AI Identity Risk Monitor

Your AI agents and
non-human identities
have access to everything.

Most have never been reviewed.

AIRM continuously monitors every AI agent and non-human identity in your Microsoft 365 tenant — scoring risk, mapping blast radius, detecting rogue behaviour, and proving compliance across EU AI Act, DORA, ISO 42001 and more. From detection to guided response, in one platform.

100:1
Non-Human Identities outnumber humans
0
Agents or sensors required
11
Compliance frameworks covered
Detection
→ Response
In one platform
Blast Radius
CRITICAL
AI Agents & NHIs — Acme Corp 3 Critical
App
Claude-for-Work
80
Critical
NHI
OpenAI-Enterprise
62
High
AI
Copilot-Studio-Agent
38
Medium
NHI
Gemini-Workspace
18
Low
EU AI Act
Art. 14 — Oversight
Scroll

Your biggest attack surface
is completely unmonitored.

AI agents and non-human identities now outnumber human users 100 to 1 in most Microsoft 365 environments — and most organisations have no visibility into them at all.

👻

Shadow AI Agents

Copilot connectors, Power Automate flows, and third-party AI tools operate continuously with permissions nobody reviews. If compromised, the damage is catastrophic.

🔑

Unmanaged Credentials

Service principals accumulate over time with aged credentials, no owners, and permissions far beyond what they need. A quiet app with write access to your entire tenant.

📋

Invisible Compliance Risk

EU AI Act, DORA, ISO 42001 — regulators are asking about AI agents and non-human identities. Most organisations can't answer those questions yet.

The questions every CISO
is being asked right now.

AI adoption is accelerating faster than security teams can govern it. 92% of security leaders are concerned about AI agents and their impact on security. AIRM is built to help you answer these questions — and act on the answers.

"Are we ready for AI?"

Your board and CEO are pushing AI adoption. You've been asked to sign off on it. But 69% of enterprises already have AI agents running in production — often deployed without security review, with permissions nobody explicitly granted.

How AIRM helps

AIRM gives you an instant, comprehensive inventory of every AI agent and non-human identity in your Microsoft 365 environment — so you can answer "what AI do we have and what can it access?" before you answer "are we ready?"

"What is Shadow AI doing in our environment?"

3 in 4 CISOs have discovered unsanctioned AI tools already running in their environments — often with OAuth tokens and elevated permissions plugged directly into enterprise systems, completely outside standard provisioning workflows.

How AIRM helps

AIRM detects every service principal and AI agent in your tenant — sanctioned or not. Unreviewed identities are flagged immediately, with their permissions, blast radius, and compliance implications surfaced in one view.

"If an approved AI agent is compromised, how bad could it get?"

An AI agent your organisation legitimately approved could be compromised, updated with malicious logic, or silently granted new permissions. Traditional security tools watch for human behaviour anomalies — they weren't built for this.

How AIRM helps

AIRM's Blast Radius Analysis maps exactly what an attacker would reach if any identity were compromised — based on its actual permissions, not assumptions. You see the worst-case scenario before it happens, not after.

"Are we compliant with the EU AI Act, DORA, and ISO 42001?"

Regulators are now asking specific questions about AI governance. The EU AI Act's high-risk obligations phase in through 2026. DORA has been in force since January 2025. Most organisations cannot yet produce evidence of AI agent oversight.

How AIRM helps

AIRM automatically maps every finding to 11 compliance frameworks including EU AI Act, ISO 42001, and DORA — and generates per-framework compliance reports you can hand directly to auditors and regulators.

"How do we enable AI without losing control?"

CISOs are under pressure to enable AI innovation — but saying yes without visibility is the fastest way to lose control. The organisations that establish agent inventories and privilege policies today will be the resilience leaders of tomorrow.

How AIRM helps

AIRM gives you the visibility layer that makes "yes" safe. Monitor every AI agent continuously, detect permission drift, get alerted when behaviour changes, and demonstrate governance to the board — all from one platform.

🛡️

AIRM is your AI governance layer.

You don't have to choose between enabling AI and securing it. AIRM gives security teams the visibility, intelligence, and evidence they need to say yes to AI — confidently.

Start free trial — 14 days
No credit card · No agents · Connect in minutes
Core Monitoring

Complete visibility across every non-human identity.

AIRM continuously scans your Microsoft 365 tenant — discovering every AI agent, service principal, and non-human identity, classifying them, and tracking changes across every scan.

  • Automatic discovery of all AI agents and Non-Human Identities — no manual inventory
  • Classification by type: AI Agent, Automation, Legacy App, Microsoft First-Party
  • Owner assignment and accountability tracking
  • Credential age monitoring with expiry alerts
  • Scan-over-scan delta tracking — catch changes as they happen
Non-Human Identities (NHIs) 12 identities found
App
Claude-for-Work
CRITICAL
Auto
AIRM
HIGH
NHI
GitHub-Copilot
MEDIUM
MS
Microsoft Graph
LOW
Risk Scoring

Two risk signals. One clear picture.

AIRM scores every identity on two independent dimensions — what it's doing right now, and how bad it would be if it were compromised. A quiet app with dangerous permissions is your biggest threat.

  • Behaviour Risk Band — composite score across Static, Behavioural, and Anomaly signals
  • Blast Radius Band — potential damage based on permissions granted, not just activity
  • Contextual insight: "This app is quiet but would give an attacker near-total tenant access"
  • Anomaly detection accumulates intelligence scan-over-scan
Claude-for-Work
Behaviour Risk
LOW
Blast Radius
CRITICAL

"This app is currently quiet but represents a severe threat if compromised. Its permissions would give an attacker near-total tenant access. Review permissions immediately."

Blast Radius Analysis

See exactly what an attacker would reach.

The Blast Radius Map visualises the potential impact of a compromised identity based on its granted permissions — not historical activity. Every Service Principal with permissions shows a populated map from day one.

  • Permission-based node graph — centre node is the Service Principal, surrounding nodes are resource types
  • Red edges = write access, blue edges = read-only — instantly readable severity
  • Dynamic impact panel: "If compromised, an attacker could read and send email for all users"
  • Works on fresh tenants — no audit history required
Blast Radius Map Critical
AIRM
Email
Apps
Dir.
Mail
Files
Write access Read only
Compliance Mapping

11 frameworks. Automatic. Per identity.

AIRM maps every finding to the compliance frameworks your clients are accountable to — including the new AI-specific regulations coming into force now. Generate a per-framework compliance report in one click.

  • EU AI Act, ISO 42001, NIST AI RMF — AI governance frameworks built in
  • DORA, ISO 27001, UK CAF, Essential Eight and more
  • Per-control findings mapped to real AIRM risk signals
  • Branded PDF compliance reports per framework
  • MSP clients can see exactly which regulatory obligations their environment triggers
Compliance Frameworks
NIST AI RMF
EU AI Act
ISO 42001
ISO 27001
DORA
UK CAF
Essential 8
MAS TRM
CERT-In
BSI
Cyber Ess.
NIS2

Approved today. Compromised tomorrow.

Just because an AI agent or service principal was sanctioned doesn't mean it stays safe. AIRM watches every identity continuously — detecting when approved apps start behaving like threats.

⚙️
Proprietary Technology

The AIRM Anomaly Intelligence Engine

Unlike tools that take a point-in-time snapshot, AIRM's proprietary scoring engine accumulates behavioural intelligence with every scan. It builds a unique fingerprint for every identity in your environment — learning what normal looks like before it can detect what isn't. The longer AIRM monitors your tenant, the more precise its anomaly detection becomes. This scan-over-scan intelligence accumulation is a capability no static rule set or one-time assessment can replicate.

3
Risk dimensions scored per identity
Historical scans retained
P1–P5
Automated priority tiers
⚠️

Approved AI Going Rogue

An AI agent your organisation legitimately approved and uses every day can be compromised, updated with malicious behaviour, or start accessing resources it never touched before. AIRM detects the delta — not just the initial state.

Day 1 — Approved Mail.Read · Calendar.Read
Day 47 — Anomaly detected + Directory.ReadWrite.All added
🔴

Known Rogue Service Principal Detection

AIRM maintains awareness of service principals associated with known threat actors, compromised vendors, and malicious OAuth apps. When a known rogue Service Principal appears in your tenant, you're alerted immediately — not after the damage is done.

Malicious OAuth App Compromised Vendor Service Principal Suspicious Publisher
📈

Scan-Over-Scan Intelligence

AIRM accumulates intelligence with every scan. The longer AIRM monitors a tenant, the more accurate its anomaly detection becomes — because it knows exactly what normal looks like for every identity in your environment.

Scan 1
Baseline established
Scan 14
Pattern recognised
Scan 31
Deviation flagged
🛡️

Governing AI You Actually Use

Organisations adopting Microsoft Copilot, custom Power Automate agents, and third-party AI tools need visibility into what those agents are doing — not just that they were approved. AIRM monitors sanctioned AI continuously so you know if it goes off-script.

  • Permission scope changes on approved agents
  • Unusual resource access patterns
  • Credential age and rotation compliance
  • Behaviour baseline deviation scoring

Microsoft E7 is powerful.
It still doesn't cover everything.

Microsoft 365 E7 includes Agent 365 — a significant step forward for AI governance. But it's built for Microsoft-native agents, at $99/user/month. AIRM covers the full Non-Human Identity attack surface, for every M365 tenant, at a fraction of the cost.

Capability
Microsoft E7 $99/user/mo
AIRM from $69/tenant/mo
AI Agent Visibility
Microsoft-native agent inventory (Copilot Studio, Agent Builder)
Third-party AI agent discovery (non-Microsoft apps)
Shadow AI agent detection Partial Entra Internet Access req.
AI agent risk scoring (behaviour + blast radius)
Non-Human Identity Security
Service principal inventory Partial Entra admin only
Non-Human Identity risk scoring and band classification
Blast radius analysis (permission-based)
Credential age monitoring and alerts
Unowned identity detection and owner assignment
Known rogue Service Principal detection
Anomaly Detection
Approved agent behaviour monitoring Partial Defender signals only
Scan-over-scan anomaly accumulation
Permission scope drift detection
Behavioural baseline per identity
Compliance & Reporting
AI governance framework mapping (EU AI Act, ISO 42001, NIST AI RMF)
Per-framework compliance PDF reports
MSP branded client reports
Executive summary for non-technical stakeholders
MSP & Multi-Tenant
Multi-tenant MSP dashboard Partial Lighthouse — limited
PSA integration (ConnectWise, HaloPSA, Autotask)
Per-tenant pricing (not per user)
Microsoft E7 is an excellent platform for AI productivity and Microsoft-native agent governance. AIRM is purpose-built to cover what E7 doesn't — the full Non-Human Identity attack surface, third-party AI agents, anomaly intelligence, and MSP-channel delivery. They work best together.

One platform. Every client tenant.

AIRM is built channel-first. MSPs get a multi-tenant dashboard, PSA integrations, and branded client reports — everything you need to deliver Non-Human Identity security as a managed service.

🏢

Multi-Tenant Dashboard

See all client tenants at a glance. Risk scores, critical findings, and compliance signals across your entire client portfolio in one view.

🎫

PSA Integration

Native connectors for ConnectWise Manage, HaloPSA, and Autotask. Alerts become tickets automatically — no middleware required.

📄

Branded Client Reports

Every report carries your logo and company name. Executive summaries, Non-Human Identity risk reports, and compliance reports — all white-labelled at MSP Scale tier and above.

💰

Strong MSP Economics

From $69/tenant/month with volume discounts at 10, 25, and 50+ tenants. MSPs at 25 tenants typically generate $2,000+/month margin from AIRM alone.

MSP Overview — All Tenants
SC
Acme Corporation
3 Critical
CRITICAL
AC
Anderson Consulting
2 High
HIGH
TL
TechLabs Group
1 Medium
MEDIUM
NX
Nexus Financial
All clear
LOW
MG
Meridian Global
Scanning...
ACTIVE

Findings that reach the right
people, automatically.

AIRM doesn't just surface risk — it gets it into the hands of the people who can act. Smart alerting, PSA ticket creation, and outbound webhooks mean no finding sits unnoticed.

Active Alerts 4 Critical
P1
New Critical blast radius identity detected
Claude-for-Work · Acme Corp · 2 min ago
Ack Ticket ↗
P2
Anomaly: Permission scope drift detected
OpenAI-GPT-Connector · TechFlow Ltd · 14 min ago
Ack Ticket ↗
P2
Unowned identity with High attack path
Perplexity-Enterprise · Meridian Global · 1 hr ago
Ack Snooze
P3
Credential expiring in 7 days
Anthropic-Claude-API · Nexus Financial · 3 hr ago
Ack Snooze
Bulk actions: Acknowledge all Create all tickets
🔧
ConnectWise
Native
🎯
HaloPSA
Native
Autotask
Native
🎪
Jira
Webhook
💬
Slack
Webhook
🟦
MS Teams
Webhook
🛡️
MS Sentinel
Webhook
🌊
Splunk
Webhook
🔵
Sophos
Webhook
🔔

Smart Alert Engine

P1–P5 priority tiers automatically assigned based on risk severity. Deduplication prevents alert fatigue — the same finding doesn't fire twice. Auto-resolution when the underlying issue is fixed.

⏱️

Snooze & Suppression Rules

Snooze individual alerts for a defined period. Create suppression rules for known-good identities or accepted risks. Bulk acknowledge across multiple tenants from the MSP dashboard.

🎫

Native PSA Ticket Creation

Alerts become PSA tickets automatically — no middleware, no Zapier, no API gymnastics. ConnectWise Manage, HaloPSA, and Autotask supported natively with structured ticket format and tenant context included.

ConnectWise
HaloPSA
Autotask
🔗

Outbound Webhooks

Send AIRM findings to any system that accepts webhooks — SIEM, SOAR, Slack, Teams, custom dashboards. HMAC-SHA256 signed payloads for security. Configurable per event type and per tenant.

Reports your clients will actually read.

AIRM generates professional, branded PDF reports written in plain English — designed for both technical teams and non-technical stakeholders.

📊

Executive Summary

A consultant-quality summary of tenant risk posture — written in plain English for non-technical stakeholders. Includes risk narrative, top findings, and recommended actions.

🤖

AI Agent Risk Report

Full operational summary of all AI agents — risk scores, anomaly flags, blast radius analysis, and scan results. Weekly reporting for security teams.

🔑

Non-Human Identity Risk Report

Complete risk profile of all non-human identities including behaviour risk, blast radius, attack paths, credential age, and per-identity scoring breakdown.

Compliance Framework Report

Per-framework compliance report with executive summary and per-control findings. Available for all 11 frameworks including EU AI Act and DORA.

📋

Agent Inventory Export

Complete CSV export of all AI agents and Non-Human Identities for integration with your own reporting or ticketing workflows.

🎨

MSP Branded Reports

Every report carries your logo and company name. Hand clients a professional security report that looks like it came from your team, not a third-party tool.

The frameworks regulators are asking about.

AIRM maps every finding to 11 security and AI governance frameworks — including the new AI-specific regulations your clients are being asked about right now.

NIST AI RMF
EU AI Act
ISO 42001
MAS TRM
Essential Eight
ISO 27001
DORA
UK CAF
BSI Grundschutz
CERT-In
Cyber Essentials

AI & Non-Human Identity Frameworks    ● General Security Frameworks

Transparent pricing.
Strong MSP economics.

Per-tenant pricing with volume discounts for MSPs. All plans include a 14-day free trial — no credit card required.

MSP Starter
$69
per tenant / month · min 3 tenants
  • Multi-tenant MSP dashboard
  • AI Agent & Non-Human Identity monitoring
  • Full report suite
  • MSP branded reports
  • PSA integrations
  • All 11 compliance frameworks
  • Email support
Start free trial
MSP Scale
$45
per tenant / month · min 25 tenants
  • Everything in Growth
  • Dedicated Customer Success Manager
  • Custom SLA — 99.5% uptime
  • White-label reports available
  • Early access to new features
  • Product roadmap input
Start free trial
MSP Enterprise
Custom
50+ tenants · custom contract
  • Everything in Scale
  • Unlimited tenants
  • Full white-label option
  • API access for RMM/SIEM
  • Custom compliance frameworks
  • Dedicated technical account manager
Talk to us

Save 20% with annual billing  ·  14-day free trial on all plans  ·  No credit card required

Start monitoring what
Microsoft doesn't.

Connect your first Microsoft 365 tenant in under 5 minutes.
No agents. No complex setup. Just connect and go.

No credit card required · Agentless · Microsoft 365 only