Sam Macklin

Sam Macklin

Sam Macklin is Layer 7's Web Content Producer.

April 4th, 2012

Upcoming Webinar: Developer Engagement for Open API Initiatives

Layer 7 - RedMonk WebinarThe recently-published Layer 7 white paper Secure Mobile Access for Enterprise Employees points out that, from a business perspective, the real value of mobile devices is not in the devices themselves – it is in the apps that run on these devices. Similarly, from a technical perspective, while APIs hold a great deal of potential value for enterprises, developers hold the key that unlocks this potential.

Value comes not from devices or APIs as such – it comes from developers and the applications they build for these devices, against these APIs. To get true value from its APIs, an organization must take a developer-centric approach: reaching out to get developers on board; providing support to help developers use APIs effectively; tracking API usage to identify the most valuable developers; managing APIs to ensure developers can create applications that work consistently.

Our upcoming webinar Developers, Developers, Developers – The Secret to Running a Successful API Management Program will explore tools and techniques for developer-centric API management. Presented by Layer 7 CTO Scott Morrison and RedMonk analyst James Governor, this webinar will take place at 9am PDT on April 19. Space is limited, so don’t hesitate – sign up today!

February 27th, 2012

New Solution Brief: API Management for Mobile

API Management for MobileIncreasingly, mobile is one of the major factors driving enterprises to expose their information assets via APIs. With the BYOD movement bringing mobile into the workplace and some forward-thinking enterprises equipping their employees with tablets, there is a growing need for enterprise-level apps that leverage systems and data exposed via APIs.

Of course, allowing enterprise data to be accessed from smart-phones and tablets (via public networks) creates a range of concerns around security and performance. The security risks are clear – perhaps less well understood is the fact that, for apps to perform efficiently, data will need to be filtered and transformed into formats and protocols suitable for mobile.

Layer 7’s new API Management for Mobile solution brief explains how our API Management Suite of products delivers everything enterprises need to address the data security and performance management concerns raised by integrating enterprise assets with mobile devices. To find out more download the solution brief now.

February 22nd, 2012

New Data Sheet: Layer 7 API Management Suite

Layer 7 API Management Suite Data SheetThere are many pieces to the API management puzzle – securing exposed data, on-boarding developers, managing identities and so on. There’s already a decent selection of API management products on the market and with awareness of the whole concept growing, you can bet there’s more to come.

As the number and variety of API management products continues to grow, Layer 7’s goal is to continue providing the most comprehensive enterprise-level solution on the market. Our API Management Suite of products is uniquely placed to give enterprises everything they need in order to securely expose APIs, manage developers and leverage key technologies like OAuth.

Our new Layer 7 API Management Suite data sheet provides detailed information on our full range of API products, including the API Portal, SecureSpan API Proxy, Enterprise Service Manager and OAuth Toolkit. So, to find out how we’re responding to the challenge of enterprise-level API publishing, read the data sheet today.

February 15th, 2012

Workshop: API Security for Mobile & Cloud

CSA Summit at RSA ConferenceLayer 7 will be at the RSA Conference next week, with CTO Scott Morrison and Director of Solutions Engineering Francois Lascelles both giving presentations. We’ll also be sponsoring the Cloud Security Alliance’s CSA Summit 2012, which will be taking place at the conference, on the 27th.

As part of our activities at the CSA Summit, we’ll be holding an enterprise-level workshop called API Security for Mobile & Cloud. This workshop, which will be held at the W Hotel, between 1pm and 5pm. Sessions will include:

  • Open APIs: The New Enterprise Imperative for Mobile & Cloud & Security Implications
  • API Security & Management Best Practices
  • Managing API Access Through OAuth
  • API Threat Protection & Metering
  • Enabling API Discovery & Developer Self-Service – An API Developer Portal Example

The workshop will include lunch, a networking session and guest speaker Caleb Sima of Andreessen Horowitz, one of the leading venture capital firms in Silicon Valley. Caleb has been engaged in the Internet security arena since 1996 and has become widely recognized as one of the leading experts in Web security, penetration testing and the identification of emerging threats. He is a highly in-demand speaker, press resource and is regularly featured in the Associated Press and global security media.

Space is limited, so if you’re going to be attending the CSA Summit, be sure to register for the workshop today.

February 3rd, 2012

New White Paper: Federated Identity & Single Sign-On Using Layer 7

Written by
 

Identity Federation White PaperIncreasingly, enterprise IT is characterized by SaaS, Cloud, SOA and all sorts of other technologies that bridge organizational boundaries and – consequently – identity domains. When users from various domains have diverse collections of credentials for systems spanning the extended enterprise and Cloud, management and security concerns inevitably arise.

Identity federation is the key to addressing these concerns. A lot of people assume identity federation is the same thing as Single Sign-On (SSO), where a single identity is used to authenticate a user across multiple services, applications and platforms. In fact, SSO is just one piece of the identity federation puzzle, albeit an important one.

Our new white paper, Federated Identity & Single Sign-On Using Layer 7, examines all the key pieces of this puzzle. It takes a detailed overview of the technologies that can be used to merge separate “identity silos” into a centralized, authoritative identity store (SAML, STS, OAuth etc.) It also explains how our products can be used to implement these technologies.

For more information, read Federated Identity & Single Sign-On Using Layer 7