Inventory & automated usage management

Investigate & automate usage management

elba provides a comprehensive third-party application inventory accessible through your admin dashboard at www.elba.security/dashboard/security/third-party-apps/inventory

Building your application inventory

  • Centralised Registry: view all discovered applications in a single interface
  • Status Management: mark applications as allowed, denied, or under review
  • Detailed Application Profiles: Access comprehensive information for each application including :
    • Permissions and scopes requested
    • Connected user accounts
    • Risk assessment details
    • Publisher information and verification status

Advanced filtering & search

Filter your application inventory by:

  • Application Status: View allowed, denied, or pending review applications
  • Category: Filter by application type and function
  • Hosting Location: Filter by geographic hosting regions
  • Security Indicators: Applications with CVEs or historical data breaches & by risk level
  • Compliance Status: Filter by HIPAA, GDPR, PCI DSS, and other compliance standards

Automate notifications & usage remediation

elba's automated playbook system enables consistent, scalable responses to third-party application risks:

Ask employees to review oAuth grants

  • Compatible sources : Microsoft 365, Google Workspace, Github, Dropbox
  • Provide employees with a list of applications that they have connected through an oAuth grant. They can decide to either delete the applications’ permissions or keep using it & ignore the issue.

Get an alert when a new vulnerability is discovered

  • Compatible sources : all sources
  • elba monitors applications used by employees 24/7 & notifies you when a new vulnerability puts your at risk

Get an alert when a new data breach is discovered

  • Compatible sources : all sources
  • elba monitors applications by employees 24/7 & notifies you when a new data breach affects one of them