www.osirium.com
Open in
urlscan Pro
52.49.198.28
Public Scan
Submitted URL: http://www.osirium.com/
Effective URL: https://www.osirium.com/
Submission: On September 15 via api from US — Scanned from DE
Effective URL: https://www.osirium.com/
Submission: On September 15 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMName: _mF —
<form id="_mF" name="_mF" data-name="_mF">
<label for="contactName" class="form__label">Your name</label>
<input type="text" id="contactName" name="contactName" data-name="contactName" maxlength="256" required="" class="form__tx-field w-input">
<label for="email" class="form__label">Your email</label>
<input type="email" id="email" name="email" data-name="email" maxlength="256" required="" class="form__tx-field w-input">
<label for="message" class="form__label">Your message</label>
<textarea id="message" name="message" data-name="message" maxlength="256" required="" class="form__tx-field w-input"></textarea>
<label class="w-checkbox form__check-field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom check-field__check"></div>
<input type="checkbox" id="checkbox" name="checkbox" data-name="checkbox" required="" style="opacity:0;position:absolute;z-index:-1">
<span class="check-field__label w-form-label"> This form collects essential details to allow us to deliver related services to you. Please see our
<a href="https://osirium.com/privacy/" target="_blank" class="g--bold" tabindex="0">Privacy Policy</a> for further information on how we manage the data you submit. By ticking, you consent to Osirium collecting this data. </span>
</label>
<input type="hidden" id="wfName" name="wfName" value="_mF">
<input type="hidden" id="sourcePage" name="sourcePage" value="https://www.osirium.com/">
<input type="hidden" id="marketingCampaignHistory" name="marketingCampaignHistory" value="mForm">
<input type="hidden" id="staticEmailId" name="staticEmailId" value="0">
<button type="submit" class="button medium full-width w-button" data-wait="Please wait...">
<div>
<div class="button__text">Send</div>
</div>
</button>
</form>
/search
<form action="/search" class="search-2 w-form"><label for="search-2" class="g--off">Search</label><input type="search" class="form__tx-field-2 form__tx-field--search w-input" autofocus="true" maxlength="256" name="query" placeholder="Search…"
id="search" required=""><input type="submit" value="" title="Launch the search" class="button-search-2 medium round w-button"></form>
Name: _bF —
<form id="_bF" name="_bF" data-name="_bF">
<label for="contactName" class="form__label">Your name</label>
<input type="text" id="contactName" name="contactName" data-name="contactName" maxlength="256" required="" class="form__tx-field w-input">
<label for="email" class="form__label">Your email</label>
<input type="email" id="email" name="email" data-name="email" maxlength="256" required="" class="form__tx-field w-input">
<label for="message" class="form__label">Your message</label>
<textarea id="message" name="message" data-name="message" maxlength="256" required="" class="form__tx-field w-input"></textarea>
<label class="w-checkbox form__check-field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom check-field__check"></div>
<input type="checkbox" id="checkbox" name="checkbox" data-name="checkbox" required="" style="opacity:0;position:absolute;z-index:-1">
<span class="check-field__label w-form-label"> This form collects essential details to allow us to deliver related services to you. Please see our <a href="https://osirium.com/privacy/" target="_blank" class="g--bold">Privacy Policy</a> for
further information on how we manage the data you submit. By ticking, you consent to Osirium collecting this data. </span>
</label>
<input type="hidden" id="wfName" name="wfName" value="_bF">
<input type="hidden" id="sourcePage" name="sourcePage" value="https://www.osirium.com/">
<input type="hidden" id="marketingCampaignHistory" name="marketingCampaignHistory" value="bForm">
<input type="hidden" id="staticEmailId" name="staticEmailId" value="0">
<button type="submit" class="button medium full-width w-button" data-wait="Please wait...">
<div>
<div class="button__text">Send</div>
</div>
</button>
</form>
Text Content
Products Privilged Access Security Osirium PAM Privileged Access Management Osirium AUTOMATION Automate IT Operations Osirium PEM Privileged Endpoint Management Free Tools PAM Express AD Audit Tool PPA Express PEM Audit Tool Solution Education Finance Government and Defense Healthcare Industrial Control Systems Legal Managed (Security) Service Providers Manufacturing Retail Third-party access Ensure your third parties and vendors have the correct level of privileged access. Compliance Enforce policies and show compliance for common standards such as GDPR, Cyber Essentials, ISO 27001, PCI DSS, NIST 800 and many more Partners Resellers and Distributors Become a partner Partner marketing support Partner opportunity Become a partner If you're interested in joining the Osirium community of resellers and distributors click here Resources All Resources Blog Case Studies Datasheets Documentation PAM Integrations Videos Webinars White Papers What is Privileged Access Management? An introduction to PAM and how it's critical to cybersecurity and simplifying IT Operations Support Access the Osirium Support Portal Company About Osirium News & Events Management Team Board of Directors Investor Relations Careers Resource Hub Learn more about the Osirium product portfolio Contact Contact Us If you've got any questions, please complete the form, and we'll be in touch. Prefer to talk to an expert? Give us a call on +44 (0) 118 324 2444 Your name Your email Your message This form collects essential details to allow us to deliver related services to you. Please see our Privacy Policy for further information on how we manage the data you submit. By ticking, you consent to Osirium collecting this data. Send Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. Open search field Search Upcoming Webinar ▸ Third parties and your infrastructure ▸ Thu, 10 June 2021 13:00 GMT ▸ Reserve your spot A better way to PROTECT YOUR BUSINESSSIMPLIFY YOUR PROCESSESEMPOWER YOUR TEAM SECURE AND OPTIMISE YOUR BUSINESS CYBERSECURITY Secure access for vendors and partners without compromising security or productivity. COMPLIANCE A versatile privileged access solution meeting a range of compliance standards from Cyber Essentials to GDPR. DEVOPS We help DevOps everywhere just get on with their work and deliver more releases, faster and more securely. HR AND OPERATIONS Lift the load from IT Admins and improve security on vital systems. FINANCE Shouldering the load of routine tasks. Sensitive data protected along the way. osirium pam SMARTER PROTECTION Rest assured knowing that your vital IT assets and privileged accounts are always protected. explore osirium Automation FLEXIBLE AUTOMATION Free up specialists. Improve service times. Delegate. Move the business faster. explore osirium pem BETTER CONTROL Extend your bold security posture to every workstation by controlling admin rights. explore RANSOMWARE PROTECTION FOR BACKUPS Ransomware attacks destroy your data and backups. Get Osirium Fast Protect for just £4,995 to stop attacks deleting your backups. Protect your backups! Talk to an expert SMARTER PROTECTION Rest assured knowing that your vital IT assets are always protected FLEXIBLE AUTOMATION Free up specialists. Improve service times. Delegate. Move the business faster. SECURE ENDPOINTS Reduce your attack surface, improve your security posture. > What struck us with Osirium PAM was not just the breadth of capabilities, but > also its flexibility and ease of implementation Alex Breedon, IT Manager, Gibtelecom. > Selecting Osirium PAM wasn’t just about the robustness of the solution and the > competitive price. It was also the professionalism of their engagement and the > excellence of their support. Mark Grant, IT Infrastructure Operations Manager > Osirium PAM makes it obvious who can access what, where and when. Bobby Wendell, IT Director > Out of the box, the Osirium platform lived up to our expectation Karim Kronfli, IT and Data Security Manager > We had Osirium PAM up and running in under a day. Dave Pritt, IT Infrastructure Manager, Saunderson House ANY QUESTIONS? PLEASE GET IN TOUCH If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch. +44 (0) 118 324 2444 Your name Your email Your message This form collects essential details to allow us to deliver related services to you. Please see our Privacy Policy for further information on how we manage the data you submit. By ticking, you consent to Osirium collecting this data. Send Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. LATEST VIDEOS All Videos OSIRIUM AUTOMATION FOR NETOPS PPA BITESIZED - RUN ANSIBLE PLAYBOOK PPA BITESIZED DEMO - TEMPORARY AD GROUP MEMBERSHIP IMPLEMENT ZERO TRUST WITH OSIRIUM LATEST BLOG ARTICLES All Blog Articles Mark Warren Warren September 10, 2021 ARE UK BUSINESSES DOING ENOUGH TO PROTECT AGAINST RANSOMWARE? Mark Warren Mark Warren Warren July 30, 2021 RECORD HIGH COSTS OF DATA BREACH Mark Warren Mark Warren Warren June 24, 2021 WHAT IS IT PROCESS AUTOMATION? Mark Warren Andy Harris Harris June 14, 2021 IMPLEMENTING ZERO TRUST WITH OSIRIUM PRODUCTS Andy Harris LATEST WHITE PAPERS All White Papers OSIRIUM RANSOMWARE INDEX An investigation into the readiness of UK businesses to protect themselves against ransomware attacks OSIRIUM RANSOMWARE INDEX An investigation into the readiness of UK businesses to protect themselves against ransomware attacks OSIRIUM RANSOMWARE INDEX An investigation into the readiness of UK businesses to protect themselves against ransomware attacks OSIRIUM AUTOMATION FOR NETOPS Network Operations (NetOps) tasks can be complicated because of the many different vendor control systems. NetOps automation to the rescue! OSIRIUM AUTOMATION FOR NETOPS Network Operations (NetOps) tasks can be complicated because of the many different vendor control systems. NetOps automation to the rescue! OSIRIUM AUTOMATION FOR NETOPS Network Operations (NetOps) tasks can be complicated because of the many different vendor control systems. NetOps automation to the rescue! OSIRIUM AUTOMATION FOR ACTIVE DIRECTORY AD tasks are often the most common request to IT Help Desks. They really ought to be automated, see how in this whitepaper OSIRIUM AUTOMATION FOR ACTIVE DIRECTORY AD tasks are often the most common request to IT Help Desks. They really ought to be automated, see how in this whitepaper OSIRIUM AUTOMATION FOR ACTIVE DIRECTORY AD tasks are often the most common request to IT Help Desks. They really ought to be automated, see how in this whitepaper ACCELERATING ISO27001 COMPLIANCE How to make ISO27001 compliance easier by using Privileged Access Security ACCELERATING ISO27001 COMPLIANCE How to make ISO27001 compliance easier by using Privileged Access Security ACCELERATING ISO27001 COMPLIANCE How to make ISO27001 compliance easier by using Privileged Access Security LATEST WEBINARS All Webinars May 25, 2021 THIRD PARTIES AND YOUR INFRASTRUCTURE: TOO MUCH ACCESS, TOO LITTLE CONTROL April 21, 2021 ESSENTIAL SECURITY: WHY PAM NEEDS TO BE AT THE HEART OF YOUR CYBER STRATEGY (FRENCH) April 21, 2021 ESSENTIAL SECURITY: WHY PAM NEEDS TO BE AT THE HEART OF YOUR CYBER STRATEGY (DUTCH) March 25, 2021 STOPPING RANSOMWARE ATTACKS: PRIVILEGED ACCESS STRATEGIES FOR UNIVERSITIES RESOURCES * Blog * Videos * White Papers * Datasheets * Case Studies * PAM Integrations * More ... SUPPORT * Support Portal * Training * Documentation INDUSTRIES * Finance * Retail * Manufacturing * Legal * More... COMPANY * Osirium * Management Team * Board of Directors * News and Events * Investors * Careers * Contact us OTHER * Accessibility * Privacy Policy * EULA * Terms * Sitemap * * * * Theale Court 11-13 High Street, Theale Reading, Berkshire, RG7 5AH United Kingdom +44 (0) 118 324 2444 Copyright 2021 Osirium Ltd. Notice This website processes personal data (e.g. browsing data or IP addresses) and uses cookies or other identifiers, which are necessary for its functioning and required to achieve the purposes illustrated in the cookie policy. To learn more, please refer to the Cookie Policy. You agree to the use of these cookies or other identifiers by accepting this notice. RejectAccept