Investigate & automate usage management
elba provides a comprehensive third-party application inventory accessible through your admin dashboard at www.elba.security/dashboard/security/third-party-apps/inventory
Building your application inventory
- Centralised Registry: view all discovered applications in a single interface
- Status Management: mark applications as allowed, denied, or under review
- Detailed Application Profiles: Access comprehensive information for each application including :
- Permissions and scopes requested
- Connected user accounts
- Risk assessment details
- Publisher information and verification status
Advanced filtering & search
Filter your application inventory by:
- Application Status: View allowed, denied, or pending review applications
- Category: Filter by application type and function
- Hosting Location: Filter by geographic hosting regions
- Security Indicators: Applications with CVEs or historical data breaches & by risk level
- Compliance Status: Filter by HIPAA, GDPR, PCI DSS, and other compliance standards
Automate notifications & usage remediation
elba's automated playbook system enables consistent, scalable responses to third-party application risks:
Ask employees to review oAuth grants
- Compatible sources : Microsoft 365, Google Workspace, Github, Dropbox
- Provide employees with a list of applications that they have connected through an oAuth grant. They can decide to either delete the applications’ permissions or keep using it & ignore the issue.
Get an alert when a new vulnerability is discovered
- Compatible sources : all sources
- elba monitors applications used by employees 24/7 & notifies you when a new vulnerability puts your at risk
Get an alert when a new data breach is discovered
- Compatible sources : all sources
- elba monitors applications by employees 24/7 & notifies you when a new data breach affects one of them

