Skip to main content
LAYER 3.1 // ITDR
Managed Identity Threat Detection & Response

Identity is the new perimeter.
We watch it 24/7.

Cloud migration moved your most valuable assets — mailboxes, files, calendars, Drive — outside the corporate network. ITDR provides 24/7 analyst-driven monitoring of Microsoft 365 and Google Workspace identities, watching for session hijacking, credential theft, account takeover, malicious inbox rules, and Business Email Compromise. Low-noise by design: we only alert on confirmed malicious activity.

24/7
Analyst-driven monitoring
M365 + GWS
Microsoft 365 & Google Workspace
Low-noise
Only confirmed malicious activity alerts

Session Hijacking & Credential Theft

Detects cookie and session-token abuse, impossible-travel logins, leaked-credential reuse, and MFA bypass attempts — the attack paths that bypass passwords entirely.

Account Takeover & BEC

Identifies account takeover sequences, executive impersonation, and Business Email Compromise — including fraudulent wire-transfer and payment-redirect campaigns.

Malicious Inbound & Inbox Rules

Flags phishing that lands in the inbox and detects attacker-created forwarding or auto-delete rules — the hidden plumbing attackers set up to maintain access and cover their tracks.

24/7 Analyst Response

Human-in-the-loop triage by experienced analysts — no script-only tier-1. Low false-positive rate, real-time response, and documented triage evidence for audit and compliance.

Why identity is the new perimeter

Cloud services migration moved the highest-value assets — mailboxes, shared files, calendars, Teams channels, Google Drive — outside the traditional corporate network boundary. The perimeter is now whoever can authenticate as a user. Credential theft, session hijacking, and inbox-rule manipulation are increasingly the first indicators of a real intrusion, not the malware that follows later.

ITDR closes that gap with 24/7 analyst-driven monitoring, correlating sign-in telemetry, mailbox events, and identity-graph signals across M365 and Google Workspace. The design priority is signal over noise: only confirmed malicious activity surfaces as an alert. No volume — only decisions.

We can't say when your M365 or Workspace identities will be targeted — only that they will. ITDR means you're ready when they are.

What's included

  • Microsoft 365 monitoring (Entra ID + Exchange + SharePoint)
  • Google Workspace monitoring (Identity + Gmail + Drive)
  • Session Hijacking Detection
  • Credential Theft Alerts
  • Inbox Rule Auditing
  • Account Takeover Response
  • Business Email Compromise Detection
  • 24/7 Analyst Triage

Objectives

  • Detect identity threats in real time
  • Reduce false positives via analyst triage
  • Strengthen M365 / Workspace data security
  • Be ready when identities are targeted
  • NIS2 incident-management alignment
NIS2 alignment

ITDR maps directly to NIS2 Art.21 requirements for incident management and identity controls. By detecting and containing credential-based intrusions early, the service limits blast radius and ensures business continuity. Documented analyst triage records constitute clear evidence of effective and proportionate technical measures — the standard the directive requires organisations to demonstrate.

Bring NightWatch to your M365 and Workspace identities