Interview: Intel Discusses Expressway Cloud Access 360

Intel’s Cloud Access 360 Leads the Way

In an exclusive interview with Intel on Friday, March 25th, CloudTweaks.com spoke with Vikas Jain as a follow-up to Intel’s announced Expressway Cloud Access 360 at Cloud Connect. Vikas Jain is the Director of Product

Management for Application Security and Identity Products with Intel Corporation and has over 16 years experience in the software and services market, with particular expertise in cloud security, identity and access management, and application architecture. Prior to joining Intel, Vikas has held leadership roles in product management and software development at a wide-range of technology companies including Oracle, Oblix, Wipro and Infosys.

You can follow him on twitter @ VikasJainTweet

Anthony: Thanks for taking the time to speak with Cloudtweaks.com today and appreciate you taking the time to help educate our readers about Cloud Access 360.

Vikas: You are welcome Anthony. Appreciate the opportunity to speak with CloudTweaks.

Anthony: Let’s start with a quick overview of CloudAccess 360 if you would.

Vikas: Certainly. Last October Intel introduced their Cloud 2015 Vision. We indicated that the cloud would be Federated, Automated and Client Aware.  Intel® Expressway Cloud Access 360 is a software product that enables federated access from enterprise to the cloud and vice-versa. It bundles provisioning, federated single sign-on(SSO), strong authentication, and client aware access control – all into a one packaged solution providing control, visibility and compliance to enterprises adopting cloud SaaS applications. The group is working together to prototype, pilot and build reference architectures, which address these issues.

Anthony: So Cloud Access 360 addresses all of these issues?

Vikas: Yes, Cloud Applications are enabling new business models and I.T. Models through hosted and scalable applications, yet the adoption among enterprises is slow due to the fact that they are worried about security concerns especially about loss of control, lack of visibility and adherence to regulatory compliance.

Anthony: How does this impact users?

Vikas: Today users often set-up accounts with weak passwords that are disconnected from the corporate identity infrastructure. This can lead to sensitive data leakage and compliance risks.

Anthony: What about Administrators. Aren’t they able to detect this?

Vikas: The lack of standardized logs has blocked administrators from monitoring or correlating cloud user activity with internal audit requirements in many cases.

Anthony: So, Cloud 360 addresses all of these issues with one product?

Vikas: Yes, until all requirements can be met with one product, Corporations will be hesitant to move beyond simple pilots or tightly controlled private clouds. They needed a broad set of solutions that addressed the full life cycle of access requirements. These solutions would have to be all standards based, integrated with corporate identity management infrastructure and accessible from any client, network or remote cloud platform. Since Intel has a special relationship with hardware OEM & ISV’s we were able to develop a unique solution for complete and secure access to the cloud. We connect the browsers, client and the web service.

Anthony: So Cloud Access 36o provides a hosted platform, which meets all requirements.

Vikas: Yes, our Intel Expressway 360 leads the way to secure enterprise access to the cloud and is a hosted solution to protect Enterprise solutions deployed in the cloud. It’s an approach built on proven technologies and backed by a consortium of players.

Anthony: So, what about users. Does this preclude any manual provisioning of accounts.

Vikas: The provisioning of accounts is seamlessly pushed from the enterprise to all cloud applications, which are authorized for corporate use with full privacy controls. So any cloud session is completely secure whether it is from a browser, any network or even other Internet Identity accounts such as Facebook.

Anthony: What about Administration?

Vikas: 360 Access control allows Administrators to use a single Admin console where the role, entitlements and policies are authored and enforced. Compliance is delivered with a one time password & strong authentication. They can monitor user activity and deliver API access across cloud platforms.

Anthony: Very impressive and elegant solution.

Vikas: It will provide ubiquitous access, enterprise class secure, regain control visibility compliance for the cloud.

Anthony: Thank Vikas. Cloudtweaks appreciates your time very much.

In our discussions Vikas also discussed how this will also impact small to mid-size businesses with Nordic Edge’s Opacus, an on demand identity service solution.  For additional information related to Intel’s Cloud Computing Vision and product offerings visit the URL links below.

http://www.dynamicperimeter.com/?partnerref=360chipshot
http://www.cloudconnectevent.com/
http://ipt.intel.com/welcome.aspx
http://www.nordicedge.se/
http://www.lntinfotech.com/news_events/Cloud_Connect_2011.aspx
http://www.financialforce.com/

About Intel

Intel is the world’s leader in silicon innovation, develops technologies, products, and initiatives to continually advance how people work and live. Founded in 1968 to build semiconductor memory products, Intel introduced the world’s first microprocessor in 1971.

Additional information

Intel® Expressway Cloud Access 360 is a software product that enables federated access from enterprise to the cloud and vice-versa. It bundles provisioning, federated single sign-on(SSO), strong authentication, and client aware access control – all into a one packaged solution providing control, visibility and compliance to enterprises adopting cloud SaaS applications. Part of Intel Cloud Builders program’s cloud security-enhancing reference architecture, it helps further Intel’s Cloud 2015 Vision that the cloud would be federated, automated and client aware.

By Anthony Park

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…