Skip to main content

Identity Management.

The new perimeter. Hardened, monitored, and investigated end to end.

Most major incidents now start with identity — a phished credential, a misconfigured service principal, a forgotten admin account. DataExpert helps you tighten the identity perimeter before that becomes an incident, and brings forensic depth when identity-driven incidents do occur. The same team designs the controls and investigates the breaches.

// WHAT WE DO

What we do.

Identity hygiene is the highest-leverage security work most organisations are not doing well. Joiner-mover-leaver processes drift. Service-account inventories age out. Privileged-access reviews become rubber-stamp exercises. We work with your IT and HR teams to redesign these processes so they actually run, and we instrument them so you can prove they run during an audit.

Privileged access is the highest-value target inside any environment. We help organisations design and deploy privileged-access programmes — vaulting, session monitoring, just-in-time access, break-glass procedures — that satisfy auditors without bringing operational teams to a standstill. Real-world workflow is part of the design, not an afterthought.

When identity-driven incidents happen, we bring forensic-grade investigation capability. We trace credential abuse, reconstruct authentication-trail timelines, identify the point of initial compromise, and produce reports that hold up in regulatory and legal proceedings. The same practitioners who hardened your identity controls run the investigation when those controls are bypassed.

// CAPABILITIES

What we deliver.

  • Identity-control gap analysis against current best practice
  • Joiner-mover-leaver process redesign and instrumentation
  • Privileged-access management design and deployment support
  • Service-account and machine-identity inventory work
  • Identity-incident response — credential abuse, token theft, federation attacks
  • Forensic reconstruction of authentication and authorisation events
  • Identity-evidence preservation to support legal and regulatory action
  • Integration of identity monitoring into MDR and Detection & Response services
// CONTACT

Talk to an expert.

Tell us what you're working on. A senior DataExpert operator will be in touch within one business day.

We reply from a real inbox — no automated follow-ups.

Protected by Cloudflare Turnstile.

We respond within one business day. For active incidents call +31 (0)318 543173.

// FAQ

Frequently asked questions

Why is identity considered the new perimeter?

Traditional network perimeters have eroded as workloads have moved to cloud and identities have become the primary gatekeeper to data and services. Attackers know this — a large share of major incidents now begin with a phished credential, a compromised service account, or a misconfigured federation trust. Hardening identity therefore has the highest leverage for reducing real risk in modern environments.

Do you implement identity tooling, or just advise?

Both. DataExpert is platform-aware across the major identity providers and privileged-access platforms used in EU enterprises. We can lead deployment work, advise alongside your existing system integrator, or take an advisory-only role. The choice depends on your in-house capability and the pace you want to move at. We are transparent about which tools we are certified on. [VERIFY: full identity platform certification list]

How does identity monitoring integrate with MDR?

Identity telemetry — sign-ins, privilege escalations, federation events, conditional-access decisions — is one of the core inputs to our MDR and Detection & Response services. Detections written specifically for identity-attack patterns are part of the standard content set. Identity-related alerts are triaged with the same rigour as endpoint and cloud-workload alerts.

What does identity-incident response look like in practice?

We work backwards from the indicator — a suspicious sign-in, a privileged-access alert, a token replay — and reconstruct the attacker's full identity trail. We identify the point of initial compromise, the dwell time inside the identity layer, and any persistence mechanisms the attacker established. The result is a written report suitable for internal stakeholders, regulators, and legal action. Containment recommendations are delivered in parallel.

Can you help us with a privileged-access management programme?

Yes. PAM is a core part of our identity practice. We help organisations design and deploy vaulting, session monitoring, just-in-time access, and break-glass procedures — and we make sure the operational impact on your teams is realistic. PAM programmes fail when they are too disruptive; the design is as much a workflow problem as a security problem.

Do you handle service accounts and machine identities?

Yes. Service accounts and machine identities are typically the most poorly governed parts of an identity estate, and we have built methodology specifically for inventorying them, cleaning them up, and putting them under lifecycle control. This work is especially important in environments preparing for NIS2 or DORA, where machine-identity governance is increasingly a supervisory expectation.

How does identity work fit with GRC and regulatory programmes?

Identity controls are a major component of NIS2, DORA, ISO 27001, and sector-specific frameworks. Our identity practice produces documentation and evidence directly aligned with those frameworks, so the same work supports both your operational security and your compliance posture. The GRC and identity teams collaborate from day one of any engagement.

// TALK TO US

Want to tighten the identity perimeter before it becomes an incident?

Get in touch — we’ll route your case to the operators who have done this kind of work before.

or call +31 (0)318 543173