

Data Leak Prevention (DLP) solution is used to ensure that sensitive or confidential information does not leave an organization without proper authorization. It is designed to detect, monitor, and block the transmission of sensitive data—whether it’s through email, file transfers, or cloud storage—to prevent accidental or malicious data breaches.

CASB (Cloud Access Security Broker): A CASB is a security tool that acts as a gatekeeper between users and cloud applications, providing visibility, data protection, threat detection, and compliance enforcement for cloud services. It helps secure both sanctioned and unsanctioned (shadow IT) cloud use, ensuring that sensitive data is protected in the cloud.

SWG (Secure Web Gateway): An SWG protects users’ internet access by filtering and monitoring web traffic. It blocks malicious websites, prevents data loss, enforces acceptable use policies, and guards against web-based threats like malware and phishing, securing browsing activities whether users are in the office or remote.

Read more here


Latest Articles

Let's Start the Conversation