Detexian

Detect critical user misconfigurations, audit SaaS permissions and more.
Detexian
Operating

Detexian is a single pane of glass across Office 365, G Suite, Atlassian, Salesforce, and other platforms. It detects critical user misconfigurations, audits SaaS permissions and more. This means Detexian eliminates SaaS risk blindspots and gives you peace of mind you need to run a safe IT operation. With Detexian, regulatory compliance is made easy. You can generate audit reports to demonstrate evidence of control effectiveness over time that your auditors and regulators want.

Investors
Investor

Right Click Capital

Accelerators
Cohort 2
Accelerator

CyRise

Images
Taken on 2020-09
Blog Posts
9th October, 2023
Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company

In the realm of IT management, overseeing user accounts and access to company resources is a fundame...

3rd October, 2023
Tracking changes in user consented applications with Microsoft M365 E3

In today's interconnected digital landscape, user consented applications have become an integral par...

28th August, 2023
Identifying, evaluating and tracking user created email forward rules with Microsoft M365 E3

In the digital age, communication flows effortlessly through emails, connecting individuals and busi...

14th August, 2023
Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3

As we discussed in the sharing blog, your organization relies on sharing and working with informatio...

31st July, 2023
Keeping Abreast of Changes in User Permissions, Configuration, and Access with Microsoft M365 E3

Today Detexian’s CTO Adrian Kitto dives into the risk of privilege creep in M365. He highlights the ...

24th July, 2023
Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3

“To share or not to share” is not the question this week, because we all know that your organization...

10th July, 2023
Privileged Access Management in non-SCIM apps with Microsoft M365 E3

Here’s a hard one, how do you track privileged access inside of non-SCIM provisioned applications? D...

3rd July, 2023
Calculating inferred or effective MFA for non-Microsoft applications

Detexian’s CTO Adrian Kitto is delving into a topic that not many will think of; Working out the eff...

26th June, 2023
Identifying and removing inactive users with Microsoft M365 E3

Detexian’s CTO Adrian Kitto explores a little understood topic of Inactive Users in M365. These user...

20th June, 2023
Discovering user consented apps with Microsoft M365 E3

This time Detexian’s CTO Adrian Kitto gets into the nitty gritty of this blog series, tackling disco...

 Location
Melbourne
 Links
 People
 Tags
#cyber security
#saas
 Feedback