Agentic Identity Risk Management

Your AI agents and non-human identities have access to everything.

Most have never been reviewed.

AIRM continuously monitors every AI agent and non-human identity in your Microsoft 365 tenant. It scores risk, maps blast radius, detects rogue behaviour, and produces compliance evidence for EU AI Act, DORA, ISO 42001 and other frameworks. Detection through to guided response in one platform.

144:1
Non-Human Identities outnumber humans
0
Agents or sensors required
11
Compliance frameworks covered
Detection
β†’ Response
In one platform
Blast Radius
CRITICAL
AI Agents & NHIs β€” Acme Corp3 Critical
App
Claude-for-Work
80
NHI
OpenAI-Enterprise
62
AI
Copilot-Studio-Agent
38
NHI
Gemini-Workspace
18
EU AI Act
Art. 14 β€” Oversight
The Problem

Your biggest attack surface is completely unmonitored.

AI agents and non-human identities now outnumber human users 100 to 1 in most Microsoft 365 environments. Almost no organisation has visibility into them.

πŸ‘»

Shadow AI Agents

Copilot connectors, Power Automate flows, and third-party AI tools operate continuously with permissions nobody reviews. If compromised, the damage is catastrophic.

πŸ”‘

Unmanaged Credentials

Service principals accumulate over time with aged credentials, no owners, and permissions far beyond what they need. A quiet app with write access to your entire tenant.

πŸ“‹

Invisible Compliance Risk

EU AI Act, DORA, ISO 42001: regulators are asking about AI agents and non-human identities. Most organisations can't answer those questions yet.

For Security Leaders

The questions every CISO is being asked right now.

AI adoption is accelerating faster than security teams can govern it. 92% of security leaders are concerned about AI agents and their impact on security. AIRM was built to answer these questions, and to act on the answers.

"Are we ready for AI?"

Your board and CEO are pushing AI adoption. You've been asked to sign off on it. But 69% of enterprises already have AI agents running in production. Most were deployed without security review, with permissions nobody explicitly granted.

How AIRM helps

AIRM gives you a full inventory of every AI agent and non-human identity in your Microsoft 365 environment. You can answer "what AI do we have and what can it access?" before you answer "are we ready?"

"What is Shadow AI doing in our environment?"

3 in 4 CISOs have discovered unsanctioned AI tools already running in their environments. Many were granted OAuth tokens and elevated permissions plugged directly into enterprise systems, outside any standard provisioning workflow.

How AIRM helps

AIRM detects every service principal and AI agent in your tenant, whether sanctioned or not. Unreviewed identities are flagged immediately. You see their permissions, blast radius, and compliance implications together.

"If an approved AI agent is compromised, how bad could it get?"

An AI agent your organisation legitimately approved can still be compromised. Its code can be updated with malicious logic. It can be silently granted new permissions. Traditional security tools watch for human behaviour anomalies. They weren't built to catch this.

How AIRM helps

AIRM's Blast Radius Analysis maps exactly what an attacker would reach if any identity were compromised. The map is built from actual granted permissions, not assumed activity. You see the worst case before it happens.

"Are we compliant with the EU AI Act, DORA, and ISO 42001?"

Regulators are now asking specific questions about AI governance. The EU AI Act's high-risk obligations phase in through 2026. DORA has been in force since January 2025. Most organisations cannot yet produce evidence of AI agent oversight.

How AIRM helps

AIRM automatically maps every finding to 11 compliance frameworks including EU AI Act, ISO 42001, and DORA. It generates per-framework compliance reports you can hand to auditors and regulators.

"How do we enable AI without losing control?"

CISOs are under pressure to enable AI innovation. Saying yes without visibility is the fastest way to lose control. Organisations that establish agent inventories and privilege policies now will be the ones in control when something goes wrong.

How AIRM helps

AIRM gives you the visibility layer that makes "yes" safe. Monitor every AI agent continuously, detect permission drift, get alerted when behaviour changes, and demonstrate governance to the board. One platform.

πŸ›‘οΈ

AIRM is your AI governance layer.

You don't have to choose between enabling AI and securing it. AIRM gives security teams the visibility, intelligence, and evidence they need to say yes to AI with confidence.

Start free trial β€” 14 days
No credit card Β· No agents Β· Connect in minutes
Core Monitoring

Complete visibility across every non-human identity.

AIRM continuously scans your Microsoft 365 tenant. It discovers every AI agent, service principal, and non-human identity, classifies them, and tracks every change across every scan.

  • Automatic discovery of all AI agents and Non-Human Identities, with no manual inventory required
  • Classification by type: AI Agent, Automation, Legacy App, Microsoft First-Party
  • Owner assignment and accountability tracking
  • Credential age monitoring with expiry alerts
  • Scan-over-scan delta tracking, catching changes as they happen
Non-Human Identities (NHIs)12 identities found
App
Claude-for-Work
Critical
Auto
AIRM
High
NHI
GitHub-Copilot
Medium
MS
Microsoft Graph
Low
Risk Scoring

Two risk signals. One clear picture.

AIRM scores every identity on two independent dimensions: what it's doing right now, and how bad it would be if it were compromised. A quiet app with dangerous permissions is your biggest threat.

  • Behaviour Risk Band β€” composite score across Static, Behavioural, and Anomaly signals
  • Blast Radius Band β€” potential damage based on permissions granted, not just activity
  • Contextual insight: "This app is quiet but would give an attacker near-total tenant access"
  • Anomaly detection accumulates intelligence scan-over-scan
Claude-for-Work
Behaviour Risk
LOW
Blast Radius
CRITICAL
"This app is currently quiet but represents a severe threat if compromised. Its permissions would give an attacker near-total tenant access. Review permissions immediately."
Blast Radius Analysis

See exactly what an attacker would reach.

The Blast Radius Map visualises the potential impact of a compromised identity based on its granted permissions, not historical activity. Every Service Principal with permissions shows a populated map from day one.

  • Permission-based node graph β€” centre node is the Service Principal, surrounding nodes are resource types
  • Red edges = write access, blue edges = read-only β€” instantly readable severity
  • Dynamic impact panel: "If compromised, an attacker could read and send email for all users"
  • Works on fresh tenants, no audit history required
Terraform CloudCRITICAL
Directory Read/Write Apps Read/Write RoleMgmt Read/Write Terraform Cloud Write Read
If compromised, an attacker could
Assign any admin role to any user Β· Read and write all app registrations Β· Modify directory-wide settings
Directory.ReadWrite.AllCRITICAL
Application.ReadWrite.AllCRITICAL
RoleManagement.ReadWrite.AllCRITICAL
Identity Graph

See every trust relationship, rendered live.

The Identity Graph maps the full web of trust relationships across your Microsoft 365 tenant. It shows AI Agents, Non-Human Identities, humans, and Microsoft first-party apps, and exactly who has permission to act on what. Three modes reveal different threat dimensions: the full Graph view, Attack Paths for lateral movement chains, and Temporal Analysis showing how the graph has shifted over time.

  • Graph mode: interactive force-directed node map with Crown Jewel highlighting
  • Attack Paths mode: surfaces lateral movement chains from any identity to high-value targets
  • Temporal Analysis: detects permission drift and new connections since last scan
  • Filter by node type, edge type, risk score, threat intel flags, and cycle detection
  • Export to SVG for board reports and incident documentation
Identity Graph12 nodes
Graph Paths Temporal
Copilot Finance Exchange CJ Graph API Legacy Payroll Win Azure James Share Point eM Sync
NHI AI Agent Crown Jewel Write Read
Compromise Simulation

If this identity were breached β€” what could an attacker actually do?

Compromise Simulation runs a permission-aware attack model against any AI Agent or Non-Human Identity. It translates raw Graph API scopes into human-readable attacker actions, scores the reachable blast, maps every accessible data type, and surfaces scoped remediation recommendations. No live data is touched.

  • Blast simulation score (0–100) with High / Critical severity band
  • Human-readable attacker action list: "Send email impersonating any user", "Exfiltrate all files"
  • Reachable data taxonomy: mailboxes, calendars, SharePoint, OneDrive, device inventory and more
  • Unrecognised permission flags: highlights scopes outside AIRM's 30-permission semantic model
  • Scoped remediation recommendations per permission with least-privilege alternatives
⚑
Copilot for Finance
⚑ Compromise Simulation
Blast simulation score72 / 100 β€” High

If Copilot for Finance were compromised, an attacker would gain access to all mailboxes, email content, and 15 more data types. 13 distinct attacker actions available across 1 resource.

Reachable Data
All mailboxes Email content Attachments All SharePoint sites All OneDrive files + 12 more
Attacker Actions
⚠Read all email in every mailbox in the tenant
⚠Send email impersonating any user
⚠Read and write files across all SharePoint & OneDrive
⚠+ 10 more actions
Before taking any action
Scope Mail.ReadWrite to specific mailboxes using resource-specific consent. Scope Files.ReadWrite.All using Sites.Selected where possible.
Compliance Mapping

11 frameworks. Automatic. Per identity.

AIRM maps every finding to the compliance frameworks your clients are accountable to, including the new AI-specific regulations coming into force now. Generate a per-framework compliance report in one click.

  • EU AI Act, ISO 42001, NIST AI RMF β€” AI governance frameworks built in
  • DORA, ISO 27001, UK CAF, Essential Eight and more
  • Per-control findings mapped to real AIRM risk signals
  • Branded PDF compliance reports per framework
  • MSP clients can see exactly which regulatory obligations their environment triggers
Compliance Frameworks
NIST AI RMF
EU AI Act
ISO 42001
ISO 27001
DORA
UK CAF
Essential 8
MAS TRM
CERT-In
BSI
Cyber Ess.
NIS2
Anomaly Intelligence

Approved today. Compromised tomorrow.

Just because an AI agent or service principal was sanctioned doesn't mean it stays safe. AIRM watches every identity continuously, and flags approved apps when they start behaving in ways they didn't before.

Proprietary Technology

The AIRM Anomaly Intelligence Engine

Unlike tools that take a point-in-time snapshot, AIRM's proprietary scoring engine accumulates behavioural intelligence with every scan. It builds a unique fingerprint for every identity in your environment. The engine has to know what normal looks like before it can detect what isn't. The longer AIRM monitors a tenant, the more precise its anomaly detection becomes. No static rule set or one-time assessment replicates this.

17
Anomaly signals monitored per identity
3
Risk dimensions scored per identity
P1–P5
Automated priority tiers
⚠️

Approved AI Going Rogue

An AI agent your organisation legitimately approved and uses every day can be compromised. It can be updated with malicious behaviour. It can start accessing resources it never touched before. AIRM detects the delta, not just the initial state.

Day 1 β€” ApprovedMail.Read Β· Calendar.Read
β†’
Day 47 β€” Anomaly+ Directory.ReadWrite.All
πŸ”΄

Known Rogue Service Principal Detection

AIRM maintains awareness of service principals associated with known threat actors, compromised vendors, and malicious OAuth apps. When a known rogue Service Principal appears in your tenant, you're alerted immediately, not after the damage is done.

Malicious OAuth App Compromised Vendor SP Suspicious Publisher
πŸ“ˆ

Scan-Over-Scan Intelligence

AIRM accumulates intelligence with every scan. The longer AIRM monitors a tenant, the more accurate its anomaly detection becomes. It knows exactly what normal looks like for every identity in your environment.

Scan 1Baseline established
Scan 14Pattern recognised
Scan 31Deviation flagged
πŸ›‘οΈ

Governing AI You Actually Use

Organisations adopting Microsoft Copilot, custom Power Automate agents, and third-party AI tools need visibility into what those agents are doing, not just that they were approved. AIRM monitors sanctioned AI continuously so you know if it goes off-script.

  • Permission scope changes on approved agents
  • Unusual resource access patterns
  • Credential age and rotation compliance
  • Behaviour baseline deviation scoring
How we compare

Microsoft E7 is powerful. It still doesn't cover everything.

Microsoft 365 E7 includes Agent 365, a significant step forward for AI governance. But it's built for Microsoft-native agents, at $99/user/month. AIRM covers the full Non-Human Identity attack surface, for every M365 tenant, at a fraction of the cost.

Capability
Microsoft E7$99/user/mo
AIRMfrom $99/tenant/mo
AI Agent Visibility
Microsoft-native agent inventory (Copilot Studio, Agent Builder)βœ“
Third-party AI agent discovery (non-Microsoft apps)β€”
Shadow AI agent detectionPartial Entra Internet Access req.
AI agent risk scoring (behaviour + blast radius)β€”
Non-Human Identity Security
Service principal inventoryPartial Entra admin only
Non-Human Identity risk scoring and band classificationβ€”
Blast radius analysis (permission-based)β€”
Credential age monitoring and alertsβ€”
Unowned identity detection and owner assignmentβ€”
Known rogue Service Principal detectionβ€”
Anomaly Detection
Approved agent behaviour monitoringPartial Defender signals only
Scan-over-scan anomaly accumulationβ€”
Permission scope drift detectionβ€”
Behavioural baseline per identityβ€”
Compliance & Reporting
AI governance framework mapping (EU AI Act, ISO 42001, NIST AI RMF)β€”
Per-framework compliance PDF reportsβ€”
MSP branded client reportsβ€”
Executive summary for non-technical stakeholdersβ€”
MSP & Multi-Tenant
Multi-tenant MSP dashboardPartial Lighthouse β€” limited
PSA integration (ConnectWise, HaloPSA, Autotask)β€”
Per-tenant pricing (not per user)β€”
β„Ή  Microsoft E7 is an excellent platform for AI productivity and Microsoft-native agent governance. AIRM is purpose-built to cover what E7 doesn't: the full Non-Human Identity attack surface, third-party AI agents, anomaly intelligence, and MSP-channel delivery. The two work alongside each other.
Built for MSPs

One platform. Every client tenant.

AIRM is built channel-first. MSPs get a multi-tenant dashboard, PSA integrations, and branded client reports. That's everything required to deliver Non-Human Identity security as a managed service.

🏒

Multi-Tenant Dashboard

See all client tenants at a glance. Risk scores, critical findings, and compliance signals across your entire client portfolio, in one view.

🎫

PSA Integration

Native connectors for ConnectWise Manage, HaloPSA, and Autotask. Alerts become tickets automatically. No middleware required.

πŸ“„

Branded Client Reports

Every report carries your logo and company name. Executive summaries, Non-Human Identity risk reports, and compliance reports are all white-labelled at MSP Enterprise tier and above.

πŸ’°

Strong MSP Economics

Plans run from $149/tenant/month (Basic) up to $1,599/tenant/month (Enterprise) β€” see pricing below. MSP partners receive volume discounts: 20% off at 5+ tenants (Silver), 30% off at 10+ (Gold), and 40% off at 25+ (Platinum), so you build healthy recurring margin into every client engagement.

MSP Overview β€” All Tenants
SC
Acme Corporation
3 Critical
Critical
AC
Anderson Consulting
2 High
High
TL
TechLabs Group
1 Medium
Medium
NX
Nexus Financial
All clear
Low
MG
Meridian Global
Scanning…
Active
MSP Briefing
The attack your scanner missed
A 5-minute walkthrough of a real NHI compromise β€” what E7 sees, what AIRM sees, and how MSP-led NHI security pays for itself the first time it fires.
Alerting & Integrations

Findings that reach the right people, automatically.

AIRM doesn't just surface risk β€” it gets it into the hands of the people who can act. Smart alerting, PSA ticket creation, and outbound webhooks mean no finding sits unnoticed.

Active Alerts4 Critical
P1
New Critical blast radius identity detected
Claude-for-Work Β· Acme Corp Β· 2 min ago
AckTicket β†—
P2
Anomaly: Permission scope drift detected
OpenAI-GPT-Connector Β· TechFlow Ltd Β· 14 min ago
AckTicket β†—
P2
Unowned identity with High attack path
Perplexity-Enterprise Β· Meridian Global Β· 1 hr ago
AckSnooze
P3
Credential expiring in 7 days
Anthropic-Claude-API Β· Nexus Financial Β· 3 hr ago
AckSnooze
Bulk actions:Acknowledge allCreate all tickets
πŸ”§
ConnectWise
Native
🎯
HaloPSA
Native
⚑
Autotask
Native
πŸŽͺ
Jira
Webhook
πŸ’¬
Slack
Webhook
🟦
MS Teams
Webhook
πŸ›‘οΈ
MS Sentinel
Webhook
🌊
Splunk
Webhook
πŸ”΅
Sophos
Webhook
πŸ””

Smart Alert Engine

P1–P5 priority tiers automatically assigned based on risk severity. Deduplication prevents alert fatigue β€” the same finding doesn't fire twice. Auto-resolution when the underlying issue is fixed.

⏱️

Snooze & Suppression Rules

Snooze individual alerts for a defined period. Create suppression rules for known-good identities or accepted risks. Bulk acknowledge across multiple tenants from the MSP dashboard.

🎫

Native PSA Ticket Creation

Alerts become PSA tickets automatically β€” no middleware, no Zapier, no API gymnastics. ConnectWise Manage, HaloPSA, and Autotask supported natively with structured ticket format and tenant context included.

ConnectWise
HaloPSA
Autotask
πŸ”—

Outbound Webhooks

Send AIRM findings to any system that accepts webhooks β€” SIEM, SOAR, Slack, Teams, custom dashboards. HMAC-SHA256 signed payloads for security. Configurable per event type and per tenant.

Reporting

Reports your clients will actually read.

AIRM generates professional, branded PDF reports written in plain English β€” designed for both technical teams and non-technical stakeholders.

πŸ“Š

Executive Summary

A consultant-quality summary of tenant risk posture β€” written in plain English for non-technical stakeholders. Includes risk narrative, top findings, and recommended actions.

πŸ€–

AI Agent Risk Report

Full operational summary of all AI agents β€” risk scores, anomaly flags, blast radius analysis, and scan results. Weekly reporting for security teams.

πŸ”‘

Non-Human Identity Risk Report

Complete risk profile of all non-human identities including behaviour risk, blast radius, attack paths, credential age, and per-identity scoring breakdown.

βœ…

Compliance Framework Report

Per-framework compliance report with executive summary and per-control findings. Available for all 11 frameworks including EU AI Act and DORA.

πŸ“‹

Agent Inventory Export

Complete CSV export of all AI agents and Non-Human Identities for integration with your own reporting or ticketing workflows.

Compliance Coverage

The frameworks regulators are asking about.

AIRM maps every finding to 11 security and AI governance frameworks β€” including the new AI-specific regulations your clients are being asked about right now.

NIST AI RMF
EU AI Act
ISO 42001
MAS TRM
Essential Eight
ISO 27001
DORA
UK CAF
BSI Grundschutz
CERT-In
Cyber Essentials

AI & Non-Human Identity Frameworks    General Security Frameworks

Pricing

Transparent pricing. One plan for every team size.

Per-tenant pricing on annual commitment. All plans include a 14-day free trial β€” no credit card required.

Basic
$149
per tenant / month
  • 500 AI Agent & NHI identities
  • Unlimited tenants
  • AI agent monitoring
  • NHI monitoring
  • Risk scoring (3-axis)
  • Blast radius analysis
  • Anomaly detection
  • Alerting β€” full lifecycle
  • Authentication history
  • Role-based administration
  • MSP / multi-tenant console
  • Exec summary reports
Start free trial
Core
$299
per tenant / month
  • Everything in Basic, plus:
  • 1,500 AI Agent & NHI identities
  • Response actions (partial)
Start free trial
Business
$899
per tenant / month
  • Everything in Professional, plus:
  • 8,000 AI Agent & NHI identities
  • Full response actions
  • Compromise simulation
  • Compliance reporting (+$99/mo)
  • 99.99% SLA uptime
Start free trial
Enterprise
$1,599
per tenant / month
  • Everything in Business, plus:
  • Unlimited identities
  • Compliance reporting β€” included
  • Dedicated customer CX
  • Custom onboarding & SLA
  • White-label reports
  • Priority support
Contact us
Annual commitment Β· Billed monthly via Paddle Β· 14-day free trial Β· No credit card
For MSP and Partner programme pricing β€” contact us

Start monitoring what Microsoft doesn't.

Connect your first Microsoft 365 tenant in under 5 minutes. No agents. No complex setup. Just connect and go.

No credit card required Β· Agentless Β· Microsoft 365 only