Atul Tulshibagwale
About
Atul Tulshibagwale is from Cupertino, California, United States. Atul works in the following industries: "Computer Software", "Internet", and "Information Technology & Services". Atul is currently Software Engineer at Google, located in Mountain View, California, United States. Atul also works as Co-chair, Shared Signals and Events Working Group at OpenID Foundation, a job Atul has held since Jan 2020. In Atul's previous role as a Software Engineer - Workspace Core Security at Google, Atul worked in Sunnyvale, California until Jul 2021. Prior to joining Google, Atul was a Architect, Identity at MobileIron and held the position of Architect, Identity at San Francisco Bay Area. Prior to that, Atul was a Co-founder and CEO at LinguaNext, Inc., based in San Jose, CA and Pune, India from Jan 2010 to Mar 2013. Atul started working as Director of Engineering at Hewlett-Packard in Cupertino, CA in Dec 2005. From Jul 2002 to Dec 2005, Atul was Co-founder and CEO at Trustgenix, Inc., based in Santa Clara, CA. Prior to that, Atul was a Director of Engineering at VeriSign Inc., based in Mountain View, CA from Feb 1997 to Jun 2002.
If you’re looking for Atul Tulshibagwale's email address, you can find it on finalscout.com. Finalscout is a professional database with more than 500 million business professionals and 200 million company profiles.
Atul Tulshibagwale's current jobs
Working on IAM for Google Nest
The newly formed Shared Signals and Events working group is a powerful combination of the former RISC working group in the OpenID Foundation and the informal Continuous Access Evaluation Protocol (CAEP) working group. We are working to comprehensively address the needs of dynamic access attenuation either based on routine changes to user, device or app properties or due to exceptional events like account compromise.
Atul Tulshibagwale's past jobs
Led the design and development of the BeyondCorp Alliance API that provides management capabilities to hundreds of millions of mobile and desktop devices. Helped partners and customers onboard to the API, leading to the GA launch of the BeyondCorp Enterprise product. Invented the Continuous Access Evaluation Protocol (CAEP), and led its definition as an open standard in the OpenID Foundation.
Designed and implemented a number of important features of MobileIron Access from initial release onward. Re-established my coding chops by helping create a bug-free, secure, performant and flexible new product adopted by top-name enterprise customers. Product leverages federated identity standards including SAML, WS-Federation and WS-Trust, coded in Java using the Spring framework. Drove the product’s success through SE and PS training, and by leading extensive proof-of-concepts with first few customers. Brought feature feedback from PoCs back to the product team. Created detailed internal documentation for multiple teams to leverage to ensure broad uptake by field force.
Oversaw LinguaNext’s growth from founding to million+ dollar revenue. Created differentiated product and solution packaging for various market segments and industries. Created a scalable and enterprise-ready product architecture. Defined technology-driven services and ensured a value-based payment model for each. Effectively marketed the company and products globally through world-class branding, product literature, marketing, events and web and social media presence while being on a tight budget. Ensured the company was on sound legal footing in all contracts and license grants. Helped sales team sign up multiple big-name international customers and partners from the Forbes Global 2000 list. Strengthened the management team through key hires at various levels including the new CEO.
Integrated acquired Trustgenix product into HP identity management suite. Integrated engineering into various HP global teams. Trained HP global sales teams. Worked with sales to close key deals. Achieved almost all goals set at the time of the acquisition. Inventor in a key patent to make federated identity standards such as SAML more efficient. One of the authors of the WS-Federation 1.2 specification.
Conceptualized, managed and implemented a category-defining product – the IdentityBridge federation server – that was replicated by the entire industry, including large technology providers. Publicized product with press and analysts, earning rave reviews and recommendations. Built a substantial base of enterprise customers including many Global 2000 customers. Product was OEM-ed by HP. Strategically positioned product to encourage customers to use IdentityBridge instead of a costly upgrade to a competitor’s product. Sold company to HP in a multiple-bidder situation at an exceptional valuation. Implemented SAML 2.0, SAML 1.0 and Liberty 1.1 federation protocols as part of the product. Inventor in a key patent covering the concept of a Federation Router.
As a part of the early team at VeriSign, I concieved, developed and implemented hard-core PKI technologies widely deployed within VeriSign services as well as customer sites. I opened many new areas of business for VeriSign with dramatic results. I worked closely with Microsoft and Netscape in developing new Internet security standards including OCSP and S/MIME and seeing their successful deployment in browsers and the Internet infrastructure I was the point person at VeriSign to coordinate and respond in conjunction with partners such as Microsoft and Netscape to various unexpected security incidents that threatened widespread disruption on the Internet. I also managed a number of planned browser or other upgrades that required coordinated action from VeriSign.