<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=229461991482875&amp;ev=PageView&amp;noscript=1">

Gatekeeper For IT Teams

TOTAL VISIBILITY AND CONTROL OVER YOUR VENDOR PORTFOLIO

Gatekeeper for IT Teams

Common IT Challenges

IT Visibility

Visibility

Understanding your full vendor portfolio, including costs, distribution, key milestones and performance can be a challenge and can be a blocker to implementing a coherent vendor strategy.

compliance-icon

Information Security

As custodians of your business’s networks and information, your primary concern is keeping it safe and secure.

Knowing the location of your data is vital to meet data sovereignty requirements.

Use-Case-IT-3

Cost Control

Tracking costs across a shifting vendor set and maintaining control over new vendor approval requires robust processes and universal adoption.

The Gatekeeper Solution

See Everything In One Place

Gatekeeper stores interactions with your suppliers automatically. Centralise contracts, files, supplier contacts and track supplier performance

Collaborate with any internal or external stakeholders within a single secure platform.

Executive (1)

Visualise All Company Processes

Digitise and visualise all company processes with our industry unique Kanban Workflow Engine

Automate your processes to run 24/7 and set SLAs to keep momentum and meet compliance requirements.

Automate processes with Kanban workflows

Single Sign-On (SSO)

Fully compliant with SAML and OAuth 2.0 SSO standards. Gatekeeper supports both Google and Office365 SSO options and are proud to be official global partners with both Okta and OneLogin.

Use-Case-Diagram (1)

Want to see more?

Information Security

Role Based Access Control (RBAC)
Manage user access roles to a granular level with a detailed breakdown of all user ownerships and access. 

SCIM Provisioning 
System for Cross-domain Identity Management (SCIM) support to provision users and set Role Based Access Control (RBAC) remotely from our customers’ SSO solution. 

Two-factor authentication (2FA)
Two-factor authentication support within our core application and partner SSO solutions.

Gatekeeper secure login

Fully auditable records

Financial-grade user and data audit logs for all activity supported by a range of reports. 

Every action relating to every contract and vendor is recorded in an easily-reviewable, fully defensible timeline.

Obligation-img

Mitigate Risk and Control Spend

Capture risks by supplier, type & category and assign ownership and due dates to set mitigation expectations.

Use our Spend Dashboard to track actual vs expected / direct vs indirect and drill down into detailed reports to identify maverick or excess spend.

GK_Spend_Module_Dashboard_Zoom-1

Track Vendor Performance

Measure, collect and analyse vendor performance using our Balanced Scorecards module

Gather stakeholder feedback and plot results on a tailored grid to understand your vendor portfolio’s strengths and weaknesses.

8-Performance