Skip to main content
Hero
Looking for the Portal? Visit app.petrasecurity.com.

Getting started

The first step is to get access to Petra. You can request access here.

Get Access

Next Steps

About Us

Learn more about Petra Security and how we detect and protect against M365 attacks.

Read our Research

We share detection research and insights weekly.

Remediate an Incident

Remediate an incident and one-click remove persistence mechanisms, whether real-time or for a BEC IR case.

Investigate Behavior

Investigate what an attacker did/accessed. Then, dig into benign behavior like benign proxy/VPN use and failed attacks.