Enterprise-class API Patterns for Cloud & Mobile
|
|
|
- Patrick Green
- 10 years ago
- Views:
Transcription
1 May 2012 Enterprise-class API Patterns for Cloud & Mobile Sponsored by
2 Contents Foreword: The API Is the New Website 1 Requirements for Enterprise APIs 2 Standards for Consuming and Exposing APIs 2 Enterprise-Class Security 3 Visibility and Control 4 The API Gateway: A Control Point for the App Economy 5 Gateway Usage Patterns 6 Supporting Partners with APIs and Web Services 6 Supporting Mobile Use of Enterprise Services 7 Controlling Use of Cloud Infrastructure as a Service (IaaS) 8 Controlling Use of Platform as a Service (PaaS) 9 Projecting Security Policy on (or Just Controlling) Data in the Cloud 10 Securing Cloud Applications (Software as a Service) 10 Monetizing an API 12 About The Contributors 13
3 1 Foreword: The API Is the New Website by John Musser, Founder, ProgrammableWeb We live in an app economy. Increasingly, the primary digital mode of engagement between businesses and their customers, partners, and even employees is through apps. To deliver services via apps, most businesses develop application programming interfaces (APIs) that support machine-to-machine interactions over the Web. Programmable Web has determined that there are more than 5,000 APIs available on the Web today, up from near zero in Growth has been exponential (Figure 1). Of the dozens of categories and thousands of APIs tracked by ProgrammableWeb, one of the fastest growing categories is the enterprise category businesses communicating with each other. One of the main reasons is the rapid adoption of cloud and cloud-based technologies within the enterprise, whether it s through the CIO s office or through the side door. Cloud solutions are primarily integrated through APIs. Think of APIs as the glue of software as a service (SaaS). APIs are the way that data gets into and out of the cloud, and from enterprise to enterprise. Figure 1. APIs: Growth is accelerating (Source: Programmable Web) In many ways, APIs are the websites of this generation. In 1995, businesses were asking, Why do I need a website? By 2000, every business needed to say, Of course we have a website. In 2007, everyone was asking, What is an API and why do I need one? Now, the pressure is on to say, Of course we have an API! Not only will every company eventually have an API; many of them will soon have multiple APIs for different purposes. It s only now that enterprises are learning best practices for running and securing APIs. It s not enough to offer an API; it needs to be reliable, scalable, and secure. Many enterprises don t really know how to offer APIs with the same security and service level as their enterprise applications. Until now, the use of APIs grew organically at the department level on an app-by-app, partner-by-partner basis, with no enterprise IT standards or architecture enforcement. This has not changed, even as most companies have adopted APIs. The vast majority of developers today are trained and working in a lightweight, simple architectural style called REST (Representational State Transfer), which is ideal for the biggest sector of the app market, mobile devices. But many of the first-generation APIs were written using SOAP (Simple Object Access Protocol) or other variations on web services. Enterprises offering APIs will need to speak REST to the outside world in order to continue to grow (Figure 2).
4 2 Figure 2. REST versus SOAP: Simplicity wins again (Source: Programmable Web) Requirements for Enterprise APIs This paper, with insight from Dan Woods, coauthor of APIs: A Strategy Guide (O Reilly Media, 2011), describes several API usage patterns. By adapting these patterns, enterprises will be able to follow best practices in API security. Before covering these patterns, this section describes enterprise architecture requirements for designing, building, managing, and protecting APIs. Standards for Consuming and Exposing APIs In the early days, most APIs were built based purely on SOAP standards. More recently, multiple standards have emerged, such as REST and JSON (JavaScript Object Notation). Additionally, enterprises need to mediate between these standards and design patterns on the back end of their technology stack, which is not changing as quickly as the front end. Today, a typical organization works with between 5 and 15 cloud providers. Any department could write a connection to consume a cloud service such as Amazon Web Services, Google Apps, or Salesforce.com. Here are just a few of the problems with this approach: Security is commonly hard-coded per provider. The security protocols must be compatible for each relationship. Each new hole in the enterprise security perimeter increases exposure to threats and vulnerabilities. Also, many providers do not provide any security, or only minimal security, at the network level. It is hard to find a provider that can support application-level security that meets enterprisegrade needs. Each department maintains different financial, SLA, and technical support agreements with each provider, which results in engineering building one-off solutions that do not share infrastructure. Maintaining multiple one-off solutions, with no common standards, becomes a major headache. Auditing is problematic, with no easy way to identify redundant and critical services.
5 3 The more APIs you consume, the more you have to worry about management and compliance. Compliance is a major issue if you are an insurance, healthcare, financial, or banking company. You need to implement proper policies for exposure, consumption, and availability of services based on the standard that you need to comply with (such as HIPAA, SOX, COBIT, PCI, and so on). Exposing an internal application may require mediation with existing infrastructure, which is not necessarily primed for communication on the open Internet. Individual applications are exposed on app servers that may not be security-hardened or scalable. The mix of technologies in a large enterprise, from mainframe applications to web servers, all speak different languages and use different transport and security protocols (see Figure 3). Commonly, management of API keys presents the single biggest challenge for IT. Enterprise-Class Security Enterprise-class security includes authentication, authorization, and perimeter defense. Authentication in APIs provides a way to ask the question: Is the entity making this request really who they say they are? OAuth is the predominant API authentication model, used especially by organizations with APIs associated with websites or mobile applications that require passwords. By creating a token that exists only during application handshake, OAuth prevents password propagation around the Internet. It is best suited for large groups of unknown developers trying to access your API. It is also lightweight and relatively easy to use; new school developers are quickly becoming fluent in OAuth. Enterprise developers may be more familiar with authentication mechanisms such as X.509 certificates, Security Assertion Markup Language (SAML) and Figure 3. Consuming APIs: A Wild West Approach
6 4 two-way Secure Sockets Layer (SSL), which are implemented as part of web service standards colloquially known as WS- *. However, an authenticated client can still pose a threat. Attacks such as denial-of-service, code injection, malware, and data leaks must all be accounted for when designing an enterprise API strategy. Tactics such as data validation, input validation, pattern-based scanning, heuristics, antivirus scanning, and malware scanning can mitigate these threats. Authorization provides a means of asking, Is this entity allowed to do what it is attempting to do? The most prominent API authorization model is XACML (extensible Access Control Markup Language), which decouples authorization from the point of use (in other words, the application itself). With XACML, authorization policies can be updated on the fly and affect all clients immediately. Perimeter defense must also be considered. Every time your data crosses the edge of an application, enterprise firewall, or the cloud, a vulnerability is exposed. Enterprise, cloud, and application edge security must be built into any enterprise API scheme, as it provides the earliest form of detection. Visibility and Control Most enterprises lack overarching visibility into and control of APIs. Departments often provision their own computing services from the cloud, frequently provided via APIs. Typically, these services include the following three major categories: Infrastructure as a Service (IaaS): Cloud providers offer physical and virtual machines, storage, firewalls, load balancers, and network connections based in large data centers. The cloud user is usually responsible for patching and maintaining the operating systems and application software. Providers bill IaaS services on a utility basis cost reflects the amount of resources consumed. Platform as a Service (PaaS): The cloud provider delivers a computing platform that includes an operating system, programming language execution environment, database, and web server. In some offerings, resources scale automatically to meet demand. Software as a Service (SaaS): Application software is installed by cloud providers and cloud users access the software remotely. This hands-free approach means the software can scale and apportion itself according to demand without intervention by the user. Typically users do not manage the infrastructure or platform. SaaS and PaaS providers are circumventing traditional enterprise architecture. Compliance and visibility has decreased. Simply put, your enterprise is likely already part of the app economy. The question is, how are you managing your API traffic? Do you have a control point to manage that participation? Enterprise APIs are not science projects; they re conducting enterprise-class business and require enterpriseclass visibility and control. What path can enterprises take to prepare for secure use of APIs?
7 5 The API Gateway: A Control Point for the App Economy The path to security, reliability, and scalability comes through an API gateway design pattern, typically instantiated by a network edge gateway software appliance, sometimes called a security or service gateway. An API gateway acts as a control point between enterprise IT infrastructure and the outside world accessed through APIs, including the cloud. Functions of API gateways may include: Location virtualization: API Gateways allow you to invoke services that run anywhere, any time and allow you to seamlessly move your services around at will without affecting your infrastructure. Version control: API gateways provide API version control and abstraction. Centralized security and policy enforcement: API gateways centralize security and policy enforcement, without having to hard-code security into individual applications. Gateways offer security architects and developers flexibility for custom coding where needed and also provide a way to apply security policy, routing, services, or outof-the-box security functions such as encryption and authentication. Global event visibility: Gateways can improve visibility with dashboards that facilitate an understanding of incidents across APIs, such as coordinated malware attacks. Gateways can be designed to track API service call activity for security event reporting or chargebacks. Since they intermediate all transactions as a proxy, API gateways supply rich audit trails, coordinated analysis, and detailed monitoring across previously siloed and separate department implementations. Security Information and Event Management (SIEM) capability is also provided, providing real-time analysis of security alerts generated by network hardware and applications. Figure 4. API gateways serve as an intermediary between the enterprise and external APIs
8 6 Cloud Service Brokers: A Role that Simplifies Consumption of Cloud APIs/Services IT is evolving from an implementer of point-to-point integration and infrastructure for cloud services into an orchestrator of services consumed by internal department-level developers. Today, your organization might be managing cloud services from a dozen providers. Tomorrow, when this number explodes, point-to-point management of all of these services, including billing, governance, security, and authentication, will not be a viable option. Use of an API gateway delivers a key technology enablement platform so that your IT department can become what Gartner Group calls a cloud service broker (CSB). Additionally, many third-party companies are becoming CSBs themselves to package and deliver services or integrations for vertical industries. Analyst consensus estimates that by 2015, 20% of all cloud services will be intermediated by CSBs. A cloud service broker is an emerging role for IT or intermediaries, and an API gateway is the centerpiece technology platform that enables this usage model. Gateway Usage Patterns An enterprise API gateway can be advantageous in many contexts. This section describes several usage patterns. Supporting Partners with APIs and Web Services Business usage model: API gateways are most frequently used to ensure that two businesses have as frictionless an interaction as possible. To support automated exchange of information and process integration, many companies expose assets in the hopes of drawing in more revenue, expanding their partner bases in the process. One well-known use case is Netflix s integration with more than 200 hardware devices, from Roku to Xbox, vastly expanding its subscriber base. Figure 5. Supporting Partners Pattern
9 7 To successfully expose assets, legacy protocols need to be translated. Attempting to do this sequentially, partner-by-partner, seriously inhibits scalability and time-to-market. API gateway solution: The API gateway mitigates risk by offering enterprise-edge security. In this model, the REST API is exposed on the gateway, which can be onpremise in a secured DMZ or a virtual appliance in a trusted network. REST requests are translated to SOAP so that backend applications don t have to be rewritten. Security is enforced at the gateway, not on the backend. Supporting Mobile Use of Enterprise Services Business usage model: In order to reach consumers (and increasingly, partners and employees), you need mobile apps. A mobile API, however, can open up access to enterprise systems, which creates a security problem. Via mobile device, anyone could send a function call directly into your enterprise. Worse, mobile devices are mass-market devices, multiplying the number of potential security holes very quickly. This contrasts traditional partner integration, where partners were a mere handful. Mobile devices can bring potentially millions of messages a day from thousands of devices. You need a control point to handle traffic and minimize impact on backend application servers a type of mobile middleware. API gateway solution: The gateway maintains security and manages volume and complexity as you expose enterprise applications via mobility. The gateway manages perimeter defense, scanning messages for malicious content. It also manages changes to mobile platform APIs centrally. The gateway speaks REST and JSON, which, combined with the volume of API calls, demands a responsive, scalable platform that can serve requests while maintaining the integrity of enterprise apps. In this use case, the gateway authenticates the client and obtains authorization using OAuth. API responses are typically sent as a JSON payload for native mobile appli- Figure 6. Mobile Use Pattern
10 8 cations, which interpret them into an object for use in the native mobile application programming environment. Controlling Use of Cloud Infrastructure as a Service (IaaS) Business usage model: With service providers such as Rackspace or Amazon Web Services, your organization runs virtual machines (VMs) on hardware in third-party data centers. Savings accrue because you can run applications on rented computing power without paying for on-premise resources. To offer more direct and rapid integration, these providers offer VM control via HTTPbased API calls rather than through a web console. Simply put, they offer API controls for virtual machines. These APIs allow administrators to apportion the infrastructure devoted to a given enterprise application with simple, easy to use REST function calls. API gateway solution: The gateway lets organizations take advantage of API controls for running VMs in the cloud. The configuration of, and access to, cloud-based infrastructure can be managed from a central place. The gateway can also act in a client capacity by securing and mediating these REST API calls. The API gateway provides a façade or standard abstraction layer for developers. This allows the enterprise to easily switch between multiple cloud IaaS providers without expensive ripand-replace of custom code. The gateway can prevent VM creations or deletions from rogue users or unauthorized users. Role-based rules can help manage the sprawl of multiple VMs in the cloud for cost savings and provide audit controls on external VM usage. Further, the gateway can interface with your enterprise LDAP, extending existing roles, and access control policies for provisioning new VM infrastructure, without creating a need to twist your existing identity system to meet the whim of the cloud provider. Without a gateway, setting up rules about who can set up or terminate a VM in the cloud becomes a custom development project, done ad hoc, per provider. Terminating a VM might lead to the loss of a vital business service. Figure 7. Infrastructure as a Service Pattern
11 9 Adding a raft of unauthorized VMs to your cloud wastes money. Without a gateway, IT must hard-code authentication tokens into every application it hosts in the cloud, a barrier to the promised savings and efficiency of cloud computing. Controlling Use of Platform as a Service (PaaS) Business usage model: Many enterprises are building software as a service (SaaS) apps themselves, using PaaS providers such as Heroku, Force.com, and Engine Yard. A gateway can secure, propagate, and manage these apps. Building SaaS apps on PaaS providers platforms implies a heavy reliance on the providers security controls, which are generic to attract the widest customer base, but often weak. There is no guarantee that enterprise policies will work in a cloud-based app built on these platforms with their given toolsets. API gateway solution: Using an API gateway for PaaScreated applications offers better authentication and encryption protection, including OAuth, SSL, shared secrets, or signatures. A gateway in a virtual form factor allows you to put your enterprise security policies in the cloud. The gateway applies policies to data as it enters a hosted application or database, so your enterprise policies can be protected while still gaining the advantage of a cloud-based deployment. API gateways are available as cloud-based virtual machines, which means the same cost savings offered by the cloud provider can be extended to the gateway itself and it will be operationally closer to the cloud assets you create. Figure 8. Platform as a Service Pattern
12 10 Figure 9. Data in the Cloud Pattern Projecting Security Policy on Data in the Cloud Business usage model: Many enterprise applications now use data from a combination of internal databases and data from cloud-based PaaS providers, such as Dun & Bradstreet, Data.com, and Salesforce. When data is split between the cloud and the enterprise, business risk is increased because core business systems are exposed. It s vital that security and control mechanisms for externally hosted data are as robust as those for on-premise data. The enterprise application needs to authenticate itself to the cloud service using a method such as API keys or shared secrets. Each cloud service is likely to use a variant of several of these methods. API gateway solution: The API gateway can manage sharing of sensitive data between the enterprise and cloud-based PaaS providers. The gateway can encrypt or tokenize portions of the data, such as personally iden- tifiable information (PII) or intellectual property. With encryption, the enterprise keeps the keys and can determine how to protect data before it is sent to the cloud. The gateway can keep a copy of the API call before it s sent, in case the data payload doesn t come back, by caching a copy in a secure area or database under the enterprise s control. The gateway can abstract the interface to the cloud services so that authentication can be managed in a standardized way, regardless of the combination of methods used by the cloud service. Securing Cloud Applications (Software as a Service) Business usage model: Self-service is one of the biggest trends in today s enterprise. Many popular business services are offered in the cloud. However, resolving security issues associated with these services may neces-
13 11 sitate expensive development on the provider side. The multiple relationships between business users in departments have become a management nightmare for IT, which has no practicable way to enforce enterprise policies in cloud-based apps hosted by third parties. API gateway solution: The API gateway is a valuable architectural addition when Enterprises or Service The gateway offers advanced, out-of-the-box security features to improve the security posture provided by SaaS operators, which often lack these features. The built-in security of a gateway saves tremendous amounts of money and resources that would otherwise be spent on patching the security holes left by SaaS providers. An API gateway is a critical component that extends the Figure 10: SaaS Pattern Providers are building their own SaaS applications. It lets you scale your SaaS applications more easily while protecting a wide range of clients, internally and externally. Alternatives to this architecture place more software development, security and performance burdens on the web server and application server tier, which are really designed for end-user communication, not API transactions.. standard three-tier architecture for modern SaaS applications. Without a dedicated gateway, API channels and their accompanying security controls such as OAuth, SAML, SSL, X.509 processing, or shared secrets become a custom coding project on top of the application server. Worse, complex heuristics for malware scanning and data leak protection cannot be easily added. Large SaaS applications that require security and enterprisegrade security may benefit from a security gateway for reduced coding time and increased performance.
14 12 Monetizing an API Business usage context: Some enterprises generate revenue by monetizing assets that did not formerly carry a charge or whose characteristics change in the app economy. This might include extending an existing service to a partner with which the enterprise plans to share revenue, charging customers per-use, or preventing third parties from counterfeiting a product. For example, the telecom industry is moving toward monetizing APIs. Right now, everyone pays a flat fee for voice and data services. In the future, telcos will use API service calls as the basis for charging customers. API monetization models are becoming a centerpiece for many vertical industries and an API gateway delivers a tremendous first mover-ready solution advantage. API gateway solution: An API gateway can provide tracking, metering, auditing, and throttling for APIdelivered services, helping enterprises get fine-grained analytics and meet service-level agreements (SLAs). API gateways can track and meter user activity so subscribers can be charged for content they consume. This can also power analytics on customer behavior and improve future offers. API gateways can audit activity to ensure proper use. For example, a company running a news site may want to prevent copying and repurposing news content. They can throttle data once certain thresholds have been crossed, protecting operational integrity. API gateways can also meter activity to support SLAs & prioritize traffic. If you want to know how well your API is working, the gateway can monitor the success rates of transactions, amount of uptime, and so on. This paper was created by and sponsored by Intel & McAfee Cloud Security Platform Sponsor: Intel & McAfee Cloud Security Platform Intel & McAfee deliver a portfolio of client, network endpoint, and data center cloud security products that are connected by a model of identity aware security. As users, data, and application services are exposed and consumed to and from the cloud; we establish a layer of trust that spans hardware, software, and cloud traffic channels. Technology enablement platforms include the McAfee Cloud Security Platform (Identity/SSO, API Security, , threat protection, DLP), Nordic Edge OTP (mobile strong authentication), Intel Trusted Execution Technology (Data Center Root of Trust), and Intel Identity Protection Technology (hardware assisted client authentication). About Intel Expressway Service Gateway (Intel ESG) The API Gateway design pattern outlined in this paper can be implemented by deploying Intel ESG as a software appliance, virtualized appliance in the cloud, or as a tamper resistant hardware appliance form factor with Common Criteria EAL L4+ certifications. Also, available as part of the McAfee Cloud Security Platform as McAfee Service Gateway. Intel ESG is a mature product offering that has been deployed widely by fortune 100 corporations, federal governments, and cloud providers to protect SOA, Cloud, and Hybrid service implementations. Intel ESG has been ranked a top developer focused product by leading analysts and offers true developer level customization & flexibility. For more, visit: cloudsecurity.intel.com or mcafee.com/cloudsecurity for video white board tutorials, cloud powered trial evals, and our webinar series on API Management.
15 13 is a source of news, analysis, research, and knowledge for CIOs, CTOs, and other IT and business professionals. engages in a dialogue with its audience to capture technology trends that are harvested, analyzed, and communicated in a sophisticated way to help practitioners solve difficult business problems. About The Contributors Dan Woods, Chief Analyst, Dan has written or coauthored more than 20 books about business and technology, ranging from books about service-oriented architecture, open source, manufacturing, RFID, and wikis to the ideas driving the latest generation of enterprise applications, particularly in the face of Web 2.0 s impact on the enterprise. Dan s most recent book is APIs: A Strategy Guide. Since July 2008, Dan has been writing a column for Forbes.com. Andy Thurai, Chief Architect & CTO, Application Security and Identity Products, Intel Andy Thurai is Chief Architect and CTO of Application Security and Identity Products with Intel, where he is responsible for architecting SOA, Cloud, Governance, Security, and Identity solutions for their major corporate customers. In his role he is responsible for helping Intel/McAfee field sales, technical teams and customer executives. Prior to this role he has held technology architecture leadership and executive positions with L-1 Identity Solutions, IBM (Datapower), BMC, CSC, and Nortel. His interests and expertise include Cloud, SOA, identity management, security, governance, and SaaS. He holds a degree in Electrical and Electronics engineering and has over 20+ years of IT experience. He blogs regularly at on Security, SOA, Identity, Governance and Cloud topics. Blake Dournaee, Product Manager, Intel Application Security and Identity Products Blake is currently the product manager responsible for Intel Expressway Service Gateway and an expert on API security. Blake was a specialist in applied cryptography applications at RSA Security. Blake is an established author who wrote the first book on XML Security and co-authored SOA Demystified (Intel Press). John Musser, Founder, ProgrammableWeb John Musser is the founder of ProgrammableWeb.com, the leading online resource for mashups, APIs, and the web as platform. During his 20-year career in software development he has shipped six award-winning software products in three industries working with companies including Electronic Arts, Credit Suisse, MTV, and Bell Labs. He has taught at Columbia University and the University of Washington and has written for a variety of technology publications on software development, most recently as author of Web 2.0: Principles and Best Practices (O Reilly Media).
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Public Clouds. Krishnan Subramanian Analyst & Researcher Krishworld.com. A whitepaper sponsored by Trend Micro Inc.
Public Clouds Krishnan Subramanian Analyst & Researcher Krishworld.com A whitepaper sponsored by Trend Micro Inc. Introduction Public clouds are the latest evolution of computing, offering tremendous value
Meet the Cloud API The New Enterprise Control Point
Meet the Cloud API The New Enterprise Control Point Presented by: Katrina Kehlet Intel Application Security and Identity Products 1 Agenda Why Intel & McAfee- Security Connected Cloud Promise & Threat
Creating a Strong Security Infrastructure for Exposing JBoss Services
Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
How To Protect Your Cloud From Attack
A Trend Micro White Paper August 2015 Trend Micro Cloud Protection Security for Your Unique Cloud Infrastructure Contents Introduction...3 Private Cloud...4 VM-Level Security...4 Agentless Security to
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range
Apigee Edge API Services Manage, scale, secure, and build APIs and apps
Manage, scale, secure, and build APIs and apps Hex #FC4C02 Hex #54585A Manage, scale, secure, and build APIs and Apps with is designed to unite the best of Internet and enterprise technologies to provide
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
Putting Web Threat Protection and Content Filtering in the Cloud
Putting Web Threat Protection and Content Filtering in the Cloud Why secure web gateways belong in the cloud and not on appliances Contents The Cloud Can Lower Costs Can It Improve Security Too?. 1 The
THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
IBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
The Case For A Cloud Access Security Broker
The Case For A Cloud Access Security Broker 1 Executive summary The SaaS era is here. According to Gartner, SaaS and cloud-based business application services revenue will grow from $13.5 billion in 2011
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management Table of Contents Executive Summary... 3 Introduction: Cloud Deployment Models... 3 Private Clouds...3 Public
API Management Buyers Guide. White Paper
API Management Buyers Guide White Paper What Is an API? The value of your software, data, or other digital assets can be dramatically increased by reaching new audiences. This is possible through the use
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Optimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
The bridge to delivering digital applications across cloud, mobile and partner channels
Axway API Gateway The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway a foundational component in an API-first architecture for digital business provides
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Intelligent, Scalable Web Security
Solution Overview Citrix and Trend Micro Intelligent, Scalable Web Security Application-Level Control, Load Balancing, High-Traffic Capacity Table of Contents The Challenge... 3 The Solution: Citrix NetScaler
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
White Paper: Security and Agility in the API Economy. Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7
White Paper: Security and Agility in the API Economy Optimizing and securing your APIs with ViewDS Identity Solutions and Layer 7 Security and Agility in the API Economy The API Economy is more than the
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT
The Jamcracker Enterprise CSB AppStore Unifying Cloud Services Delivery and Management for Enterprise IT Jamcracker, Inc. 4677 Old Ironsides Drive Santa Clara, CA, USA 95054 www.jamcracker.com Table of
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Cloud Computing: What IT Professionals Need to Know
Learning Cloud Computing: What IT Professionals Need to Know Cloud computing promises new career opportunities for IT professionals. In many cases, existing core skill sets transfer directly to cloud technologies.
Sentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and APIs Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Top 10 Reasons Enterprises are Moving Security to the Cloud
ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Using Layer 7 s API Gateway for vcloud Architectures How to achieve abstraction, security and management of vcloud APIs.
Using Layer 7 s API Gateway for vcloud Architectures How to achieve abstraction, security and management of vcloud APIs White Paper Contents Executive Summary... 3 Why Use an API Gateway with vcloud...
Moving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
Security to Connect Back-end APIs with HTML5 Cross Platform Apps
API Security to Connect Back-end APIs with HTML5 Cross Platform Apps Andy Thurai, CTO, Intel Big Data & Application Security Software Twitter: @AndyThurai Blog: www.thurai.net/securityblog Intel software
Build Your Mobile Strategy Not Just Your Mobile Apps
Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need
How To Reduce Pci Dss Scope
WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Lecture 02b Cloud Computing II
Mobile Cloud Computing Lecture 02b Cloud Computing II 吳 秀 陽 Shiow-yang Wu T. Sridhar. Cloud Computing A Primer, Part 2: Infrastructure and Implementation Topics. The Internet Protocol Journal, Volume 12,
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011
IT Risk and Security Cloud Computing Mike Thomas Erie Insurance May 2011 Cloud Basics Cloud Basics The interesting thing about cloud computing is that we've redefined cloud computing to include everything
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.
Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy. The number of Internet-connected smart devices is growing at a rapid pace. According to Gartner, the
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options
Business Continuity in an Outsourced Environment: Enabling business outcomes and expanding sourcing options Marnix Gillis IBM Distinguished Engineer 32 nd Regional Conference 2013 International Business
RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC
RE Think Invent IT & Business IBM SmartCloud Security Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC 2014 IBM Corporation Some Business Questions Is Your Company is Secure
Sentinet for BizTalk Server SENTINET 3.1
for BizTalk Server SENTINET 3.1 for BizTalk Server 1 Contents Introduction... 2 SOA and APIs Repository... 3 Security... 3 Mediation and Virtualization... 3 Authentication and Authorization... 4 Monitoring,
Cloud and Data Center Security
solution brief Trend Micro Cloud and Data Center Security Secure virtual, cloud, physical, and hybrid environments easily and effectively introduction As you take advantage of the operational and economic
An Enterprise Architect s Guide to API Integration for ESB and SOA
An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
API Management Introduction and Principles
API Management Introduction and Principles by Vijay Alagarasan, Principal Architect, Enterprise Architecture and Strategy of Asurion Abstract: This article is focused on providing solutions for common
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
White. Paper. Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS. January 2013
White Paper Enterprises Need Hybrid SSO Solutions to Bridge Internal IT and SaaS By Jon Oltsik, Senior Principal Analyst January 2013 This ESG White Paper was commissioned by McAfee. and is distributed
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Addressing Security for Hybrid Cloud
Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : [email protected] Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds
Identity and Access Management for the Cloud What You Need to Know About Managing Access to Your Clouds Identity & Access Management One of the biggest challenges in information security is Identity and
Virtualization Essentials
Virtualization Essentials Table of Contents Introduction What is Virtualization?.... 3 How Does Virtualization Work?... 4 Chapter 1 Delivering Real Business Benefits.... 5 Reduced Complexity....5 Dramatically
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION
SOLUTION BRIEF Trend Micro CLOUD AND DATA CENTER SECURITY Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION As you take advantage of the operational and economic
F5 and Microsoft Exchange Security Solutions
F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application
Protecting Applications on Microsoft Azure against an Evolving Threat Landscape
Protecting Applications on Microsoft Azure against an Evolving Threat Landscape So, your organization has chosen to move to Office 365. Good choice. But how do you implement it? Find out in this white
THE QUEST FOR A CLOUD INTEGRATION STRATEGY
THE QUEST FOR A CLOUD INTEGRATION STRATEGY ENTERPRISE INTEGRATION Historically, enterprise-wide integration and its countless business benefits have only been available to large companies due to the high
Evaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
How To Monitor Hybrid It From A Hybrid Environment
IT Monitoring for the Hybrid Enterprise With a Look at ScienceLogic Perspective 2012 Neovise, LLC. All Rights Reserved. Report Published April, 2015 Hybrid IT Goes Mainstream Enterprises everywhere are
5 Critical Considerations for. Enterprise Cloud Backup
5 Critical Considerations for Enterprise Cloud Backup This guide is written for IT professionals who play a part in data protection and governance at their enterprises. It is meant to provide an initial
VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud
VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
A Survey on Cloud Security Issues and Techniques
A Survey on Cloud Security Issues and Techniques Garima Gupta 1, P.R.Laxmi 2 and Shubhanjali Sharma 3 1 Department of Computer Engineering, Government Engineering College, Ajmer [email protected]
Cisco Integration Platform
Data Sheet Cisco Integration Platform The Cisco Integration Platform fuels new business agility and innovation by linking data and services from any application - inside the enterprise and out. Product
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures
W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures Sponsored by: HP Stephen Elliot April 2008 IDC OPINION Global Headquarters:
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
Managing SOA Security and Operations with SecureSpan
Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance
Avoid the Hidden Costs of AD FS with Okta
Okta White paper Avoid the Hidden Costs of AD FS with Okta Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-adfs-031413 Table of Contents 1 Challenges of
DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD Protecting your infrastructure requires you to detect threats, identify suspicious
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
Becoming a Cloud Services Broker. Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013
Becoming a Cloud Services Broker Neelam Chakrabarty Sr. Product Marketing Manager, HP SW Cloud Products, HP April 17, 2013 Hybrid delivery for the future Traditional IT Evolving current state Future Information
