Interview: Intel Discusses Expressway Cloud Access 360

Intel’s Cloud Access 360 Leads the Way

In an exclusive interview with Intel on Friday, March 25th, CloudTweaks.com spoke with Vikas Jain as a follow-up to Intel’s announced Expressway Cloud Access 360 at Cloud Connect. Vikas Jain is the Director of Product

Management for Application Security and Identity Products with Intel Corporation and has over 16 years experience in the software and services market, with particular expertise in cloud security, identity and access management, and application architecture. Prior to joining Intel, Vikas has held leadership roles in product management and software development at a wide-range of technology companies including Oracle, Oblix, Wipro and Infosys.

You can follow him on twitter @ VikasJainTweet

Anthony: Thanks for taking the time to speak with Cloudtweaks.com today and appreciate you taking the time to help educate our readers about Cloud Access 360.

Vikas: You are welcome Anthony. Appreciate the opportunity to speak with CloudTweaks.

Anthony: Let’s start with a quick overview of CloudAccess 360 if you would.

Vikas: Certainly. Last October Intel introduced their Cloud 2015 Vision. We indicated that the cloud would be Federated, Automated and Client Aware.  Intel® Expressway Cloud Access 360 is a software product that enables federated access from enterprise to the cloud and vice-versa. It bundles provisioning, federated single sign-on(SSO), strong authentication, and client aware access control – all into a one packaged solution providing control, visibility and compliance to enterprises adopting cloud SaaS applications. The group is working together to prototype, pilot and build reference architectures, which address these issues.

Anthony: So Cloud Access 360 addresses all of these issues?

Vikas: Yes, Cloud Applications are enabling new business models and I.T. Models through hosted and scalable applications, yet the adoption among enterprises is slow due to the fact that they are worried about security concerns especially about loss of control, lack of visibility and adherence to regulatory compliance.

Anthony: How does this impact users?

Vikas: Today users often set-up accounts with weak passwords that are disconnected from the corporate identity infrastructure. This can lead to sensitive data leakage and compliance risks.

Anthony: What about Administrators. Aren’t they able to detect this?

Vikas: The lack of standardized logs has blocked administrators from monitoring or correlating cloud user activity with internal audit requirements in many cases.

Anthony: So, Cloud 360 addresses all of these issues with one product?

Vikas: Yes, until all requirements can be met with one product, Corporations will be hesitant to move beyond simple pilots or tightly controlled private clouds. They needed a broad set of solutions that addressed the full life cycle of access requirements. These solutions would have to be all standards based, integrated with corporate identity management infrastructure and accessible from any client, network or remote cloud platform. Since Intel has a special relationship with hardware OEM & ISV’s we were able to develop a unique solution for complete and secure access to the cloud. We connect the browsers, client and the web service.

Anthony: So Cloud Access 36o provides a hosted platform, which meets all requirements.

Vikas: Yes, our Intel Expressway 360 leads the way to secure enterprise access to the cloud and is a hosted solution to protect Enterprise solutions deployed in the cloud. It’s an approach built on proven technologies and backed by a consortium of players.

Anthony: So, what about users. Does this preclude any manual provisioning of accounts.

Vikas: The provisioning of accounts is seamlessly pushed from the enterprise to all cloud applications, which are authorized for corporate use with full privacy controls. So any cloud session is completely secure whether it is from a browser, any network or even other Internet Identity accounts such as Facebook.

Anthony: What about Administration?

Vikas: 360 Access control allows Administrators to use a single Admin console where the role, entitlements and policies are authored and enforced. Compliance is delivered with a one time password & strong authentication. They can monitor user activity and deliver API access across cloud platforms.

Anthony: Very impressive and elegant solution.

Vikas: It will provide ubiquitous access, enterprise class secure, regain control visibility compliance for the cloud.

Anthony: Thank Vikas. Cloudtweaks appreciates your time very much.

In our discussions Vikas also discussed how this will also impact small to mid-size businesses with Nordic Edge’s Opacus, an on demand identity service solution.  For additional information related to Intel’s Cloud Computing Vision and product offerings visit the URL links below.

http://www.dynamicperimeter.com/?partnerref=360chipshot
http://www.cloudconnectevent.com/
http://ipt.intel.com/welcome.aspx
http://www.nordicedge.se/
http://www.lntinfotech.com/news_events/Cloud_Connect_2011.aspx
http://www.financialforce.com/

About Intel

Intel is the world’s leader in silicon innovation, develops technologies, products, and initiatives to continually advance how people work and live. Founded in 1968 to build semiconductor memory products, Intel introduced the world’s first microprocessor in 1971.

Additional information

Intel® Expressway Cloud Access 360 is a software product that enables federated access from enterprise to the cloud and vice-versa. It bundles provisioning, federated single sign-on(SSO), strong authentication, and client aware access control – all into a one packaged solution providing control, visibility and compliance to enterprises adopting cloud SaaS applications. Part of Intel Cloud Builders program’s cloud security-enhancing reference architecture, it helps further Intel’s Cloud 2015 Vision that the cloud would be federated, automated and client aware.

By Anthony Park

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Zoho Announces Industry’s First Multichannel CRM Service

Zoho Announces Industry’s First Multichannel CRM Service

Zoho News According to Gartner, the Customer Relationship Management (CRM) software market grew by 12.3% from $23.4 billion in 2014 to $26.3 billion in 2015. Suggests Julian Poulter, research director at Gartner, “The merger and acquisition activity that began flowing through the market in 2009 continued in 2015, with more than 30 notable acquisitions. This…

How The Cloud Is Changing Online Education

How The Cloud Is Changing Online Education

Online Education Growth There’s no doubt that the internet has changed the face of education over the last two decades. In fact, by some estimates more than 80 percent of college students expect to take at least some — if not all of their courses — online. Thousands of people have earned degrees without ever…

Investing In The Future With The Introduction of Sage Cloud

Investing In The Future With The Introduction of Sage Cloud

CHICAGO, IL–(Marketwired – Jul 26, 2016) – Sage, a market leader in cloud accounting software, announced today at Sage Summit 2016 its strong commitment to future technologies, with a focus on new and existing partnerships that power business growth. Revealed during CEO Stephen Kelly’s keynote address, which opened the world’s largest gathering of entrepreneurs and…

Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Coping with Cloud Challenges Hardly a week goes by without coming across news around the increase in the number of organizations moving their workloads to public clouds. In the digital world, embracing cloud is a fundamental requirement for engaging customers and conducting business at scale. Due to a multitude of factors, including compliance mandates, risk…

2016 Tour de France: Racing With Big Data

2016 Tour de France: Racing With Big Data

2016 Tour de France The 2016 Tour de France has just concluded, with Chris Froome (SKY) taking his third overall win. Not the kind of event we often focus on here at CloudTweaks, but Dimension Data has put its analytics technology to use tracking the journeys of each rider across all 21 stages, and their…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud Comings and Goings

Cloud Comings and Goings

Cloud Power Amazon Web Services – the giant of cloud computing – is on track to do $10 Billion in revenue this year. Yet, rumors swirl that Apple may take a huge chunk of business away from them and Dropbox has definitely left AWS. Is something wrong at AWS? Wait, Salesforce.com (SFDC) – the granddaddy of…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…