Act Now - Protect Your Business!

Dear Customer,

acSenSe began deployment of the latest Production Release on February 2023.

Generally Available Features

  • New phase for our Identity Access Investigation Platform. The next step in incident investigation is getting back to the desired security posture is remediation.
    • Now available with acSenSe , ability to recover deleted or modified objects from any available point in time.
    • The recovery process is available for the following entity types:
      • Users
      • Groups (support for Okta groups only)
      • Identity Providers
      • Group Rules
      • Applications
      • User Roles and Groups Roles (support for deleted objects only)
      • Policies: MFA, Password Sign-on (without support for policy rules)
      • Zones

Generally Available Enhancements

  • Identity Access Investigation Platform enhancements for more robust entities’ relationship visibility, for more transparent incident investigation.


  • Security fixes
  • UI search improvements.
Okta api security-acsense
Brendon Rod

How to Secure Your OKTA API

OKTA is by far one of the most widely-used application programming interfaces for cloud identity and access management. But many users mistakenly assume that it

We are accSenSe Team

Digital Identity Resilience is crucial to bouncing back from cyber-attacks quickly, fixing a human error, and managing change. accSenSe will provide strategic value for your IT. Diagnose and remediate posture changes within your IAM system. Get back to business as usual within hours and ensure business loss is kept to a minimum. Low RPO and high granularity, Keeping data retention to a maximum. Handle change and growth safely and securely, avoid misconfiguration.


In a time where Ransomware attacks and account takeovers are growing fast, Cloud Data is at ever-increasing risk.


Regain Control over your SaaS systems following a cyber attack.


Cloud apps are dominating the software industry. Companies hold their most valuable data in these apps.


Recover not only SaaS data but also the SaaS configuration and setup.


Cloud vendors are legally unbounded from protecting the cloud data with the shared responsibility model.

Business as Usual

With Adjustable RPO and a low RTO, you can be back in business in no time.