GRC Viewpoint

Cloud IAM: Exclusively Ensuring Total Control Over Data to Customers

François
Guillaume
Ribreau

Chief Executive Officer

“Thanks to the quality (99.9% uptime SLA) of our services, the reliability of Keycloak open-source managed solution, API-first, our clients can fully automate their services with us. We are available 24/7.”

A reputed European Media firm was searching for specific options for migrating their entire data hosted in the U.S to Europe. After a prolonged search, they finalized on Cloud IAM, a Rennes-based cloud security company. The client could leverage cloud IAM’s services to migrate their entire data to the Keycloak cloud solution within two months. Furthermore, leveraging the Cloud IAM open API allowed the media firm to easily migrate its user base and use all the Cloud IAM services overnight.

Cloud IAM is the only European IAM enterprise that extends total control over data to its customers. Clients can choose their hosting provider, Alibaba cloud, Google cloud, or AWS. In addition, the data can be recovered anytime without vendor lock-in. “Thanks to the quality (99.9% uptime SLA) of our services, the reliability of Keycloak open-source managed solution, API-first, our clients can fully automate their services with us. We are available 24/7.”, says François-Guillaume Ribreau , CEO.

Establishing a fully-managed Keycloak requires extensive knowledge. With high-end knowledge, providing a Keycloak can be smooth. However, there could be significant security holes in an IS. An IAM, Identity, and Access Management service is crucial to any Information System. It’s critical. It must be Highly Available (HA) and scalable. “Customers were able to set up a CI to generate this extension (.jar) via our API, automatically send this extension to their staging environment and then run none regression automatic testing. Our system is interoperable. For example, the custom extensions (.jar files) used in the Keycloak of our users can be integrated and retrieved at any time,” informs the CEO. Association with Cloud IAM guarantees the safety of its users. The enterprise supports bruce force attacks, 2 -factor authentication, password strength verification, and one-time passwords. Yet another example is a customer searching for practical solutions to address their scaling problems concerning their Keycloak infrastructure. Cloud IAM conducted an audit to understand the issues. After the audit, the enterprise was able to assist them in implementing customized solutions to meet their expectations.

STAYING DIFFERENT

Cloud IAM has the edge over its peers. Other IAM providers extend very few logs to their customers, and access to customers’ metrics is only possible sometimes. “Cloud-IAM exposes as standard the logs of the Keycloak in real-time, as well as the metrics of the Keycloak in real-time in available metrics format. Companies can reinternalize logs and metrics of their IAM within their IS to feed their SOC (Security Operation Center). Cloud IAM is the only European enterprise to extend the feature. Clients have access to our APIs so that clients can create their alerts if the alerts provided are insufficient,” adds the CEO. The firm lowers the entry barrier so that enterprises that manage external or internal users will be able to leverage an entire set of standards and tools in hand for authenticating their users. Cloud IAM also extends auditability to understand who has logged in and their activities, along with the statistics. The entire IAM market is focused on proprietary solutions, and often there needs to be access to source code managed on private clouds. The complete data needs to be recoverable. IAM clients need to develop proprietary extensions using a custom code. In case of any change concerning IAM providers, the process has to start from its early stages. It is only sometimes possible to choose the continent where data is hosted but not cloud providers or the region. “We are entirely open source. All customers’ choice to migrate their IAM to Cloud-IAM is fully reversible. We allow clients to develop extensions in java and recover them at any time to reuse them in a self-hosted Keycloak. All this considerably reduces the costs, time, and risks related to migrating the homemade customer and user database to Keycloak. Besides, clients can choose their cloud provider as well as the region of the world for hoisting the data and IAM,” concludes, Ribreau.