+45 70 270 570 sales@itsmcompany.net


Security & Compliance


We deliver unmatched security and compliance and are the perfect match if you work in regulated industries.

Safe harbor – leverage security and compliance from your Microsoft data center and DPA

Security and compliance are probably not the first things you think of when looking for a new ITSM tool, but it’s essential today.

Security is comprehensive. As the person in charge, you need to be aware of the following:

  • The technical safeguarding of your data
  • Where are the data located
  • How is the logical security
  • Can I get my data at all times
  • Regulatory compliance regulations

In the end, will my ITSM cloud provider provide sufficient security?

Again, with ITSM360, you are in a safe harbor.

Microsoft invests in cloud security as newer before, and ITSM360 adapts to these programs and plans.

You won’t find other ITSM cloud providers that match what Microsoft and ITSM360 can do for you concerning securing your ITSM data.

ITSM360 Microsoft Security Response Center 3

Key facts




Governed by your policies

ITSM360 ties into your Microsoft cloud stack and adapts to your security/compliance plans and settings.

This eases your administrative burdens, reduces risk, and makes it transparent for your team.

A part of your Azure AD

ITSM360 is connected to your Azure AD as all other Teams and SharePoint Online apps.

So you don’t need to worry about setting up single sign-on and using existing security groups for ITSM.

The direct use of the AD for controlling users and app permissions is the foundation of world-class ITSM security.

Data located in your Microsoft tenant

Our philosophy is straightforward. We don’t want to execute or store your ITSM data. Instead, it must run inside your Microsoft tenant, which is what we do with ITSM360.

Microsoft Datacenter Map

Microsoft Datacenter Map


ITSM360 apps

Given that ITSM360 is a Microsoft Office-based ITSM solution, you need to upload a few SharePoint and Teams app files into your app catalog.

App authentication follows best practices and uses the Microsoft identity platform. In short, app permission is required inside your AD, standardized and well documented.

See more -> Microsoft quick start

Microsoft 365 Security

Microsoft 365 is a very secure platform for businesses in all industries, and as a developer, we rely on security offerings from Microsoft. The Microsoft 365 integrated security is built on four pillars:

  1. Identify and access management
  2. Threat protection
  3. Information protection
  4. Security management

According to independent analysts like Gartner Group and Forrester, Microsoft is a leading security company. Microsoft Security is a Leader in four Gartner® Magic Quadrant™ reports