Your identity layer is your
real security perimeter

Passwords and usernames are no longer enough. Today’s attacks target your identities — compromising accounts, escalating privileges, and moving through your systems undetected. We lock it down, manage it continuously, and respond fast when something isn’t right.

61%

of breaches involve stolen or compromised credentials

80%

of cyber attacks use identity-based techniques

Days

average time attackers dwell undetected without ITDR

24/7

continuous monitoring under KARE

Why it matters now

Identities are under attack every day.

Most Kiwi businesses have moved to Microsoft 365. That’s great for productivity — but it also means a single compromised account can open the door to your email, files, teams, and systems. Managing who can access what, and stopping threats before they escalate, is no longer optional.

Credential theft is the #1 attack vector

Phishing, password spraying, and social engineering are cheap and effective. Once an attacker has valid credentials, standard perimeter defences don’t stop them.

Most breaches go undetected for weeks

Without identity threat detection, attackers can lurk in your environment — reading email, exfiltrating data, and mapping your systems — long before you know anything is wrong.

Misconfigured access is a silent risk

Overpermissioned accounts, stale users, and unreviewed admin rights are common in growing businesses. Each one is an open door that’s easy to close — once you know it’s there.

Compliance requires it

Whether you’re working toward ISO 27001, Essential Eight, or simply meeting your cyber insurance requirements, identity governance and MFA enforcement are baseline expectations.

What we manage

Comprehensive identity security — end to end.

We manage your identity and access environment across Microsoft Entra ID, Intune, and the wider Microsoft 365 stack. This isn’t a one-time project — it’s ongoing, proactive management.

Microsoft Entra ID (Azure AD)

Your cloud identity foundation. We configure and maintain Entra ID to control who can sign in, from where, on what devices — and enforce consistent policy across your whole organisation.

Microsoft Entra

Device Management with Intune

Identity and device trust go together. We manage your Microsoft Intune environment to ensure only compliant, enrolled devices can access company data — enforcing encryption, patch compliance, and configuration policy.

Microsoft Intune

Multi-Factor Authentication (MFA)

MFA is non-negotiable. We deploy, enforce, and manage MFA for every user — including resistant methods like Passkeys and number matching — and handle the support burden so your team doesn’t have to.

Entra ID

Privileged Identity Management

Admin accounts are high-value targets. We enforce just-in-time privileged access, time-limited admin roles, and approval workflows — reducing your attack surface dramatically.

Entra PIM

Conditional Access Policies

Not all sign-ins are equal. We build and maintain Conditional Access policies that enforce the right controls based on user, location, device state, and risk — without blocking legitimate work.

Zero Trust

User Lifecycle & Access Reviews

Joiners, movers, and leavers handled properly. We manage user provisioning, deprovisioning, and periodic access reviews — so stale accounts and overpermissioned users don’t become your next breach.

Governance

Managed under KARE

Monitored. Maintained. Managed continuously.

Identity security isn’t a set-and-forget exercise. Policies drift. New users get inconsistent settings. Threats evolve. That’s why Identity Security & Access Management is delivered as part of KARE — Kinetics’ proactive managed IT service.

Your identity environment is continuously monitored through Microsoft Entra ID Protection and Defender for Identity. Any anomaly, sign-in risk, or policy deviation triggers our response process — not a report on next month’s review meeting.

This is the difference between knowing about a problem after the fact, and stopping it before it matters.

Included in your KARE coverage

  • Continuous sign-in risk monitoring via Entra ID Protection
  • Conditional Access policy management and review
  • MFA enforcement and helpdesk support for end users
  • Intune device compliance policy management
  • Privileged account monitoring and access reviews
  • Stale account and guest user auditing
  • Monthly identity security health reporting
  • Incident response when identity threats are detected

Identity Threat Detection & Response

When something looks wrong, we act.

ITDR — Identity Threat Detection and Response — is the discipline of spotting identity-based attacks in progress and shutting them down fast. It’s built into how we manage your environment.

Detect

Real-time risk signals

Microsoft Entra ID Protection and Defender for Identity analyse every sign-in against billions of signals. Anomalies — impossible travel, unfamiliar locations, leaked credentials — surface immediately.

Investigate

Context before action

Not every alert is an incident. Our team investigates risk signals against your environment and user behaviour to confirm genuine threats — reducing noise and false positives.

Contain

Fast, targeted response

Confirmed identity threats are contained immediately — accounts suspended, sessions revoked, privileged access removed. We contain the blast radius before attackers can move laterally.

Recover

Restore and harden

After containment, we restore legitimate access, review how the threat occurred, and harden the relevant controls — so the same attack vector can’t be used again.

Reporting & visibility

You’ll always know where you stand.

Identity security only works if someone is watching it. We give you regular, clear reporting on the health of your access environment — not raw data dumps, but meaningful summaries you can act on.

Monthly Identity Health Report

A plain-English summary of your identity posture — MFA coverage, risky sign-ins, policy exceptions, and open recommendations. Delivered monthly as part of your KARE service.

Risk Event Notifications

When Entra ID Protection flags a high-risk sign-in or leaked credential, you and our team are alerted immediately — not at the next reporting cycle.

U

Quarterly Access Reviews

We run structured access reviews each quarter — identifying stale accounts, orphaned permissions, and admin roles that should be time-limited — and clear them out.

Compliance-Ready Audit Logs

Full sign-in and access audit logs retained and accessible. Useful for internal review, insurance requirements, and compliance evidence under Essential Eight or ISO 27001.

Your monthly identity scorecard covers:

MFA enrolment rate % coverage
Risky sign-in events Count + detail
Conditional Access policy hits Blocked / allowed
Inactive accounts Flagged for action
Intune device compliance % compliant
Admin role assignments Reviewed quarterly
Open recommendations Tracked to closure

Know exactly who has access
to what — and keep it that way.

A free discovery call takes 30 minutes. We’ll review your current identity posture, identify the gaps that matter most, and explain what managed identity security looks like in practice.