Interview:The 8KMiles Acquisition Of FuGen Solutions

Interview: The 8KMiles Acquisition Of FuGen Solutions

8K Miles recently acquired FuGen solutions for $7.5 Million. The move signifies 8K Miles focus and interest in expanding into the Cloud IAM (Identity Access Management) and Identity federation brokerage services. What’s evident from the acquisition is the rising demand for simplified identity and access management on the Cloud, especially in hybrid cloud deployment scenarios. I interviewed Suresh Venkatachari, who is the Chairman and CEO of 8K Miles about the Cloud landscape and also about the acquisition.

Q. Tell us a bit about yourself and 8KMiles and its acquisition of FuGen?

I have an engineering background and bring over 24 years of management experience in the software product and consulting industry to 8KMiles. In the last 14 years I’ve had a strong entrepreneurial focus and founded 4 companies—successfully taking one public while selling two others. Prior to this, I headed the electronic banking software development at Deutsche Bank, Singapore.

8KMiles is a leading global, end-to-end cloud solutions provider and Amazon Web Services Premier Consulting Partner. The company is focused on delivering value-added cloud solutions designed to provide enterprise-level cloud security, mobile collaboration and large-scale data analytics for enterprise, SMBs, government and managed service providers.

8KMiles has deep expertise in secure cloud solutions, meeting important security qualifications such as FISMA in verticals such as government and more. The acquisition of FuGen Solutions will further enhance 8KMiles’ security services platform in the cloud, while offering innovative, complementary security measures such as Identity and Access Management to help streamline authentication across multiple cloud-based business systems. By incorporating and expanding on FuGen’s intellectual property for its enterprise Cloud Identity Broker, 8KMiles will be better poised to meet the growing security and compliance needs of large enterprises and government agencies.

Q. Describe how 8KMiles is adding value to the Cloud eco-system?

We recently received the honor of being selected as an Amazon Web Services Premier Consulting Partner, a designation given to only 15 cloud integrators in the industry. We’re very proud of this.

We have over five years of experience in building cloud solutions. Our team of cloud experts and enterprise-level cloud architecture is robust yet tailored in its approach to help companies power their cloud and go-to-market strategies, while achieving greater cloud computing savings and efficiencies. Our customers benefit greatly from our enhanced security services offered through our cloud platform, while being able to take advantage of more innovative, complementary security measures such as Identity and Access Management to help them better manage and streamline authentication as they increasingly migrate other business systems into the cloud. We pride ourselves in being able to help large enterprises and government agencies to meet growing security and compliance needs.

Q. In simple terms, how do you describe Federated Identity Management on the Cloud?

User identities authenticated by an authentication provider or identity provider other than a company’s identity management system, are said to be federated.

If an identity management system is hosted on the Cloud, identities are said to be managed using Federated Identity Management on the Cloud.

•If enterprise users can reuse their existing corporate credentials to access SaaS applications in the cloud without signing in again, then those users are also considered federated.

Government or Large Enterprises can also rely on a cloud identity broker or gateway as the federated identity management in the cloud to allow users to seamlessly access other cloud applications with their own credentials (BYOD) or with multiple types of credentials at different assurance levels.

Q. Do you see increased adoption of SSO within the enterprise Cloud space in near future?

Yes. Enterprise users will access an increasing number of resources or SaaS applications hosted on the Cloud (public, private or hybrid) and prefer using their credentials once to login, which would be the primary motivation for SSO adoption on the Cloud. On the consumer side, Financial, Ecommerce and Insurance applications, and Government Online Citizen services will see an uptake in adoption of federated access and streamlined authentication across sites.

Q. Tell us about the on-going pilot program of FuGen with some of the Fortune 500 companies?

In FuGen’s SaaS Onboarding and Certification for CA’s Cloud SSO Readiness Program, FuGen’s has onboarded and certified 50 plus SaaS partners of CA from a private cloud environment, helping many Fortune500 customers of CA to integrate with various cloud applications.

Q. Hybrid cloud deployments and federated SSO – perfect match?

Hybrid cloud deployments for enterprises usually have federated identities with or without SSO enabled. SSO enablement is usually preferred functionality for ease of access for users. Federated SSO reduces the complexity of handling password management related issues by providing improved convenience for enterprise users with streamlined authentication for Hybrid cloud deployments.

Q. How does FuGen’s IAM and SSO solutions address security concerns?

FuGen’s IAM solution precludes access to external resources or cloud applications for unauthenticated and unauthorized users. FuGen’s IAM solution with SSO prompts for re- authentication credentials if credentials are revoked or if access mechanisms are compromised. Specifically, FuGen’s cloud identity broker helps to address the following:

• Rapidly onboard and operationally certify SSO partners or cloud applications in real-time for federation compliance and security requirements

• Reduces the SSO and cross domain IAM deployment risks with respect to security, compliance and auditing

• Provide continuous monitoring and reporting capabilities for Federated IDM and SSO

• Minimizes the SSO partner friction and setup time

• Helps big enterprises to manage identity access for SMB partners and minimizes the weakest link problem

• Helps to manage Relying Parties federation policies and ensure compliance with Authentication providers

• Ensures the establishment of federated IAM trust framework from the start

• Continuous or ongoing management of federated connections for achieving the best Federation QoS (Quality of Service) for large deployments

By Salman Ul Haq

Disclaimer: This interview was conducted by Salman Ul Haq on behalf of CloudTweaks.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Marketing Execs Beefing Up on Martech Strategies

Marketing Execs Beefing Up on Martech Strategies

Martech Strategies As budgets shift from traditional marketing streams to marketing technology, it’s essential that both marketers and business leaders understand marketing technology and keep up with the developments. According to eMarketer, 78% of US senior marketers surveyed believe gaining this understanding of marketing technology is increasingly relevant to their success, and the majority of…

4 Monetization Models For The Digital Business Era

4 Monetization Models For The Digital Business Era

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years. However, MGI Research predicts that digital businesses will need to increase their time to market by 40 percent. Many global executives admit they are unprepared to monetize their operations. The million dollar question is: how…

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

The cyberwar is on! At this stage of the game, the stakes are higher than ever, and safeguarding networks from cyberattacks is a devilish combination of Chicken and Cat-and-Mouse. Attacks are now so commonplace that many events of serious cybersecurity breaches go uncovered by mainstream media. Despite the rapid advancements in IT security technology, hackers…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design

How Big Data Is Influencing Web Design For all you non-techies… You’re probably wondering what big data is (I know I was….a few years back) so let’s get the definitions out of the way so we’re on the same page, okay? Big data is A LOT of data – really, it is. It is a…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…