Make your Enterprise Applications Ready for Customers and Mobile Users
- LANGUAGE: English DATE: Thursday, April 16, 2015 TIME: 4:00pm CET, 10:00am EDT, 7:00am PDT
Open up, Modernize and Secure your Interfaces
Such popular emerging technologies as Internet of Things or Software Defined Computing Infrastructure (SDCI), which rely significantly on API ecosystems, are also bringing new security- and identity-related challenges with them.
Creating a well-planned strategy and reliable infrastructure to expose their business functionality securely to be consumed by partners, customers and developers is a significant challenge that has to be addressed not just at the gateway level, but also along the whole information flow from backend systems to endpoint applications.
Topics of this webinar will include:
- Challenges for your enterprise’s API strategy
- Approaches to modernization of existing services
- Access management for multiple types of identities
- Core standards and protocols for API economy
- Designing your architecture for the highest security level
In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will present an overview of various challenges that companies have to address when designing their API strategy, such as including modernizing legacy services to support modern standards, supporting various types of user identities, providing high-grade end-to-end communication security and data privacy and, last but not least, protecting company assets from external threats.
In the second part, Jason Macy, CTO of Forum Systems, will provide a deeper look into modernization strategies around gateway technology and discuss how architecture design principles coupled with purpose-built technology provide a sustainable approach to secure business agility.
Forum Systems is the global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments Our API Gateway processes over 10 billion transactions per day, while maintaining a 100% deployment success rate for every technology deployment within the government agencies and global enterprises it serves.
Mastering authorization is critical for modern organizations with multiple user constituencies, applications, and data types. Authorization has become a crucial part of security infrastructures and can no longer be considered just another feature of existing IAM solutions. Instead, authorization control infrastructures have developed their own segment in the security market.
The Consumer Identity World Tour is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.