Detexian
Detect critical user misconfigurations, audit SaaS permissions and more.Detexian
Detexian is a single pane of glass across Office 365, G Suite, Atlassian, Salesforce, and other platforms. It detects critical user misconfigurations, audits SaaS permissions and more. This means Detexian eliminates SaaS risk blindspots and gives you peace of mind you need to run a safe IT operation. With Detexian, regulatory compliance is made easy. You can generate audit reports to demonstrate evidence of control effectiveness over time that your auditors and regulators want.
Images
Blog Posts
2nd December, 2024
Automated Governance: Supplier Security
Automated governance is about taking manual, error-prone processes for managing third-party access a...
30th November, 2024
Verifying Your Entra ID MFA and Conditional Access Setup
Transitioning to M365 and Entra ID offers scalability and modern identity management, but ensuring c...
9th October, 2023
Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company
In the realm of IT management, overseeing user accounts and access to company resources is a fundame...
3rd October, 2023
Tracking changes in user consented applications with Microsoft M365 E3
In today's interconnected digital landscape, user consented applications have become an integral par...
28th August, 2023
Identifying, evaluating and tracking user created email forward rules with Microsoft M365 E3
In the digital age, communication flows effortlessly through emails, connecting individuals and busi...
14th August, 2023
Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3
As we discussed in the sharing blog, your organization relies on sharing and working with informatio...
31st July, 2023
Keeping Abreast of Changes in User Permissions, Configuration, and Access with Microsoft M365 E3
Today Detexian’s CTO Adrian Kitto dives into the risk of privilege creep in M365. He highlights the ...
24th July, 2023
Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3
“To share or not to share” is not the question this week, because we all know that your organization...
10th July, 2023
Privileged Access Management in non-SCIM apps with Microsoft M365 E3
Here’s a hard one, how do you track privileged access inside of non-SCIM provisioned applications? D...
3rd July, 2023
Calculating inferred or effective MFA for non-Microsoft applications
Detexian’s CTO Adrian Kitto is delving into a topic that not many will think of; Working out the eff...