Where we are. Where we're going.
ascendcore.ai is in private beta. Here's what's live today, what ships next, and where the platform is headed by 2027.
- SOC-2 Type II certification — full audit report available to enterprise prospects
- ServiceNow ITSM — bi-directional incident sync and change management automation
- CrowdStrike Falcon — real-time endpoint isolation and device compliance enforcement
- AWS IAM — scoped role grants, policy management, and access key lifecycle
- Multi-tenant admin console — manage multiple customer environments from one pane
- Runbook marketplace — shared community library with one-click import
SOC-2 Type II report + ISO 27001 alignment — satisfies enterprise procurement requirements
ServiceNow: auto-create incidents, sync resolution status, attach full audit trail
CrowdStrike: device isolation on confirmed threat, compliance gating before access grants
AWS IAM: scoped role assignment, policy attachment, and access key rotation runbooks
Multi-tenant console: partner and MSP support with per-tenant RBAC and billing
Community runbook marketplace: publish, import, and version-lock shared playbooks
99.9% uptime SLA with dedicated support tier for enterprise accounts
- AI Workflow Builder — low-code canvas for building runbooks without YAML
- Google Workspace connector — Gmail, Drive, and Meet provisioning
- SIEM export — Splunk HEC and Microsoft Sentinel real-time streaming
- Audit log retention policy — configurable from 90 days to 7 years
Drag-and-drop workflow canvas with 40+ pre-built action blocks — no YAML required
AI next-step suggestions in canvas based on existing runbook library and ticket history
Google Workspace: account provisioning, group management, Drive sharing, Meet access
Real-time SIEM export to Splunk HEC and Microsoft Sentinel
Configurable audit log retention (90d → 7yr) to meet compliance requirements
Rollback engine: pre-execution system snapshots + one-click undo for all runbook actions
PagerDuty alert routing: auto-acknowledge low-severity, escalate high-severity
- Documentation portal — self-serve runbook authoring guides and API reference
- Status page — live uptime and connector health at status.ascendcore.ai
- Human-in-the-Loop 2.0 — configurable per-step approval gates per runbook
- Analytics dashboard live — real deflection rate, resolution time, and labor cost savings
Public docs site: runbook DSL reference, integration setup guides, API reference
Live status page with connector-level health indicators and incident history
HITL 2.0: per-step approval gates with Slack DM and email — not just per-runbook
Configurable HITL thresholds: auto-approve low-risk, require approval for privileged actions
Analytics dashboard goes live: real deflection rate, resolution time, and labor cost savings
Knowledge serving: Confluence and SharePoint connectors wired to live RAG pipeline
Runbook YAML editor: inline schema validation and autocomplete
- SOC-2 Type I — starting Vanta/Drata certification process (~90 days to report)
- Microsoft 365 — license assignment and mailbox provisioning runbooks
- New Employee Provisioning — M365 + Okta combined onboarding runbook
- Jira Service Management — bi-directional ticket sync and auto-close on resolution
SOC-2 Type I: Vanta/Drata onboarding, control mapping, and 90-day evidence collection
M365: license assignment, mailbox provisioning, distribution list management
New Employee Provisioning runbook: M365 + Okta + Slack provisioned in parallel
Jira SM: auto-create ticket on request, close on resolution, attach audit trail
Email notifications via Resend: target user + admin audit copy on every action
Datadog / PagerDuty alert webhook: auto-ack low severity, escalation cards for critical
Fix integration connect buttons: Jira, Duo Security, and M365 wizard flows
Design partner LOI signed — #1 unlock for investor conversations
- Four automations live end-to-end: MFA reset, password reset, account unlock, and account offboarding
- Microsoft Teams bot — full HITL parity with Slack, Adaptive Card approve/deny flows
- Microsoft Entra ID connector — account unlock via Graph API, resolves in under 90 seconds
- Admin dashboard — live approval queue, activity feed, and source tracking across Slack and Teams
MFA reset (Okta): intent classified via Claude Haiku, HITL-gated, factor cleared and re-enrollment sent on approval
Password reset (Okta): admin approve/deny from Slack, Teams, or dashboard — Okta temp password set on approval
Account unlock (Entra ID): Graph API enableAccount call, resolves in under 90 seconds end-to-end
Account offboarding (Okta): user deactivation + group removal, HITL-gated with full audit trail
Microsoft Teams bot: registered in Azure (Bot Framework), JWT-verified, Adaptive Card HITL with approve/deny
All four automations available from Slack slash commands and Teams bot chat — identical approval flow in both
Source tracking: every request tagged as 'slack' or 'teams' through the full pipeline — visible in dashboard and audit log
Admin dashboard: live approval queue with confidence scoring, completed history, 5-scenario interactive walkthrough
Guided onboarding wizards: step-by-step credential setup for Okta, Entra ID, M365, Teams, Jira, and Duo Security
Lead capture and demo access flow — prospects get dashboard access in under 5 minutes
Claude Haiku classifier: 94%+ accuracy on identity requests; skips intent detection for plain email inputs
Teams Adaptive Card submit routing: fixed Action.Submit to route through handleInvoke, not handleMessage
Serverless function lifecycle extended via next/server after() to keep async Slack and Teams work alive post-response