Reinventing Identity Management
How many apps do you use in a given day? Between Slack, Dropbox, and Salesforce, I’m constantly bouncing back and forth throughout my day. Realistically, employees now use dozens of apps. Naturally, enterprises struggle to keep track of files that have become scattered across many on-prem and cloud services.
Cloudtenna catalogs file activity across disparate data silos and provides A.I. services to help companies mitigate the chaos. This helps companies search and audit files that are scattered across many on-prem and cloud data silos.
Enterprise search, auditing, and governance are nothing new. These tools, though, need to be reimagined for a world where files are scattered and data sets are astronomically larger. The Cloudtenna engineers have been working on just that.
It used to be that all enterprise data was stored in a single location (typically a file server) and managed by a single authentication protocol (typically Active Directory). Now data is spread across many different types of storage — some on-prem, some in the cloud. And each storage repository is managed by independent logins and use their own proprietary file permissions. How can we reconcile all of these user accounts and inconsistent file permission protocols into a single user identity for each employee?
At Cloudtenna, we designed and built our identity management (IDM) service from the ground up to tackle this problem. Once setup, a user logs into his single identity and the system is able to determine which disparate file repositories he has access to and which files he has permissions to see.
Cloudtenna is “out-of-band,” which means that it does not change existing data silos and does not attempt to normalize data — something that could break third-party apps. Users continue to use the applications they know and love just like they always have. Cloudtenna takes on the task of understanding how different protocols work and reconciles them.
For authentication and authorization, the Cloudtenna IDM is able to seamlessly collate user accounts from common protocols including OAuth 2.0, SAML, and basic authentication. This ensures that Cloudtenna can work with all major cloud and on-prem apps where enterprise users may save files. Cloudtenna is bound by the security in place on each application based on the protocol the applications uses. For example, Dropbox uses a secure tokenization process to authenticate users via OAuth 2.0. Adhering to this standard, Cloudtenna uses secure tokens to communicate with Dropbox instead of storing username and passwords.
Cloudtenna uses the IDM to authenticate users into many disparate apps and to collect metadata that it uses to uncover deep machine learning insights. It uses the latest accepted security principles to ensure the highest level of security and offer the most seamless single-pane-of-glass user experience. It is a foundation that Cloudtenna relies on to deliver powerful services that help mitigate the chaos caused by scattered files and disparate data silos.