Detexian

Detect critical user misconfigurations, audit SaaS permissions and more.
Detexian
Operating

Detexian is a single pane of glass across Office 365, G Suite, Atlassian, Salesforce, and other platforms. It detects critical user misconfigurations, audits SaaS permissions and more. This means Detexian eliminates SaaS risk blindspots and gives you peace of mind you need to run a safe IT operation. With Detexian, regulatory compliance is made easy. You can generate audit reports to demonstrate evidence of control effectiveness over time that your auditors and regulators want.

Investors
Investor

Right Click Capital

Accelerators
Cohort 2
Accelerator

CyRise

Images
Taken on 2020-09
Blog Posts
5th January, 2025
CIS Controls™ for SaaS – Part 5: Security Awareness and Skills Training

No system is of any use if nobody actually makes use of it. However, the more users your systems hav...

4th January, 2025
CIS Controls™ for SaaS – Part 4: Data Protection and Recovery

While you may not be storing the data in your SaaS applications using your own on-premise or cloud i...

3rd January, 2025
CIS Controls™ for SaaS – Part 3: Secure and Audit

Automated governance is about taking manual, error-prone processes for managing third-party access a...

3rd January, 2025
CIS Controls™ for SaaS – Part 2: Account and Access Control Management

One thing that remains almost exclusively your domain in SaaS is account and access management. CIS ...

2nd January, 2025
CIS Controls™ for SaaS – Part 1: Inventories

You cannot secure and protect what you do not know you have. Just as the CIS Controls recommend you ...

1st January, 2025
Introduction: What are CIS Critical Security Controls® and Safeguards and how do they apply to Software-as-a-Service (SaaS)?

CIS Critical Security Controls® and Safeguards are general security hygiene recommendations. They we...

2nd December, 2024
Automated Governance: Supplier Security

Automated governance is about taking manual, error-prone processes for managing third-party access a...

30th November, 2024
Verifying Your Entra ID MFA and Conditional Access Setup

Transitioning to M365 and Entra ID offers scalability and modern identity management, but ensuring c...

9th October, 2023
Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company

In the realm of IT management, overseeing user accounts and access to company resources is a fundame...

3rd October, 2023
Tracking changes in user consented applications with Microsoft M365 E3

In today's interconnected digital landscape, user consented applications have become an integral par...

 Location
Melbourne
 Links
 People
 Tags
#cyber security
#saas
 Feedback