December 16th, 2011

FROM THE VAULT: Webinar – Security, Governance & Integration in a Cloud-Connected World presented with Red Hat

Red Hat webinarEnterprise IT is becoming more complex. Companies are investing in systems that promise great benefits in terms of connectivity and cost-effectiveness but, to really make the most of these investments, they need control over and visibility into how systems connect across departments, environments and locations. Introduce the Cloud and things can get really complicated.

This summer, we presented a webinar that addressed these specific issues. Created in association with Red Hat, Security, Governance & Integration in a Cloud-Connected World provided deep insight into how enterprises can address integration, management and security challenges arising from technologies like SOA and Cloud.

With input from Pierre Fricke, Director of SOA Products at Red Hat, as well as Jaime Ryan, our Partner Solutions Architect, this webinar proposed combining an enterprise service bus with a SOA Gateway to create a secure, standards-based system for governing integrations that cross organizational boundaries. You can stream the full recording in the player below.

[youtube]http://www.youtube.com/watch?v=ol8YO9F3O7k&feature=channel_video_title[/youtube]

December 2nd, 2011

FROM THE VAULT: Webinar – Managing API Security in SaaS & Cloud presented with the Cloud Security Alliance

Managing API SecurityThis week’s dip into the Layer 7 archive provides real-world advice on how providers of Cloud services can securely expose their APIs to third-party developers. Featuring input from eBay Chief Security Strategist Liam Lynch, Managing API Security in SaaS & Cloud will definitely be of interest to anyone who enjoyed our recent Webinar with Best Buy and Amazon Web Services.

For Cloud providers, API publishing has become critical to enabling integration with enterprise systems, sharing information across affiliate Web sites and providing mobile access to services. Of course, Cloud computing and API publishing create all sorts of new security concerns, which is where secure integration providers like Layer 7 come in.

This webinar was co-presented with our friends at the Cloud Security Alliance but it’s about more than just security. A truly safe and secure API publishing programming will have to tackle the full range of API management concerns. Specifically, Cloud API publishers need ways to address versioning and to meter consumption without burdening either developers or consumers.

To find out more, you can read about the webinar on the Layer 7 Web site or simply watch the recording in the player below.

November 25th, 2011

FROM THE VAULT: White Paper – Choosing the Right API Management Solution for the Enterprise User

API White PaperWhile APIs may be nothing new, the whole concept of “API management” is still pretty fresh. It’s probably a term you’re going to start hearing more and more, though – simply because more and more organizations are going to start discovering they need ways to secure and manage their APIs.

Over the last few years, social media and mobile devices have provided all sorts of organizations with the motivation they need to start publicly exposing data and services they would previously have kept private. Clearly, this raises security and management concerns, especially for larger enterprises with valuable data to protect and reputations to maintain.

While API management products have been on the market since at least 2006, there’s still fairly limited understanding of what a fully-functional API management solution looks like – or should look like. Earlier this year, we published our Choosing the Right API Management Solution for the Enterprise User white paper, to help enterprises fill in the blanks.

So, if you’d like to learn the key functional and operational requirements for an API management solution, just download this white paper.

November 11th, 2011

FROM THE VAULT: Webinar – Extending Enterprise Security into the Cloud presented with The 451 Group

CA World - CSA CongressNext week, Layer 7 will be exhibiting at a couple of events, both of which have a strong Cloud security focus. Between November 13 and 16, we’ll be in Las Vegas for CA World, where we’ll be setting up shop in the Cloud Section and the Security Section. On November 16 and 17, we’ll be at the Cloud Security Alliance Congress in Orlando.

With these Cloud security-focused events just around the corner, it seems like a good time to mention our archived webinar Extending Enterprise Security into the Cloud. Presented with The 451 Group, this webinar explored ways for enterprises to extend existing security investments into the Cloud without incurring significant costs or creating additional IT complexity.

Presentations from Layer 7 CTO Scott Morrison and 451 Group Security Analyst Steve Coplan, delved into how enterprises can leverage the identity, privacy and threat-protection technologies they already own to facilitate the secure adoption of SaaS, IaaS and other Cloud-based technologies.

You can read more about the webinar in our Resource Library or simply watch the recording in the player below, courtesy of the Layer 7 YouTube Channel.

And if you happen to be attending either CA World or the CSA Congress, stop by and say “hi”. CA World attendees can find us at Partner Pedestal 261A in the Cloud Section and Partner Pedestal 338B in the Security Section. For the CSA conference we’ll be at table 10. Hope to see you there!

November 4th, 2011

FROM THE VAULT: White Paper – Identity Federation in Web Services

Identity FederationThis week’s pick from the Layer 7 Resource Library archive addresses two issues that are critical to our technologies: Web services and identity federation. One of Layer 7’s ongoing goals is to help companies realize the value Web services offer to the enterprise – and identity federation is one of the keys to Web services success.

Our white paper Identity Federation in Web Services explains exactly why federation is such an issue with Web services. It explores federation problems commonly associated with reusing application logic across diverse business processes that traverse multiple security domains with independent preferences, capabilities and requirements.

It also outlines the requirements for a solution that will simply, effectively and securely bridge application identities across security domains. Our experience with customers – along with the fact that this has consistently been one of our most downloaded resources – continues to reinforce our belief in the value this type of solution offers to today’s extended enterprise

Read the white paper: Identity Federation in Web Services >>