Act Now - Protect Your Business!

Closing The Gap In Identity And Access Management

In today’s digital age, organizations rely heavily on Identity and Access Management (IAM) solutions to secure access to critical SaaS applications.

However, the increase in data breaches, human error, and insider threats has highlighted the gap in IAM that exists between disaster recovery and business continuity. Recognizing this gap, acsense has developed an enterprise-ready business continuity platform for Okta that helps organizations maintain secure access to critical SaaS applications following any cyberattack or misconfiguration.

acsense, which was founded in 2020 by Dell EMC veterans, recently announced that it has raised $5 million in seed funding.

The funding round was led by Joule Ventures, a US-based partner-only seed fund, and included participation from Gefen Capital, Fusion, and independent investors. The funding will be used to expand the acSenSe platform to other IAM vendors and to accelerate new market expansion and hiring. According to IDC, 83% of companies encountered an access-related breach in 2021.
However, most Identity Access Management systems do not provide out-of-the-box backup and disaster recovery features or options.

The acSenSe platform is designed to make systems secure and resilient, with features such as:

  • One-click FULL tenant recovery
  • Fail-over access to a secondary tenant
  • Identify and investigate changes between different PiTs (Points in Time)
  • Low RTO and RPO ~10 mins
  • Infinite retention


The acSenSe Platform provides an air-gapped, reliable architecture.

This enables organizations to protect their data assets and ensure business continuity, even in the face of sophisticated attacks. “acsense’s continuous access and business continuity solution for Okta is changing how organizations think about disaster planning and recovery,” said Brian Rosenzweig, co-founder and partner at Joule Ventures. “With technology built to harden systems, mitigate downtime, and reduce costs, we’re extremely bullish on acSenSe’s potential to break into the mainstream cybersecurity market and become an essential solution for organizations of all sizes.”

Earlier this year, acSenSe was recognized as a Gartner Cool Vendor in Identity-First Security. 

This recognition is a testament to the innovative and effective solution that acsense has developed to address the gap in IAM that exists between disaster recovery and business continuity. At acsense, we are committed to protecting and recovering critical SaaS with our state-of-the-art continuous access and business continuity platform.  Our platform is designed to make your IAM system resilient, with features such as one-click recovery, constant verification of backed-up data, periodic testing for keeping the backup up-to-date, and the ability to identify changes between different PiTs (Points in Time).

We understand that the threat landscape is constantly evolving, and we are dedicated to ensuring that every IAM solution has optimal accessibility, maximum uptime, and next-level operational efficiency.

With the support of our investors, we are confident that we can accelerate our journey to ensure organizations have the secure access to critical SaaS applications they need for access and business continuity.

For more information on acsense, get in touch or follow us on Linkedin.

Okta api security-acsense
Okta
Brendon Rod

How to Secure Your OKTA API

OKTA is by far one of the most widely-used application programming interfaces for cloud identity and access management. But many users mistakenly assume that it

We are accSenSe Team

Digital Identity Resilience is crucial to bouncing back from cyber-attacks quickly, fixing a human error, and managing change. accSenSe will provide strategic value for your IT. Diagnose and remediate posture changes within your IAM system. Get back to business as usual within hours and ensure business loss is kept to a minimum. Low RPO and high granularity, Keeping data retention to a maximum. Handle change and growth safely and securely, avoid misconfiguration.

Threat

In a time where Ransomware attacks and account takeovers are growing fast, Cloud Data is at ever-increasing risk.

Identify

Regain Control over your SaaS systems following a cyber attack.

Data

Cloud apps are dominating the software industry. Companies hold their most valuable data in these apps.

Recover

Recover not only SaaS data but also the SaaS configuration and setup.

Resilience

Cloud vendors are legally unbounded from protecting the cloud data with the shared responsibility model.

Business as Usual

With Adjustable RPO and a low RTO, you can be back in business in no time.