About us

Madigan Solutions is an Identity & Access Management consultancy that specialises in delivering Identity Management, Identity Governance & Access Management solutions whether on-premises, or in the Cloud.

Simplifying identity & access management

We work with organisations across a range of industries including Government (Central & Local), Higher Education, Financial Services, Utilities, Retail, and Business Services. We help to deliver and run IAM platforms built on IBM technology.

Simplifying identity & access management

We work with organisations across a range of industries including Government (Central & Local), Higher Education, Financial Services, Utilities, Retail, and Business Services. We help to deliver and run IAM platforms built on IBM technology.

IBM Documentation

IBM Verify Identity Access (v11)


IBM Verify Identity Governance (v11)


IBM Verify Identity Governance (IGI v10)


IBM Security Verify Directory Integrator (v7.2)

Identity Threat Detection & Response

Identity is now widely recognised as the number one attack vector​. According to the 2024 IBM X-Force Threat Intelligence Index, 60% of all attacks in the preceding year focused on weaknesses in IAM​. Are you confident you can quickly detect identity threats across your network and applications?​

Learn More

IBM Verify Identity Protection

IVIP combines Identity Threat Detection & Response (ITDR) with Identity Security Posture Management (ISPM) capabilities to help you uncover identity threats across your organisation and identify suitable protection measures. Common threats to identity include:
- Usage of unauthorized SaaS application
- Unauthorized local accounts
- Shadow assets & directories
- MFA/PAM bypass
- Misconfigurations

Verify Identity Protection

Who is attacking the organization?
Which assets are they accessing?
Where are they accessing them from?
How are they accessing them?

Identity Infrastructure Issues

  • MFA issues (e.g., bypass)
  • Credential hygiene
  • Service account security
  • Suspected attacks on identity systems
  • Dormant system detection

Identity Blind Spots

  • Exposed assets
  • Shadow assets
  • Shadow identity systems (e.g., directories)
  • Shadow password managers
  • Shadow SaaS usage

Risky Identity Activity

  • Bypass of ZTNA
  • Bypass of VPN
  • Bypass of MFA
  • Suspicious access/identity activity

© Copyright 2025 Madigan Solutions UK Limited
Madigan Solutions UK Limited is a company registered in Northern Ireland with Company Number NI675324. VAT Number 368 3929 47.

Home | Blog | Contact

Terms & Conditions | Privacy Policy | Disclaimer