Interview:The 8KMiles Acquisition Of FuGen Solutions

Interview: The 8KMiles Acquisition Of FuGen Solutions

8K Miles recently acquired FuGen solutions for $7.5 Million. The move signifies 8K Miles focus and interest in expanding into the Cloud IAM (Identity Access Management) and Identity federation brokerage services. What’s evident from the acquisition is the rising demand for simplified identity and access management on the Cloud, especially in hybrid cloud deployment scenarios. I interviewed Suresh Venkatachari, who is the Chairman and CEO of 8K Miles about the Cloud landscape and also about the acquisition.

Q. Tell us a bit about yourself and 8KMiles and its acquisition of FuGen?

I have an engineering background and bring over 24 years of management experience in the software product and consulting industry to 8KMiles. In the last 14 years I’ve had a strong entrepreneurial focus and founded 4 companies—successfully taking one public while selling two others. Prior to this, I headed the electronic banking software development at Deutsche Bank, Singapore.

8KMiles is a leading global, end-to-end cloud solutions provider and Amazon Web Services Premier Consulting Partner. The company is focused on delivering value-added cloud solutions designed to provide enterprise-level cloud security, mobile collaboration and large-scale data analytics for enterprise, SMBs, government and managed service providers.

8KMiles has deep expertise in secure cloud solutions, meeting important security qualifications such as FISMA in verticals such as government and more. The acquisition of FuGen Solutions will further enhance 8KMiles’ security services platform in the cloud, while offering innovative, complementary security measures such as Identity and Access Management to help streamline authentication across multiple cloud-based business systems. By incorporating and expanding on FuGen’s intellectual property for its enterprise Cloud Identity Broker, 8KMiles will be better poised to meet the growing security and compliance needs of large enterprises and government agencies.

Q. Describe how 8KMiles is adding value to the Cloud eco-system?

We recently received the honor of being selected as an Amazon Web Services Premier Consulting Partner, a designation given to only 15 cloud integrators in the industry. We’re very proud of this.

We have over five years of experience in building cloud solutions. Our team of cloud experts and enterprise-level cloud architecture is robust yet tailored in its approach to help companies power their cloud and go-to-market strategies, while achieving greater cloud computing savings and efficiencies. Our customers benefit greatly from our enhanced security services offered through our cloud platform, while being able to take advantage of more innovative, complementary security measures such as Identity and Access Management to help them better manage and streamline authentication as they increasingly migrate other business systems into the cloud. We pride ourselves in being able to help large enterprises and government agencies to meet growing security and compliance needs.

Q. In simple terms, how do you describe Federated Identity Management on the Cloud?

User identities authenticated by an authentication provider or identity provider other than a company’s identity management system, are said to be federated.

If an identity management system is hosted on the Cloud, identities are said to be managed using Federated Identity Management on the Cloud.

•If enterprise users can reuse their existing corporate credentials to access SaaS applications in the cloud without signing in again, then those users are also considered federated.

Government or Large Enterprises can also rely on a cloud identity broker or gateway as the federated identity management in the cloud to allow users to seamlessly access other cloud applications with their own credentials (BYOD) or with multiple types of credentials at different assurance levels.

Q. Do you see increased adoption of SSO within the enterprise Cloud space in near future?

Yes. Enterprise users will access an increasing number of resources or SaaS applications hosted on the Cloud (public, private or hybrid) and prefer using their credentials once to login, which would be the primary motivation for SSO adoption on the Cloud. On the consumer side, Financial, Ecommerce and Insurance applications, and Government Online Citizen services will see an uptake in adoption of federated access and streamlined authentication across sites.

Q. Tell us about the on-going pilot program of FuGen with some of the Fortune 500 companies?

In FuGen’s SaaS Onboarding and Certification for CA’s Cloud SSO Readiness Program, FuGen’s has onboarded and certified 50 plus SaaS partners of CA from a private cloud environment, helping many Fortune500 customers of CA to integrate with various cloud applications.

Q. Hybrid cloud deployments and federated SSO – perfect match?

Hybrid cloud deployments for enterprises usually have federated identities with or without SSO enabled. SSO enablement is usually preferred functionality for ease of access for users. Federated SSO reduces the complexity of handling password management related issues by providing improved convenience for enterprise users with streamlined authentication for Hybrid cloud deployments.

Q. How does FuGen’s IAM and SSO solutions address security concerns?

FuGen’s IAM solution precludes access to external resources or cloud applications for unauthenticated and unauthorized users. FuGen’s IAM solution with SSO prompts for re- authentication credentials if credentials are revoked or if access mechanisms are compromised. Specifically, FuGen’s cloud identity broker helps to address the following:

• Rapidly onboard and operationally certify SSO partners or cloud applications in real-time for federation compliance and security requirements

• Reduces the SSO and cross domain IAM deployment risks with respect to security, compliance and auditing

• Provide continuous monitoring and reporting capabilities for Federated IDM and SSO

• Minimizes the SSO partner friction and setup time

• Helps big enterprises to manage identity access for SMB partners and minimizes the weakest link problem

• Helps to manage Relying Parties federation policies and ensure compliance with Authentication providers

• Ensures the establishment of federated IAM trust framework from the start

• Continuous or ongoing management of federated connections for achieving the best Federation QoS (Quality of Service) for large deployments

By Salman Ul Haq

Disclaimer: This interview was conducted by Salman Ul Haq on behalf of CloudTweaks.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…