New updates have been reported about ControlMonkey.
Claim 55% Off TipRanks
- Unlock hedge fund-level data and powerful investing tools for smarter, sharper decisions
- Discover top-performing stock ideas and upgrade to a portfolio of market leaders with Smart Investor Picks
ControlMonkey has introduced an Identity Disaster Recovery solution designed to restore identity and access configurations when core identity providers are compromised, positioning the company more centrally in cloud resilience and governance budgets. The platform now supports major providers such as Okta, Microsoft Entra ID, OneLogin, Ping Identity and JumpCloud, extending ControlMonkey’s existing infrastructure and network recovery tools into the identity layer that governs access to production, SaaS and internal systems.
By taking automated daily snapshots of critical identity settings, including SSO configurations, MFA policies, app assignments, access rules and directory structures, ControlMonkey allows organizations to rapidly re-establish access without manual rebuilds under pressure. The system provides centralized visibility into identity recovery readiness, a quantified resilience score across infrastructure, network, observability and identity, and continuous monitoring to detect configuration drift, which collectively strengthens compliance posture and reduces operational risk.
This move directly targets a structural weakness in many enterprises’ disaster recovery strategies, where identity systems are often managed outside code-based workflows and excluded from regular DR testing, despite only a minority of organizations running semiannual recovery drills. By enabling cross-layer dependency recovery between identity, cloud infrastructure, SaaS applications and related resources, ControlMonkey aims to reduce downtime, minimize business disruption from cyberattacks or misconfigurations and make its platform more strategic to security and platform leaders.
CEO and Co-founder Aharon Twizer framed the launch as an effort to unify fragmented disaster recovery practices, arguing that recovery must focus on regaining control of access rather than just restoring systems in isolation. For executives, the new capabilities suggest potential savings on manual recovery labor, tighter alignment between security and operations teams, and a stronger rationale for consolidating DR and governance spend onto ControlMonkey’s IaC automation platform as identity threats and AI-driven configuration risks continue to increase.

