Cloud App Discovery
Shadow IT Landing Page
Discover Cloud Apps. Prioritize Risk.
Build an inventory of cloud usage and map it to identity risk: OAuth consents, enterprise app exposure, and suspicious service principals.
Status Overview
See sync health, counts, and what changed.
Sync Controls
Tenant-scoped ingestion with audit-friendly controls.
Data Browser
Inspect apps, grants, and detections.