Mobile Middleware Buyer s Guide

Size: px
Start display at page:

Download "Mobile Middleware Buyer s Guide"

Transcription

1 white paper Mobile Middleware Buyer s Guide Paper Focus: Common enterprise use cases that benefit from using a Mobile Middleware architecture Architectural, performance and security tradeoffs Common security capabilities and recommendations for mobile enablement Checklist of concerns for prospective buyers Abstract If you re currently evaluating tooling and infrastructure middleware to rapidly expose apps to a wide range of mobile devices, this guide will assist you in the decision making process and help you make an informed choice. The first two sections describe the common business use cases where mobile middleware is deployed. The following sections of the guide contain tools you can use to identify the right fit for your enterprise based on business requirements and intended usage.

2 Mobile Middleware Buyer s Guide Executive Summary...3 The Use Case: Mobility in the Enterprise...4 Use Case 1: Employee Productivity...4 Use Case 2: External Access...5 Use Case 3: Monetizing APIs...5 A Case for Mobile Middleware...6 Integration...6 Mobile-friendly Security...7 Data Protection...8 Authentication and Identity...8 Performance...8 Developer Engagement...9 Discovery...9 Onboarding...9 Education and Documentation...9 Monitoring and Metering...9 Cross-Platform Development...10 Concluding Thoughts: Mobile Middleware...10 Mobile Middleware Checklist...11 Paper Sponsorship...12 Purpose This paper is aimed at business and IT professionals responsible for implementing a mobility program, whether it is BYOD (Bring Your Own Device) for their employees or extending a webbased engagement portal to mobile devices for customers, partners and developers. This guide aims to provide approaches that will simplify the creation of mobile apps while maintaining an appropriate level of security and user experience. Many of these approaches will also be relevant to the business looking to create new revenue streams by repackaging existing data assets and services as APIs for external developers. 2

3 Executive Summary Mobile devices are no longer simply used for voice and text communications. Nor are smartphone apps exclusively personal or entertainment-oriented. Tablets and smartphones have become enterprise productivity tools, used for all manner of business operations. As enterprises embrace the transition to mobile, they can enjoy improved productivity by exposing internal services to mobile devices and drive new revenue from exposing once internal APIs to external developer communities. Mobile middleware enables the enterprise to expose existing data and services via APIs, giving it reach far beyond the current status quo of entrenched web applications. However, in its current state the mobile web experience is lacking in performance, scalability, security and usability. Native and web-based HTML5 mobile applications are introducing more powerful experiences, but they ultimately depend on APIs for core data delivery. Mobile middleware is an emerging set of technologies that has different connotations in different contexts. Some vendors use the term to describe Mobile Backend as a Service (MBaaS), which is essentially a Platform as a Service (PaaS) tailored to the needs of mobile developers. Others define it as a collection of APIs that are readily consumable by mobile devices. We take a more expansive view, illustrated in Figure 1, considering the end-to-end solutions that support application development for mobile devices, including APIs, API management and software development. By our definition, mobile middleware is a new architectural cornerstone of the traditional enterprise software architecture, on par with traditional application servers and web server infrastructure. Service Provider or C2DM (Cloud to Device Messaging) Raw TCP over SSL Drive developer community API discovery, usage, and monitoring Enterprise Securely exposes a unified set of RESTful APIs,as well as SLA enforcement and response caching AAA API Key ID Token Mapping Federation Generates SAML assertions for web mobile SSO Sends push notification Alerts and over the air (OTA) updates iphone Android Blackberry Windows Smart Phones Android and ios Tablets Intel API Portal RESTful HTTP Communication XDK Mobile App Dev Network Firewall Load Balancer Delivers tuned content for web mobile apps Intel EAM Farm Mobile-Tuned Web Server Farm Tuned HTTP performance for millions of devices Lightweight HTTP/JSON Optimized App Server Informatica Data Transformation (Embedded in Intel EAM) Intel EAM (Client) Binary Asynchronous Messaging Component No SQL/ RDBMS Persistence Layer or MQ Fast changing data / activity streams Produces mobile-ready data formats Secure PaaS Securely brokers content from cloud providers Intel TXT Figure 1: Mobile Middleware Reference Architecture 3

4 The Use Case: Mobility in the Enterprise While mobile apps originated as diversions for playing games or consuming information, they are increasingly being used to interact with corporate Big Data. These enterprise mobile apps require enterprise-grade security and performance. When considering a mobile middleware platform, the enterprise architect must first consider the following questions: How do I best reach my target audience, whether they are employees or customers? How do I make my application work across multiple devices with multiple form factors? Are there external API and application dependencies? And if so how do I provide business continuity for my applications? How do I optimize the performance of my mobile application? How do I securely expose the data and services needed for my mobile application? How will compliance and enterprise governance affect data exposed to mobile devices? How do I incorporate additional functionality provided by external APIs? How many devices do I expect? How will my infrastructure scale? The answers to these questions require alignment across business, data, infrastructure, application and security architecture roles. Finally, with the increasing role of mobility in the enterprise, the solution must be extensible and scalable, capable of adding new applications as additional capabilities are needed. Use Case 1: Employee Productivity Mobile devices bring the potential for ubiquitous access to corporate resources, providing employees with an alwayson connection to the enterprise. , calendar and contacts are no longer sufficient for many enterprises. Lineof-Business applications with secure access to corporate data will further improve worker productivity. Due to their nature, mobile devices afford interesting productivity enhancements that increase efficiency. For example, traditional enterprises can use the location aware capabilities of smart devices to optimize internal resources such as conference room booking and other location-sensitive resources. Utilities can leverage mobile devices to provide their field force with critical outage and capacity usage information direct to smartphones and tables. Finally, organizations with a large sales force can use tablets and smartphones to assist side-by-side selling, which wasn t previously possible with traditional web applications. While the first stage of mobile access was delivered using off-the-shelf software packages, the next wave will include much more custom code. As shown in Figure 2, according to a November 2011 Forrester study more than 50% of enterprises develop their own mobile applications in-house. These applications will require access to a mix of back-end services, from existing SOAP applications to newlydeveloped RESTful APIs, as well as cloudhosted services such as salesforce.com. Figure 2: Sourcing of Mobile Apps in North American Enterprises 2011 Forrester Study 4

5 An established enterprise may already have an ESB (Enterprise Service Bus) for internal services, or they may be using loosely-coupled, point-to-point connections between apps and services. Either way, the ESB likely was not designed with widescale, mobile security or external connectivity in mind. Use Case 2: External Access For some time, many enterprises have offered their customers a self-service web engagement portal. Whether it s used for commerce, basic account management or other purposes, this portal ultimately connects back to enterprise services. With mobile browsers taking an increasing share of page views, portals that deliver substandard user experience are being re-implemented as native or HTML5 mobile applications. While the scope of services to be accessed by internal users is typically much narrower than in the employee productivity case, the scale and security considerations are much greater. Also, digital natives expect integration with external identity providers, social networking and other external cloud services. External users are also much less forgiving about user experience issues. Performance, security and availability are paramount when offering an application to customers. Use Case 3: Monetizing APIs Enterprises are beginning to find new revenue streams by exposing their internal APIs to external developers. For newer businesses such as SendGrid, Twilio or Urban Airship the API is the product. Established enterprises have two options for entering this field: Open APIs to developers in an attempt to build community and expand the user base, or directly monetize APIs to exploit a core competency that was once only available to internal line-of-business customers. Netflix is arguably the most well-known industry example of the former model. By opening their APIs, they have supported many different device types, allowing ubiquitous access to their content. As a result they have gained subscribers and increased revenue while avoiding the additional development and support costs for those platforms. Evernote, Dropbox and Instapaper are further examples of companies that have increased adoption by encouraging other developers to integrate with their platforms. Many other companies have realized that their data is an asset. Best Buy has begun to expose some of its core business processes to developers, more directly monetizing them. CitySearch reinvented itself as CityGrid, opening up its content to competing offerings. While monetization data and APIs is not new or unique to the mobile space, the rapid adoption of new devices and form factors has expanded and accelerated the opportunity. Whether you are trying to expand your customer base or identify new revenue streams, providing APIs for external developers can provide positive results for the enterprise. In order to fully realize these benefits, APIs must be secured and instrumented. Service level (SLA) enforcement, rate limiting, metering and throttling become essential capabilities. These features also enable tiered service levels, allowing finite resources to be more strategically allocated. Figure 3: Global Growth of Mobile Devices as Share of Web Traffic 5

6 A Case for Mobile Middleware Receive While legacy application delivery featured monolithic application servers and ESBs, mobile application architectures depend on a hybrid model including both web servers and application servers. For convenience we will refer to this collection of servers as API servers, meaning servers delivering web services whether through SOAP, RPC or HTTP. Also, since ESBs were not designed to be Internet-facing, a different middleware layer is required for mobile application delivery. We will refer to middleware that mediates access to web-based APIs as a Service Gateway. Furthermore, even the most mature service-oriented architectures tend to be contained within a single enterprise and are designed for behind the firewall. Service discovery can be accomplished through a centralized enterprise catalog, and entitlements granted based on a corporate-issued identity. Mobile apps, on the other hand, frequently consume APIs from multiple providers. We will refer to a catalog of a provider s APIs as an API Portal. Regardless of which use case is the primary motivator for adopting a mobilization strategy, it s clear that legacy web and data services are not readily consumable by mobile devices. An enterprise, then, has two options: Remediate each service independently, or adopt a middleware layer that can bridge the gaps to mobile access. Development cost savings from the middleware approach will depend on the number of services to be addressed and the level of integration effort required. However, by abstracting away these integration functions, enterprises can be assured that security and compliance policies are being uniformly implemented, enforced and updated no easy task if custom code is to be added to a large number of applications. Further, the mobile middleware layer provides a scalability mechanism to handle thousands of connections from mobile devices. In the remainder of this paper we will examine how a service gateway supports these use cases, delivering the core functionality of a mobile middleware strategy. In particular, we will look at how a service gateway supports integration of disparate data sources, surfacing them as a set of RESTful web services suitable for consumption by mobile app developers. We will then consider the added security and performance challenges that arise when providing mobile access to enterprise data services. Finally we will consider the developers perspective on mobile app development, exploring tools for developer engagement and crossplatform app development. Integration Leading-edge web developers expect consistency in naming and functionality across APIs from a given provider. By convention this includes exposing all APIs under a consistent URI structure, rooted at api.<provider>.com. While an API portal would enable developers to locate nonstandard URI addresses and structures, consistency is important in nurturing a developer community. At a minimum, the service gateway acts as an application-layer switch, forwarding calls to the correct real endpoint within the enterprise. However, the DNS portion of the API URI is only a small part of providing a uniform API platform. In most established enterprises, development teams have adopted a wide range of conventions, developing APIs to an ever-evolving set of standards. In order to provide a Invoke API1 Assemble Response Reply Invoke API2 Figure 4: Service Composition with Two APIs better developer experience, a service gateway can rewrite the API requests and responses, establishing a consistent façade such as REST/JSON. Adding a level of sophistication beyond simply forwarding and rewriting API calls, some service gateways are able to act as lightweight logic servers. In this model, an internal data resource such as a file or database query can be presented as a web service using a RESTful façade that is consistent with other services in the catalog. An additional consideration for mobile applications is service composition. Mobile platforms have lower processing capabilities, higher bandwidth costs and higher latency than other types of clients. It can therefore be much more expensive for a mobile application to make multiple API calls. Service composition is an advanced service gateway capability in which the gateway performs a mash-up of two or more web services, transparently aggregating them into a single web service call. By supporting this aggregation, some logic functions can be performed within the gateway, avoiding the build-out of additional application servers. 6

7 Browser Web Server Web Server Web Server Master Slave 1 Slave N Figure 5: Traditional 3-tier Web Architecture Presentation Logic (application) Persistence HTML5 & Native Apps Service Gateway Delivery & Governance Logic (application) Master Slave 1 Slave N Persistence Figure 6: 2-tier, App-Optimized Architecture Mobile-Friendly Security Mobile applications are typically intended for use outside of the corporate network. This requires the enterprise to expose APIs and web services to the Internet, where previously they were made inaccessible by the corporate firewall. While it is a good practice to protect even inward-facing services, the likelihood of a malicious attack is orders of magnitude higher for external-facing APIs. Even if these services were previously exposed through a web portal, additional security must be considered. Most modern web portals adopt some variation on the classic three-tier architecture, in which only the presentation tier is exposed to the Internet. On the other hand, many web services place business logic at the endpoint, exposing the server. Furthermore, the API server will have access to a database, so a compromised server can lead more directly to data loss. Figure 7: Multi-gateway Architecture for Internal Services A Service Gateway allows the enterprise to minimize the attack surface for the mobilization program. Rather than having to protect one or more servers for each external-facing API, the proxy model results in a single server or cluster responding to external traffic. The actual web services can then be further restricted only allowing connections to the gateway and to internal systems inside the DMZ or corporate intranet. A variation on this model, illustrated in Figure 7, uses a pair of gateways to securely expose internal APIs while eliminating the need for a duplicate instance of the API deployed to the DMZ. This involves deploying one gateway inside the DMZ and a second gateway inside a secure enclave. Inbound traffic Mobile Client Gateway 1 is permitted to access the first instance, while the second instance only accepts traffic from the first. It should be noted that this is only feasible with gateways that can be deployed on-premise due to the need to securely host one gateway inside the secure enclave. Use of a security gateway also makes it easier to implement and enforce consistent security policies for all APIs. Instead of adding custom code to each API or tuning each server individually, a consistent set of checks can be performed at the gateway layer. For example, an enterprise can define a package of checks that includes SQL injection scanning, overflow scanning, and cross-site scripting prevention. Gateway 2 API API API Server API Server Bastion Host DB Server Admin User INTERNET DMZ SECURE ENCLAVE CORP INTRANET 7

8 Figure 8: OAuth to Enterprise Identity Mapping Active Directory OAuth Dance over SSL TLS with Mutual Auth Native Mobile Applications or API Call Gateway Maps OAuth Credentials to User Names Enterprise Application Exposing REST API Data Protection Many retail operations are using mobile point of sale as a means to better serve their customers through a more efficient checkout process. Some companies, such as Nordstrom, are deploying tablets or smartphones equipped with credit card readers throughout their stores. Other companies, such as Apple, allow customers to checkout on their own mobile devices. In both models, payments are being accepted over a wireless network and must be protected differently than they were in the old point-of-sale model. In order to maintain compliance with the Payment Card Industry (PCI) guidance for handling of payment card information, credit card details should be tokenized. Other industries that deal with personal information, such as healthcare, also have a need to protect sensitive information, either through encryption or tokenization. A gateway proxy with encryption and tokenization support can improve security for these uses while reducing audit scope. The gateway maintains the secure mapping of actual card data to tokens, which means that the tokenization capability doesn t need to be implemented elsewhere. Authentication and Identity Identity management frequently slows mobile application enablement. While most enterprises have standardized on a centralized identity stores and may have experience with NTLM for web-based applications and X.509 or SAML web service security, none of these are viable for mobile devices. While it is possible to construct an authentication mechanism using basic HTTP auth and/or SSL to pass user and password information to the server, these aren t terribly secure. Worse, they potentially alienate both developers and users alike because they aren t standard or frictionless OAuth is the de facto standard for web and app authentication. Adopting this standard is intuitive for both users and developers. However, enterprise applications are not likely to support OAuth. Nor is it a viable replacement for Active Directory. A gateway can address this disconnect by bridging OAuth to an enterprise identity management system (e.g. Active Directory), mapping users to OAuth credentials. Performance Up to this point we have focused on the benefits of employing a web service gateway for mobile applications. However, there are potential risks and drawbacks to this architecture. Performance is the primary concern: Introducing an additional level of indirection and logic can result in both propagation and computation latency. Propagation latency is the easier of the performance challenges to anticipate and avoid. Service gateways are typically available in two models: SaaS or On- Premise (see Figure 9). With SaaS, the service gateway resides in the cloud, so all API requests will route from the client, through a cloud provider, and back to the API endpoint. This potentially adds a hundred milliseconds or more of latency to each API transaction. An on-premise deployment eliminates this propagation latency, as the gateway and API endpoint are within the same data center. Even cloud-hosted APIs aren t immune to this additional propagation latency: One would have to select the same cloud provider, region and availability zone as one s service gateway in order to minimize latency. This would mean ignoring other decision factors such as proximity to application users, cost and service level agreement. Increased computation latency and decreased throughput are also risks when deploying a service gateway. Each operation the gateway performs on an API call takes time and consumes resources. Implementing a complex workflow at the gateway layer can dramatically impact the response time, degrading performance. As gateway performance varies between products, it is important to look carefully at the optimizations offered by the vendor. Some examples include hardware acceleration for cryptographic instructions and efficient software for XML/JSON processing. 8

9 Internet (latency) Service Gateway Master Slave 1 HTML5 & Native Apps Delivery & Governance ENTERPRISE PRIVATE CLOUD Logic (application) Slave N Persistence Figure 9: Latency considerations for on-premise Browser Internet (latency) Web Server Web Server Web Server Internet (latency) Master Slave 1 Slave N Figure 10: SaaS gateway offerings PUBLIC CLOUD Presentation Logic (application) ENTERPRISE PRIVATE CLOUD Persistence Developer Engagement Once the organization has securely exposed a set of APIs for mobile app development, the next step is to ensure that developers can use them effectively. This starts with discovery, but also includes onboarding, education, monitoring and metering. An API portal typically handles these functions. Discovery The core role of an API portal is to serve as a service catalog of APIs. The portal contains a list of available APIs, along with information such as SLA, subscription information and other relevant details for prospective developers. When evaluating portals, consider the developer experience: whether it is easy to locate APIs and understand any constraints on use. Also look for a solution that can provide cookbook examples to help kickstart the development process for your environment, fostering best development practices. Finally, since this is the entry point for the developer, consider whether the solution can be skinned to conform with your corporate identity and branding standards. It is worth noting that a portal can be as valuable to internal developers and internal-facing APIs as it is for external-facing applications. In large organizations, organizational barriers and lack of communication can often result in duplicate development efforts. A centralized repository of APIs and a corresponding set of mobile client app examples can help internal developers more efficiently identify reuse opportunities, reducing wasted effort. Onboarding Once a developer has decided to use an API, the next step is to request access. Access to the portal should be able to be restricted to the enterprise if no external developers are planned. On the other hand, if APIs are to be exposed externally then the portal should be able to authenticate developers and secure their agreement to terms of service before granting an access token or key. Education and Documentation App developers seek documentation from a number of different sources: Blogs, discussion forums and wikis augment and often supersede official information sources. These sources vary widely across development communities. When evaluating API portals, it is advisable to seek flexibility and extensibility, ideally with the ability to link to external documentation sources to augment any native capability. Collaborative portals i.e. portals allowing documentation to be crowd-sourced can also foster a sense of community across a developer base. Community contributions can also improve the quality of documentation by incorporating realworld usage scenarios and sample code. However, having great documentation available is not the same thing as having it accessible. In order to ensure that developers can locate the information they need when they need it, a portal should also incorporate search functionality. Finally, developers often like to experiment with actual examples or code snippets. An API portal with the ability to execute calls directly from the documentation will allow the developer to more readily digest examples without switching back and forth between the portal and the development environment. Monitoring and Metering Whether exposing APIs to employees or to external developers, performance and usage indicators are essential. In either case, API usage is an indicator of popularity for apps and for the APIs themselves. This data is also useful for capacity planning. These become more critical when charging for access in that developers typically pay for what they use. Both the API provider and the app developer should therefore have clear visibility of usage over time. Even for free APIs, usage information will help identify what is or isn t popular, suggesting areas for future investment. Other metrics, such as documentation access and API error rates can provide an opportunity to proactively respond to issues. 9

10 Cross-Platform Development The final component of the mobile middleware stack deals with app development. There have traditionally been two approaches for enabling mobile access: web browsers and native apps. Web browsers, as previously discussed, deliver poor user experience in many cases. Native apps, however, tend not to be portable due to lack of consistent language, feature and SDK support from the underlying platforms. Intel API Manager Portal (on-prem or SaaS) ios* Amazon* Android* Windows* 8 Nook* Intel XDK on software.intel.com/html5 Developer Apps Facebook* Appup* Chrome* WebApp HTML5 has emerged as a viable source to create apps targeting multiple mobile devices, and take advantage of native features such as the accelerometer and location awareness. This approach has the benefit of leveraging the vast community support of HTML5 and the availability of numerous libraries and frameworks with business friendly licenses. Once built and packaged, HTML5 based apps can be distributed and accessed on mobile devices during runtime just as you would native mobile apps. Mobile app developers go through a development cycle involving architecture/ design -> program -> test -> debug -> package -> on-device test -> push updates. A significant portion of the development cycle - other than on-device testing - is done on the desktop. Challenges faced by HTML5 mobile app developers include the following: Ability to emulate multiple devices and screens during the development cycle to create apps that are responsive Ability to emulate features that are native to the mobile device, such as location on the desktop development platform Figure 11: Client Development Workflow Creating packaging targets for multiple deployments such as ios, Android, Windows or Tizen Achieving optimal performance on native devices Developers may also have needs for automation tools to assist in migrating apps from an existing native format such as objective-c to HTML5. Concluding Thoughts: Mobile Middleware The rapid growth of mobile devices presents enterprises with new opportunities to empower their employees, engage their customers and tap new revenue sources. APIs are the catalyst that can enable these changes. Securely exposing APIs beyond the corporate firewall can introduce new risks, and can result in poor user experience if not done carefully. It can also be challenging to keep up with mobile device vendors as they innovate with new form factors and platform capabilities. Mobile middleware can ease this transition, providing security, metrics, developer support and cross-platform compatibility. This is a relatively new field, with few comprehensive, enterprisegrade offerings. Our intent with this Buyer s Guide has been to offer a set of recommendations that will aid the enterprise evaluating solutions for API management as they begin to expose new and legacy services to mobile devices. 10

11 Mobile Middleware Checklist The table below may be helpful when reviewing internal and service provider tokenization options and when comparing vendor solutions. Table 1: Mobile Middleware Checklist Task or Feature Preparation Are you deploying apps aimed at employees, customers or both? Provider Response Have you documented the initial set of internal APIs to be exposed? Are your existing APIs using SOAP or REST, XML or JSON? APIs & Integration Does the solution offer the ability to mediate the necessary formats, such as SOAP to REST and/or XML to JSON? Does the solution support filtering an API call to limit the data being exposed through the firewall? Does the solution allow an API to be presented that is actually composed of a mash-up of multiple API calls on the back end? Does the middleware support JSONP for HTML5 based mobile applications? Do you support making data available internal systems such as Microsoft SharePoint, Oracle e-business Suite and SAP direct to mobile devices? Do you support secure integration with analytics systems, such as HBase and Hadoop, for exposing analytics information to mobile devices? Do you support making data available to mobile devices from traditional database systems? Do you support throttling of API calls based on identities, location and service level? Do you support mediation of protocols to surface legacy services such as SOAP, JMS, FTP, Raw TCP and Custom protocols as RESTful APIs? Do you support high-performance, full-duplex protocols such as WebSockets? Do you support multiple deployment options for an API developer portal, SaaS and On-Premise? Do you support translation of legacy data format to JSON, such as Word, Excel, PDF, HL7, EDI, Flat files and proprietary binary formats? Security Do you support tokenization of credit card data (PAN data)? Do you support McAfee Data Loss Prevention (or similar)? Do you support integration with a FIPS hardware security module? Do you support high performance SSL termination and acceleration? Do you support content attack protection for HTTP, XML and JSON based threats on inbound API calls? Do you support message level security and format preserving encryption (FPE)? Do you support anti-virus and anti-malware checks on inbound data? Do you support adaptive Denial of Service protection? Do you support API Key-based authentication? Do you support OAuth 2.0? Can you support multiple form factors? Hardware appliance for DMZ security and virtual appliances for cloud deployments? Do you support mapping from API keys to traditional enterprise identity management credentials such as LDAP, Active Directory and Kerberos Tokens? Other Issues Is security expertise a core strength of the solution provider (or the enterprise if solution is internal)? Is the provider financially sound? Have you updated your risk assessment (PCI Requirement ) to reflect tokenization and potential risk if tokenization vendor or application is compromised? Have you updated security awareness training (PCI Requirement 12.6) to reflect tokenization? Will the vendor acknowledge in writing their responsibility for protecting your PAN data (PCI Requirement 12.8)? Have you updated your incident response plan (PCI Requirement 12.9) to reflect tokenization (e.g. tokenization failure; vendor failure; physical or logical breach)? 11

12 Paper Sponsorship Intel and Mashery co-sponsored the production of this Buyer s Guide in order to illustrate the many facets of an enterprise mobile application development program. Intel and Mashery have introduced the Intel Expressway API Manager, powered by Mashery, an enterprise-grade platform for securely exposing enterprise APIs to mobile devices. The Intel HTML5 Development Environment addresses development cycle challenges with the Intel XDK - Cross platform development kit enabling write it once, deploy to many apps. Intel HTML5 App Porter Tool - BETA (for Windows 8*) is a stand-alone application that helps mobile developers translate portions of their application from ios to HTML5. About Intel Expressway Service Gateway Intel Expressway Service Gateway is a software appliance designed to securely expose or consume application services/apis on-premise or in the cloud. The product implements the mobile middleware design pattern that bridges the gap between legacy apps and the sea of heterogeneous mobile platforms, operating systems and programming languages used today. The traditional 3-tier web architecture is collapsed into a single application proxy that handles all API and service security, including OAuth, secure integration and mediation to external cloud services, high performance data translation, especially for JSON content. About Mashery Mashery is the world s leading provider of API technology and services. Mashery has helped more than 175 top brands including USA TODAY, Comcast, Hoover s, Klout, Associated Press, RDIO and Travelocity take advantage of APIs to build new revenue channels, speed time-to-market and spur innovation. Mashery s unique, holistic approach to API management encompasses working with clients to craft profitable platform strategies, ensuring fast, reliable API access and facilitating relationships with our network of 200,000 developers. About Intel Expressway API Manager (powered by Mashery) For API Management, Intel has packaged the market leading Mashery API sharing portal with Intel Expressway Service Gateway to deliver Intel Expressway API Manager. The seamless integration of an on-premise gateway for API enablement coupled with a hosted API management service provides the ideal, best-of-breed architecture for enterprises looking to maximize security, performance and developer adoption for their API assets. More Information Intel API Resource Site: cloudsecurity.intel.com Mashery: mashery.com Intel XDK: Americas: asipcustomercare@intel.com INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. UNLESS OTHERWISE AGREED IN WRITING BY INTEL, THE INTEL PRODUCTS ARE NOT DESIGNED NOR INTENDED FOR ANY APPLICATION IN WHICH THE FAILURE OF THE INTEL PRODUCT COULD CREATE A SITUATION WHERE PERSONAL INJURY OR DEATH MAY OCCUR. Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked reserved or undefined. Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice.do not finalize a design with this information. The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling , or by visiting Intel s Web site at Copyright 2013 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. Printed in USA Please Recycle MMW-White-Paper

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage

Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security

More information

How To Reduce Pci Dss Scope

How To Reduce Pci Dss Scope WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS

More information

Security to Connect Back-end APIs with HTML5 Cross Platform Apps

Security to Connect Back-end APIs with HTML5 Cross Platform Apps API Security to Connect Back-end APIs with HTML5 Cross Platform Apps Andy Thurai, CTO, Intel Big Data & Application Security Software Twitter: @AndyThurai Blog: www.thurai.net/securityblog Intel software

More information

A Comprehensive Solution for API Management

A Comprehensive Solution for API Management An Oracle White Paper March 2015 A Comprehensive Solution for API Management Executive Summary... 3 What is API Management?... 4 Defining an API Management Strategy... 5 API Management Solutions from Oracle...

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

How To Manage A Plethora Of Identities In A Cloud System (Saas)

How To Manage A Plethora Of Identities In A Cloud System (Saas) TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

The bridge to delivering digital applications across cloud, mobile and partner channels

The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway a foundational component in an API-first architecture for digital business provides

More information

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility

ORACLE MOBILE SUITE. Complete Mobile Development Solution. Cross Device Solution. Shared Services Infrastructure for Mobility ORACLE MOBILE SUITE COMPLETE MOBILE DEVELOPMENT AND DEPLOYMENT PLATFORM KEY FEATURES Productivity boosting mobile development framework Cross device/os deployment Lightweight and robust enterprise service

More information

5 Pillars of API Management with CA Technologies

5 Pillars of API Management with CA Technologies 5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional

More information

Build Your Mobile Strategy Not Just Your Mobile Apps

Build Your Mobile Strategy Not Just Your Mobile Apps Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need

More information

Introduction to IBM Worklight Mobile Platform

Introduction to IBM Worklight Mobile Platform Introduction to IBM Worklight Mobile Platform The Worklight Mobile Platform The Worklight Mobile Platform is an open, complete and advanced mobile application platform for HTML5, hybrid and native apps.

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

Integrating Web Messaging into the Enterprise Middleware Layer

Integrating Web Messaging into the Enterprise Middleware Layer The increasing demand for real-time data has companies seeking to stream information to users at their desks via the web and on the go with mobile apps. Two trends are paving the way: o Internet push/streaming

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Affordable Building Automation System Enabled by the Internet of Things (IoT) Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,

More information

Helping organizations secure and govern application services for SOA, Web and the Cloud

Helping organizations secure and govern application services for SOA, Web and the Cloud Helping organizations secure and govern application services for SOA, Web and the Cloud SOA WEB CLOUD layer7tech.com info@layer7tech.com @layer7 Layer 7 offers industry-leading XML security, runtime SOA

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms EXECUTIVE SUMMARY Intel Cloud Builder Guide Intel Xeon Processor-based Servers Red Hat* Cloud Foundations Intel Cloud Builder Guide: Cloud Design and Deployment on Intel Platforms Red Hat* Cloud Foundations

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Platforms Ubuntu* Enterprise Cloud Executive Summary Intel Cloud Builder Guide Intel Xeon Processor Ubuntu* Enteprise Cloud Canonical*

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

An Enterprise Architect s Guide to API Integration for ESB and SOA

An Enterprise Architect s Guide to API Integration for ESB and SOA An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.

More information

Improve your mobile application security with IBM Worklight

Improve your mobile application security with IBM Worklight Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security

More information

Cisco Enterprise Mobility Services Platform

Cisco Enterprise Mobility Services Platform Data Sheet Cisco Enterprise Mobility Services Platform Reduce development time and simplify deployment of context-aware mobile experiences. Product Overview The Cisco Enterprise Mobility Services Platform

More information

Intel Service Assurance Administrator. Product Overview

Intel Service Assurance Administrator. Product Overview Intel Service Assurance Administrator Product Overview Running Enterprise Workloads in the Cloud Enterprise IT wants to Start a private cloud initiative to service internal enterprise customers Find an

More information

Oracle Cloud Platform. For Application Development

Oracle Cloud Platform. For Application Development Oracle Cloud Platform For Application Development Cloud computing is now broadly accepted as an economical way to share a pool of configurable computing resources. 87 percent of the businesses that participated

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper

MOBILIZING ORACLE APPLICATIONS ERP. An Approach for Building Scalable Mobility Solutions. A RapidValue Solutions Whitepaper MOBILIZING ORACLE APPLICATIONS ERP An Approach for Building Scalable Mobility Solutions A RapidValue Solutions Whitepaper TABLE OF CONTENTS Executive Overview Typical Architecture for Mobilizing Oracle

More information

IBM Tivoli Directory Integrator

IBM Tivoli Directory Integrator IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,

More information

IBM API Management Overview. 2014 IBM Corporation

IBM API Management Overview. 2014 IBM Corporation IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential

More information

Intel HTML5 Development Environment Article Using the App Dev Center

Intel HTML5 Development Environment Article Using the App Dev Center Intel HTML5 Development Environment Article Using the App Dev Center v1.06 : 06.04.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Creating a Strong Security Infrastructure for Exposing JBoss Services

Creating a Strong Security Infrastructure for Exposing JBoss Services Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

API Management Introduction and Principles

API Management Introduction and Principles API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common

More information

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software

Real-Time Big Data Analytics SAP HANA with the Intel Distribution for Apache Hadoop software Real-Time Big Data Analytics with the Intel Distribution for Apache Hadoop software Executive Summary is already helping businesses extract value out of Big Data by enabling real-time analysis of diverse

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST

ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST Considerations for choosing a secure, scalable, and reliable enterprise mobile backend platform OVERVIEW Organizations often struggle with identifying

More information

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features

SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features SAP Mobile - Webinar Series SAP Mobile Platform 3.0 Security Concepts and Features Dirk Olderdissen Solution Expert, Regional Presales EMEA SAP Brought to you by the Customer Experience Group 2014 SAP

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

SharePoint 2013 Logical Architecture

SharePoint 2013 Logical Architecture SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing

More information

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms

Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0

OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 sm OPEN DATA CENTER ALLIANCE USAGE Model: Software as a Service (SaaS) Interoperability Rev 1.0 SM Table of Contents Legal Notice... 3 Executive Summary... 4 Purpose... 5 Assumptions... 5 SaaS Interoperability

More information

IBM s Mobile Enterprise Strategy. 2012 IBM Corporation

IBM s Mobile Enterprise Strategy. 2012 IBM Corporation IBM s Mobile Enterprise Strategy Mobile is changing conventions for industries Healthcare Construction Government From: Traditional health institution To: Seamless interactions among physicians and providers,

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business

SOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.

More information

API Architecture. for the Data Interoperability at OSU initiative

API Architecture. for the Data Interoperability at OSU initiative API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models

More information

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software

Take Your Rocket U2 Apps Mobile with Rocket LegaSuite. Greg Mummah, Product Manager Rocket Software Take Your Rocket U2 Apps Mobile with Rocket LegaSuite Greg Mummah, Product Manager Rocket Software Greg Mummah Product Manager Managed application modernization team at municipal government software vendor

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

AquaLogic Service Bus

AquaLogic Service Bus AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement

Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Enterprise On The Go: 5 Essentials For BYOD & Mobile Enablement Introduction: The Opportunities & Challenges of Enterprise Mobility Apps & the Enterprise The existence of smartphones and tablets able to

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution Smart SOA application integration with WebSphere software To support your business objectives Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

APIs The Next Hacker Target Or a Business and Security Opportunity?

APIs The Next Hacker Target Or a Business and Security Opportunity? APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone

More information

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development

More information

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms

Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Intel Cloud Builders Guide Intel Xeon Processor-based Servers RES Virtual Desktop Extender Intel Cloud Builders Guide to Cloud Design and Deployment on Intel Platforms Client Aware Cloud with RES Virtual

More information

The Case for Rack Scale Architecture

The Case for Rack Scale Architecture The Case for Rack Scale Architecture An introduction to the next generation of Software Defined Infrastructure Intel Data Center Group Pooled System Top of Rack Switch POD Manager Network CPU/Memory Storage

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE

TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE White Paper TRANSITIONING ENTERPRISE CUSTOMERS TO THE CLOUD WITH PULSE SECURE Pulse Connect Secure Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and

More information

HOW TO BUILD AN ENTERPRISE APl PLATFORM 20 WAYS. TO BETTER DELIVER, MANAGE & SECURE APIs

HOW TO BUILD AN ENTERPRISE APl PLATFORM 20 WAYS. TO BETTER DELIVER, MANAGE & SECURE APIs HOW TO BUILD AN ENTERPRISE APl PLATFORM Powering The APl Economy Mobile & Cloud Computing have fundamentally changed the way we interact with companies we do business with. Today s consumer and business

More information

Fast, Low-Overhead Encryption for Apache Hadoop*

Fast, Low-Overhead Encryption for Apache Hadoop* Fast, Low-Overhead Encryption for Apache Hadoop* Solution Brief Intel Xeon Processors Intel Advanced Encryption Standard New Instructions (Intel AES-NI) The Intel Distribution for Apache Hadoop* software

More information

CA Clarity Integration

CA Clarity Integration CA Clarity Integration Delivering Complete Cost, Resource and Change Visibility for IT Management CA has led the industry in providing integrated solutions. Enterprise IT Management (EITM) is CA s vision

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center

Infrastructure for more security and flexibility to deliver the Next-Generation Data Center Infrastructure for more security and flexibility to deliver the Next-Generation Data Center Stefan Volmari Manager Systems Engineering Networking & Cloud Today's trends turn into major challenges Cloud

More information

Vodafone Total Managed Mobility

Vodafone Total Managed Mobility Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

MOBILE MICROAPPS. The shortest path to enterprise mobility

MOBILE MICROAPPS. The shortest path to enterprise mobility MOBILE MICROAPPS The shortest path to enterprise mobility Abstract In the most general case, enterprise mobility is a tough problem requiring a big investment in the IT infrastructure, skills, and processes.

More information

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration

Intel HTML5 Development Environment. Article - Native Application Facebook* Integration Intel HTML5 Development Environment Article - Native Application Facebook* Integration V3.06 : 07.16.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com

Mobile Identity and Edge Security Forum Sentry Security Gateway. Jason Macy CTO, Forum Systems jmacy@forumsys.com Mobile Identity and Edge Security Forum Sentry Security Gateway Jason Macy CTO, Forum Systems jmacy@forumsys.com Evolution Evolution of Enterprise Identities Cloud Computing Iaas Infrastructure as a Service

More information

Cloud based Holdfast Electronic Sports Game Platform

Cloud based Holdfast Electronic Sports Game Platform Case Study Cloud based Holdfast Electronic Sports Game Platform Intel and Holdfast work together to upgrade Holdfast Electronic Sports Game Platform with cloud technology Background Shanghai Holdfast Online

More information

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems

Intel Active Management Technology Embedded Host-based Configuration in Intelligent Systems WHITE PAPER Intel vpro Technology Embedded Host-based Configuration in Intelligent Systems Easy activation of Intel vpro technology remote manageability without trade-offs in security, functionality, and

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Integrating Mobile apps with your Enterprise

Integrating Mobile apps with your Enterprise Integrating Mobile apps with your Enterprise Jonathan Marshall marshalj@uk.ibm.com @jmarshall1 Agenda Mobile apps and the enterprise Integrating mobile apps with Enterprise Applications Mobile apps and

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus

An Oracle White Paper October 2013. Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus An Oracle White Paper October 2013 Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Maximize the Benefits of Oracle SOA Suite 11g with Oracle Service Bus Table of Contents Introduction...

More information

How To Develop A Mobile Application On An Android Device

How To Develop A Mobile Application On An Android Device Disclaimer: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver

More information

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server

Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Secure Payment Transactions and Consumer Information from Point-of-Sale to the Server Intel delivers flexible, end-to-end data protection for retail point-of-sale transactions any device, anywhere, anytime.

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

API Management Buyers Guide. White Paper

API Management Buyers Guide. White Paper API Management Buyers Guide White Paper What Is an API? The value of your software, data, or other digital assets can be dramatically increased by reaching new audiences. This is possible through the use

More information

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS

Securely. Mobilize Any Business Application. Rapidly. The Challenge KEY BENEFITS Mobilize Any Business Application. Rapidly. Securely. The Challenge Today's enterprises are increasingly leveraging mobility solutions to improve productivity, decrease response times and streamline operational

More information

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary

Intel HTML5 Development Environment. Tutorial Building an Apple ios* Application Binary Intel HTML5 Development Environment Tutorial Building an Apple ios* Application Binary V1.02 : 08.08.2013 Legal Information INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO

More information

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms

Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Intel Cloud Builder Guide to Cloud Design and Deployment on Intel Xeon Processor-based Platforms Enomaly Elastic Computing Platform, * Service Provider Edition Executive Summary Intel Cloud Builder Guide

More information

Intel Network Builders

Intel Network Builders Intel Network Builders Nakina Systems Solution Brief Intel Xeon Processors Intel Network Builders Nakina Systems and Intel Make NFV Network Operational Introduction Every great generation of computing

More information

An Oracle White Paper May 2012. Oracle Database Cloud Service

An Oracle White Paper May 2012. Oracle Database Cloud Service An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing

More information

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF

A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF A viable alternative to TMG / UAG Web Application security, acceleration and authentication with DenyAll s DA-WAF Whitepaper 08/17/2015 Summary 1. Introductio... 3 1.1 What is TMG / UAG?... 3 2. How can

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

ORACLE DATA INTEGRATOR ENTERPRISE EDITION

ORACLE DATA INTEGRATOR ENTERPRISE EDITION ORACLE DATA INTEGRATOR ENTERPRISE EDITION ORACLE DATA INTEGRATOR ENTERPRISE EDITION KEY FEATURES Out-of-box integration with databases, ERPs, CRMs, B2B systems, flat files, XML data, LDAP, JDBC, ODBC Knowledge

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Oracle White Paper December 2013. Mobility for Oracle Applications using Fusion Middleware

Oracle White Paper December 2013. Mobility for Oracle Applications using Fusion Middleware Oracle White Paper December 2013 Mobility for Oracle Applications using Fusion Middleware Overview There is a change going on in how people access information that is as dramatic as when PCs replaced green

More information

Why Big Data in the Cloud?

Why Big Data in the Cloud? Have 40 Why Big Data in the Cloud? Colin White, BI Research January 2014 Sponsored by Treasure Data TABLE OF CONTENTS Introduction The Importance of Big Data The Role of Cloud Computing Using Big Data

More information

2 4 5 6 7 9 11 13 14 15 16

2 4 5 6 7 9 11 13 14 15 16 Contents 2 Why a mobile application platform? 4 Gearing organizations to become MOBILE-FIRST 5 6 Mobile Mantras for Enterprise App Projects 6 Mantra 1: It takes a village to raise an app 7 Mantra 2: Use

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

ORACLE WEBCENTER PORTAL

ORACLE WEBCENTER PORTAL ORACLE WEBCENTER PORTAL A MODERN ENTERPRISE PORTAL WITH INTUITIVE TOOLS FOR COMPOSING CONTENT-RICH SELF- SERVICE PORTALS WITH INTEGRATED SOCIAL AND COLLABORATION SERVICES KEY FEATURES Enterprise-Grade

More information

Zend and IBM: Bringing the power of PHP applications to the enterprise

Zend and IBM: Bringing the power of PHP applications to the enterprise Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages

More information