Your identity layer is your
real security perimeter
Passwords and usernames are no longer enough. Today’s attacks target your identities — compromising accounts, escalating privileges, and moving through your systems undetected. We lock it down, manage it continuously, and respond fast when something isn’t right.
61%
of breaches involve stolen or compromised credentials
80%
of cyber attacks use identity-based techniques
Days
average time attackers dwell undetected without ITDR
24/7
continuous monitoring under KARE
Why it matters now
Identities are under attack every day.
Most Kiwi businesses have moved to Microsoft 365. That’s great for productivity — but it also means a single compromised account can open the door to your email, files, teams, and systems. Managing who can access what, and stopping threats before they escalate, is no longer optional.
Credential theft is the #1 attack vector
Phishing, password spraying, and social engineering are cheap and effective. Once an attacker has valid credentials, standard perimeter defences don’t stop them.
Most breaches go undetected for weeks
Without identity threat detection, attackers can lurk in your environment — reading email, exfiltrating data, and mapping your systems — long before you know anything is wrong.
Misconfigured access is a silent risk
Overpermissioned accounts, stale users, and unreviewed admin rights are common in growing businesses. Each one is an open door that’s easy to close — once you know it’s there.
Compliance requires it
Whether you’re working toward ISO 27001, Essential Eight, or simply meeting your cyber insurance requirements, identity governance and MFA enforcement are baseline expectations.
What we manage
Comprehensive identity security — end to end.
We manage your identity and access environment across Microsoft Entra ID, Intune, and the wider Microsoft 365 stack. This isn’t a one-time project — it’s ongoing, proactive management.
Microsoft Entra ID (Azure AD)
Your cloud identity foundation. We configure and maintain Entra ID to control who can sign in, from where, on what devices — and enforce consistent policy across your whole organisation.
Device Management with Intune
Multi-Factor Authentication (MFA)
MFA is non-negotiable. We deploy, enforce, and manage MFA for every user — including resistant methods like Passkeys and number matching — and handle the support burden so your team doesn’t have to.
Privileged Identity Management
Conditional Access Policies
Not all sign-ins are equal. We build and maintain Conditional Access policies that enforce the right controls based on user, location, device state, and risk — without blocking legitimate work.
User Lifecycle & Access Reviews
Managed under KARE
Monitored. Maintained. Managed continuously.
Identity security isn’t a set-and-forget exercise. Policies drift. New users get inconsistent settings. Threats evolve. That’s why Identity Security & Access Management is delivered as part of KARE — Kinetics’ proactive managed IT service.
Your identity environment is continuously monitored through Microsoft Entra ID Protection and Defender for Identity. Any anomaly, sign-in risk, or policy deviation triggers our response process — not a report on next month’s review meeting.
This is the difference between knowing about a problem after the fact, and stopping it before it matters.
Included in your KARE coverage
- Continuous sign-in risk monitoring via Entra ID Protection
- Conditional Access policy management and review
- MFA enforcement and helpdesk support for end users
- Intune device compliance policy management
- Privileged account monitoring and access reviews
- Stale account and guest user auditing
- Monthly identity security health reporting
- Incident response when identity threats are detected
Identity Threat Detection & Response
When something looks wrong, we act.
ITDR — Identity Threat Detection and Response — is the discipline of spotting identity-based attacks in progress and shutting them down fast. It’s built into how we manage your environment.
Detect
Real-time risk signals
Microsoft Entra ID Protection and Defender for Identity analyse every sign-in against billions of signals. Anomalies — impossible travel, unfamiliar locations, leaked credentials — surface immediately.
Investigate
Context before action
Not every alert is an incident. Our team investigates risk signals against your environment and user behaviour to confirm genuine threats — reducing noise and false positives.
Contain
Fast, targeted response
Confirmed identity threats are contained immediately — accounts suspended, sessions revoked, privileged access removed. We contain the blast radius before attackers can move laterally.
Recover
Restore and harden
After containment, we restore legitimate access, review how the threat occurred, and harden the relevant controls — so the same attack vector can’t be used again.
Reporting & visibility
You’ll always know where you stand.
Identity security only works if someone is watching it. We give you regular, clear reporting on the health of your access environment — not raw data dumps, but meaningful summaries you can act on.
Monthly Identity Health Report
A plain-English summary of your identity posture — MFA coverage, risky sign-ins, policy exceptions, and open recommendations. Delivered monthly as part of your KARE service.
Risk Event Notifications
When Entra ID Protection flags a high-risk sign-in or leaked credential, you and our team are alerted immediately — not at the next reporting cycle.
Quarterly Access Reviews
We run structured access reviews each quarter — identifying stale accounts, orphaned permissions, and admin roles that should be time-limited — and clear them out.
Compliance-Ready Audit Logs
Full sign-in and access audit logs retained and accessible. Useful for internal review, insurance requirements, and compliance evidence under Essential Eight or ISO 27001.
Your monthly identity scorecard covers:
| MFA enrolment rate | % coverage |
| Risky sign-in events | Count + detail |
| Conditional Access policy hits | Blocked / allowed |
| Inactive accounts | Flagged for action |
| Intune device compliance | % compliant |
| Admin role assignments | Reviewed quarterly |
| Open recommendations | Tracked to closure |
Know exactly who has access
to what — and keep it that way.
A free discovery call takes 30 minutes. We’ll review your current identity posture, identify the gaps that matter most, and explain what managed identity security looks like in practice.