ControlMonkey has introduced a new Identity Disaster Recovery solution designed to help organizations quickly restore access and regain control when identity systems are compromised. The platform supports major identity providers such as Okta, Microsoft Entra ID, OneLogin, Ping Identity, and JumpCloud, enabling recovery across infrastructure, networking, and identity layers that govern access to critical systems.
Identity providers play a central role in enterprise operations, controlling access to production environments, SaaS applications, and internal systems. However, many organizations still manage identity configurations manually and often exclude them from disaster recovery planning. This gap leaves businesses vulnerable during cyberattacks, ransomware incidents, or even misconfigurations caused by human error or automated systems.
ControlMonkey’s new solution addresses this risk by automatically capturing daily snapshots of key identity configurations, including single sign-on (SSO) settings, multi-factor authentication (MFA) policies, access rules, and directory structures. These snapshots allow organizations to restore access quickly without relying on manual intervention during high-pressure situations. The platform also delivers centralized visibility into recovery readiness, helping security teams assess resilience, identify gaps, and maintain compliance across identity and infrastructure environments.
Unlike traditional identity backup tools that focus only on data, ControlMonkey’s approach extends across the entire cloud control plane. It preserves dependencies between identity systems, infrastructure, and applications, ensuring that both systems and access can be restored together. Additional capabilities include automated configuration recovery, continuous monitoring to detect configuration drift, cross-layer dependency restoration, and a “Resilience Score” that provides insight into overall recovery preparedness.
Aharon Twizer, CEO and Co-founder of ControlMonkey, emphasized the importance of identity in modern environments, noting that recovery is not just about restoring systems but regaining operational control. The company positions this launch as a step toward more unified and automated disaster recovery strategies in increasingly complex cloud ecosystems.
Recommended Cyber Technology News :
- Check Point Flags VECT 2.0 Ransomware as Data Wiper
- Trigona Ransomware Uses Custom Tool for Data Exfiltration
- Rapid7 Says Kyber Ransomware Tests Post-Quantum Encryption
To participate in our interviews, please write to our CyberTech Media Room at info@intentamplify.com
🔒 Login or Register to continue reading





