Xero
Import bank transactions and identify technology spend automatically
OTIS connects to Xero via OAuth 2.0 and imports up to 12 months of bank transactions. It automatically classifies every technology vendor — SaaS subscriptions, cloud infrastructure, telecom contracts, hardware purchases — and maps them to OTIS assets for analysis.
- →Bank transactions up to 12 months
- →Vendor and payee names with spend amounts
- →Transaction frequency to infer billing cycles
- →Line item descriptions for classification context
Connect in under 2 minutes via your Xero login. OTIS requests read-only access to bank transactions — it cannot create, modify, or delete any Xero data.
Most organisations have no idea what they spend on technology in aggregate. Xero holds the answer. OTIS reads it, classifies it, and turns it into actionable intelligence without any manual data entry.
Microsoft Azure AD
Track Microsoft 365 licence utilisation and identify inactive users
OTIS connects to Microsoft Entra ID (Azure AD) and pulls aggregated usage data for every Microsoft 365 product — Teams, Exchange, SharePoint, OneDrive, and more. It identifies inactive licences and surfaces them as findings with estimated annual savings.
- →Active user counts per Microsoft 365 product
- →Inactive licence identification across all products
- →Assigned vs active users (utilisation rate)
- →Sign-in activity over 7, 30, or 90 day periods
Connect via Microsoft OAuth. OTIS requests Reports.Read.All — aggregated usage data only. No access to emails, files, or individual user content.
Microsoft 365 is one of the largest technology line items for most organisations. Licence waste — users who have left, roles that changed, products nobody uses — is common and rarely audited. OTIS surfaces it automatically.
Okta
See which Okta-managed apps are underused and reclaim wasted licences
OTIS connects to your Okta organisation and imports user counts and application assignments. It cross-references active users against purchased licences for every Okta-managed application — Slack, Zoom, Notion, Salesforce, and hundreds more — flagging underutilised tools.
- →Total, active, and inactive user counts
- →All application assignments across the organisation
- →Licence utilisation rate per Okta-managed app
- →Inactive accounts still consuming paid licences
Connect via Okta OAuth. OTIS requests read-only access to users and application data. No write permissions, no ability to modify access or provisioning.
Okta is the single source of truth for who has access to what in most organisations. OTIS uses that data to answer the question no one else is asking: are you paying for access that nobody uses?
Google Drive
Store all encrypted OTIS data in your own Google Drive
OTIS can store all encrypted client data in a dedicated folder in your Google Drive. All data is encrypted with your client key before leaving OTIS — Google sees only encrypted ciphertext. This satisfies data residency requirements and ensures your data never lives on OTIS servers.
- →Encrypted assets, findings, and intelligence reports
- →Automatic folder creation on first use
- →Compatible with Google Workspace accounts
- →Migrate from other storage providers at any time
Connect via Google OAuth during account activation. OTIS requests drive.file scope — access only to files OTIS creates. No access to existing Drive contents.
Data residency and sovereignty requirements are increasingly common, particularly in financial services, healthcare, and public sector. Google Drive storage means your data stays in your Google environment, under your control.
Microsoft OneDrive
Store encrypted OTIS data in your Microsoft OneDrive
OTIS can store all encrypted client data in a dedicated folder in your OneDrive or Microsoft 365 environment. All data is encrypted with your client key before upload — Microsoft sees only encrypted ciphertext.
- →Encrypted assets, findings, and intelligence reports
- →Compatible with personal OneDrive and Microsoft 365
- →Works with SharePoint via Microsoft Graph
- →Migrate from other storage providers at any time
Connect via Microsoft OAuth during account activation. OTIS requests Files.ReadWrite scope — limited to files OTIS creates. No access to existing OneDrive contents.
Organisations already standardised on Microsoft 365 often prefer to keep all data within the Microsoft ecosystem. OneDrive storage satisfies this while maintaining the no-look guarantee.
Amazon S3 / MinIO
Store encrypted OTIS data in your own S3 bucket or self-hosted MinIO
For organisations with existing AWS infrastructure or self-hosted storage requirements, OTIS supports any S3-compatible storage including Amazon S3, Cloudflare R2, and self-hosted MinIO.
- →Compatible with Amazon S3, Cloudflare R2, MinIO
- →Custom bucket, region, and key prefix
- →AWS Signature V4 authentication
- →Custom endpoint support for private deployments
Enter your bucket name, region, access key, and secret key during activation. OTIS validates the connection before completing setup.
Engineering-led organisations often prefer S3 storage for auditability, cost efficiency, and integration with existing infrastructure. S3 storage gives full control over retention, versioning, and access policies.
Ready to connect
your tools?
All integrations included. Activate your instance in under 10 minutes.