NOVEMBER 2022 – Gartner named acSenSe a Gartner Cool Vendor in identity-first security. 

Act Now - Protect Your Business!

NOVEMBER 2022 – Gartner named acSenSe a Gartner Cool Vendor in identity-first security.

“This announcement further acknowledges that there is a gap in IAM when it comes to disaster recovery and business continuity and we are excited to have this opportunity to innovate and bring solutions to this major problem.”

Muli Motola, Co-founder and CEO

Read on to learn about:

  • The characteristics of a Gartner Cool Vendor
  • The rise of identity access related attacks on companies
  • Why Gartner named acSenSe a Cool Vendor
  • Why it’s costly for businesses to do nothing

What Is a Gartner Cool Vendor?

According to Gartner, a Cool Vendor must be considered innovative or transformative for products, services or initiatives.

The criteria by which a vendor is defined as “cool” are: innovative, impactful, or intriguing products, services, or initiatives. The vendor is innovative if its offerings allow users to do things they could not do prior. It is impactful if its offerings have or will have a business impact; they are not merely ‘technology for the sake of technology.’

The vendor is intriguing if it has captured Gartner’s interest or curiosity during the past six months.

How Are Identity-Related Attacks Rising?

According to the 2022 Trends in Securing Digital Identities Report, 84% of organizations reported suffering an identity-related breach within the last year. Identity-related attacks are rising due to the rise of hackers targeting companies. 

Look at this story concerning the 0ktapus gang. It will highlight the importance of having an IAM recoverability solution.

A hacking gang called 0ktapus aimed to compromise thousands of accounts at over 130 organizations. 0ktapus launched phishing sites to acquire Okta identity credentials and multi-factor authentication (MFA) codes, and organizations thought their critical SasS were protected in the cloud. But, it was a misconception because, according to CISA (Cloud Security alliance) Cloud, customers are responsible for their data. Therefore, the organizations needed a solution that provided continuous access to continuity and disaster recovery capabilities.

Why Is acsense a Gartner Cool Vendor?

It is acsense’s innovative and comprehensive approach to maintaining cloud identity infrastructure security that has caught the attention of many organizations, such as Gartner.

We are a Gartner Cool Vendor for the following reasons.

Fortifies Identity Access Management Systems

A cloud Identity Access Management (IAM) system represents an organization’s largest attack vector. It is a single point of failure, and it would be incredibly determinantal if it compromised and the organization could not recover. Fortunately, acSenSe shields businesses from the complete loss of their IAM by offering a quick and easy-to-use one-click recovery solution. This solution gives organizations access to their IAM within minutes, helping them dodge the pain of rebuilding their IAM from the ground up, dealing with downtime costs, and forgoing business continuity.

Offers Enterprise Capabilities for System Management

We provide Okta customers with both workforce and customer IAM needs with a single platform for proactive protection and real-time access management. The acSenSe platform is designed to make your IAM system resilient, with features such as one-click restore, constant verification of backed-up data, periodic testing for keeping the backup up-to-date, and the ability to identify changes between different PiTs (Points in Time).

Low RPO and Low RTO combined with any-point-in-time recovery that acsense’s tools provide result in maximum data retention and peace of mind for security and risk management leaders responsible for IAM.

Why Is It Costly To Do Nothing?

According to the Identity Defined Security Alliance Report, 78% of businesses experienced direct impacts from a breach, such as recovery costs and reputational damage. From the same report, 96% of respondents believed they could have prevented or minimized security breaches if they had implemented specific identity-related security outcomes.

To conclude, being a Gartner Cool Vendor is significant for acSenSe because we are paving the way in critical SaaS resilience against IAM outages.

Contact us today to learn how we can help you.

View the full press release on PRnewswire


Gartner subscribers can view the entire report at:
Published November 17, 2022, the Gartner Cool Vendors™ in Identity-First Security report stated, “These Cool Vendors demonstrate innovative ways of identifying real-time security risks, remediating identity threats, and avoiding system outages.”
Gartner, “Cool Vendors in Identity-First Security” by Brian Guthrie, Henrique Teixeira, Paul Rabinovich, Felix Gaehtgens, Michael Kelley and David Chase, November 17, 2022
GARTNER and COOL VENDORS are registered trademarks and service marks of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Okta api security-acsense
Brendon Rod

How to Secure Your OKTA API

OKTA is by far one of the most widely-used application programming interfaces for cloud identity and access management. But many users mistakenly assume that it

We are accSenSe Team

Digital Identity Resilience is crucial to bouncing back from cyber-attacks quickly, fixing a human error, and managing change. accSenSe will provide strategic value for your IT. Diagnose and remediate posture changes within your IAM system. Get back to business as usual within hours and ensure business loss is kept to a minimum. Low RPO and high granularity, Keeping data retention to a maximum. Handle change and growth safely and securely, avoid misconfiguration.


In a time where Ransomware attacks and account takeovers are growing fast, Cloud Data is at ever-increasing risk.


Regain Control over your SaaS systems following a cyber attack.


Cloud apps are dominating the software industry. Companies hold their most valuable data in these apps.


Recover not only SaaS data but also the SaaS configuration and setup.


Cloud vendors are legally unbounded from protecting the cloud data with the shared responsibility model.

Business as Usual

With Adjustable RPO and a low RTO, you can be back in business in no time.