Omada launches Cloud Gateway to boost hybrid identity security
Omada has released its Cloud Application Gateway, designed to enhance identity governance across hybrid IT environments without requiring firewall reconfiguration or custom integration.
The Cloud Application Gateway works with Omada Identity Cloud, the company's IGA-as-a-service platform, to integrate on-premises and cloud-hosted systems. Omada says the new solution addresses security gaps created by systems left outside identity governance programmes, a common issue for enterprises operating both cloud and legacy infrastructure. Unmanaged administrative accounts and legacy applications often fall outside the reach of IGA tools due to the risks and complexities of establishing secure connections, increasing compliance and audit risks.
Rising regulatory requirements and the demands of cyber insurers for comprehensive, verifiable identity controls across all platforms have placed enterprises under growing scrutiny to cover all systems, including legacy and on-premises applications. Gartner estimates that more than 70% of companies will continue to run hybrid IT environments for at least the next decade, compounding the challenges of identity management.
Extension across hybrid environments
The Omada Cloud Application Gateway has been developed to extend identity governance beyond cloud-only environments and address systems previously excluded from IGA. Rather than relying on permanent inbound network connections or significant firewall changes, the gateway creates secure outbound sessions only as needed. This mode of operation increases agility and limits network exposure, while aligning with Zero Trust principles. The gateway supports both Windows and Linux platforms and enables automatic over-the-air updates, which Omada says will help reduce administrative workload and ensure long-term compatibility.
According to Omada, the new product delivers advantages including rapid deployment, reduced operating costs, and strengthened security protocols, such as customer-managed encryption keys. Deployments can be completed in less than 30 minutes, and the gateway is available as a Docker image on Docker Hub, supporting continuous integration and continuous deployment (CI/CD) workflows across multiple target environments.
Omada highlights several features of the gateway. Its low operating footprint is designed to help organisations lower their total cost of ownership. Support for over-the-air updates enables automatic deployment and configuration through the Omada Cloud Management Portal, minimising direct administrative intervention. Users have the option to deploy the gateway within specific networks adjacent to target systems, which aids in supporting distributed and hybrid infrastructure.
An additional measure to support data privacy is Omada's 'bring your own key' (BYOK) functionality. This permits customers to use cryptographic keys managed in their own vaults, such as Hashicorp or Azure Key Vault, ensuring that only the customer can decrypt sensitive information managed within Omada Identity Cloud. This practice reinforces confidentiality of IGA secrets and complies with a range of regulatory and organisational security requirements.
The Cloud Application Gateway also provides integration flexibility, offering support for custom integrations using scripting or third-party libraries to address unique enterprise environments. Omada says this capability makes it easier for organisations to bring both cloud and legacy systems into a unified identity governance framework.
Customer control and security
Michael Garrett, CEO, Omada, commented, "The Omada Cloud Application Gateway represents a significant step forward in providing customers with secure, efficient and easy-to-manage connectivity to Omada Identity Cloud. By removing the need for complex firewall changes and putting encryption keys in customers' hands, we're making enterprise integration both safer and simpler."
Omada says that these developments mean customers can now extend identity governance across all segments of their hybrid IT estates, addressing audit and compliance blind spots typically found in systems outside the reach of traditional IGA tools.