@CloudExpo Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Liz McMillan, Zakia Bouachraoui

News Feed Item

The First Complete Identity and Fine-Grained Authorization Solution Is Now Available as 'SaaS'

The First Complete Identity and Fine-Grained Authorization Solution Is Now Available as 'SaaS'

VALLEY VILLAGE, Calif., Sept. 24 /PRNewswire/ -- BiTKOO -- The Identity Management Company today announced that its flagship product Keystone is now available as software as a service ('SaaS'). This marks a major breakthrough for enterprise identity and access management. Keystone was originally developed at the Walt Disney Company and later exclusively licensed to BiTKOO. Doron Grinstein, BiTKOO's CEO invented the Keystone technology while at Disney.

Keystone allows organizations to secure any kind of application including web applications, web services, rich-client applications, and disconnected mobile applications. It provides sophisticated fine-grained authorization and a robust authentication abstraction layer.

Mr. Grinstein said, "We realized that we can offer Keystone as a 'SaaS' model when we combined our SecureWithin technology with Keystone -- the result was amazing. SecureWithin allows organizations to securely expose any endpoint to the Internet without the need for DMZ, VPN, poking holes in the firewall, etc."

"Since Keystone is comprised of a set of web services, we realized that we could connect securely to organizations' directories without really affecting their computing infrastructure. We then provide the Keystone 'Dial Tone' from one of our geographically dispersed data centers. This provides unprecedented level of high availability."

Keystone has been battle proven at the Walt Disney Company for over three years where it is utilized to secure various kinds of applications and web services.

BiTKOO also announced that Keystone is now available as either a hardware appliance, virtual server appliance or as a combination of software, hardware and 'SaaS'. "One more benefit of our 'SaaS' offering is that companies do not need to solely rely on the 'SaaS' instance. They can install our hardware appliance and have our hosted service act as backup. Keystone automatically replicates the data to the hosted service so if the local instance fails, the clients automatically fail over to the 'SaaS' instance."

Earlier this year BiTKOO announced federated authorization, a new bread of technology that revolutionized how distributed systems are secured. With today's announcement, BiTKOO once again blazes the trail of innovation and opens up a whole new world of possibilities.

To learn more about BiTKOO's Keystone and SecureWithin, visit http://www.bitkoo.com/ or send email to [email protected].


CONTACT: BiTKOO, 1-888-424-8566, [email protected]

Web site: http://www.bitkoo.com/

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Cloud computing is a goal aspired to by all organizations, yet those in regulated industries and many public sector organizations are challenged in adopting cloud technologies. The ability to use modern application development capabilities such as containers, serverless computing, platform-based services, IoT and others are potentially of great benefit for these organizations but doing so in a public cloud-consistent way is the challenge.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, described how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launching of virtual storage services to its enterprise market.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.