Identity in an API Economy
- LANGUAGE: English DATE: Tuesday, October 16, 2012 TIME: 16:00 CEST, 10:00am EDT
In an API Economy, everyone and everything has an API. That means 26 billion APIs by the year 2015. What is your organization doing to prepare for this fundamental shift in IT infrastructure? Join KuppingerCole´s Distinguished Analyst Craig Burton and Layer 7 Technologies CTO Scott Morrison in this webinar to understand more about the API Economy and the role of Identity for your organization.
The number of published APIs has reached the total of 7,000. It has more than doubled in less than a year. The number of unpublished APIs is estimated to be five times larger than the number of published APIs. Couple that with the explosion of devices and you have what is being called "The Cambrian Explosion of Everything." Organizations are NOW being confronted with the problems of embracing these huge changes and the breakdown of the efficacy of legacy management system. The Cambrian Explosion of Everything is forcing organization to rethink everything and look at new ways of providing secure access to information and resources both inside the company and outside. Join us to gain a better understanding of these trends and their impact on your organization.
Layer 7 Technologies helps enterprises secure and govern interactions between their organization and the services they use in the cloud; across the Internet; and out to mobile devices. Through its award-winning line of SOA Gateways, Cloud Brokers and API Proxies, Layer 7 gives enterprises the ability to control identity, data security, SLA and visibility requirements for sharing application data and functionality across organizational boundaries. Layer 7 solutions are FIPS compliant, STIG vulnerability tested and have met Common Criteria EAL4+ security assurance. For more information, please visit www.layer7.com, email us at email@example.com or follow us on Twitter at @layer7.
Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.