Executive View: Standardized services and re-used code – blessing or curse? - 71614

Report Details

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise systems built in this heterogeneous manner is an important challenge that needs to be approached adequately.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jan 15, 2016

Executive View: Standardized services and re-used code – blessing or curse? - 71614

Today’s software solutions rely on the re-use of existing software. This ranges from the inclusion of source code provided by various sources to Application Programming Interfaces (APIs), to third party libraries and standardized remote services. Securing internet-facing or enterprise…

€190.00
excl. VAT
Get Access
Mastercard Visa American Express PayPal INVOICE

Latest Related Reports

Executive View

PingOne Authorize

Due to its value and sensitivity, customer identity and data must be protected with strong access management systems. Key use cases include managing usage of customer data and its availability both internally and externally; and managing availability of organizational data across employee…

Executive View

Noname API Security Platform

The Noname API Security Platform is a unified API security solution that combines proactive API discovery and classification, runtime protection, and API security testing to ensure consistent security coverage for all types of APIs across all on-prem or cloud environments. The platform’s…

Leadership Compass

Web Application Firewalls 2022

This report provides an overview of the Web Application Firewall (WAF) market and provides you with a compass to help you to find the solution that best meets your needs. We examine the market segment, vendor service functionality, relative market share, and innovative approaches to…

Whitepaper

How to Do Identity Right When Developing Digital Services

In the digital age, digital experience heavily impacts the success of businesses. A main element of digital experience is the registration, authentication and authorization flow. Instead of developing this per service, organizations are well-advised to rely on standards and services provided…

Executive View

Akana by Perforce

Akana API Platform is a fully integrated API management, transformation, and security platform that can address a multitude of enterprise use cases from API design and development to business application integration to the modernization of legacy services, while transparently supporting…

Executive View

R&S®Trusted Application Factory by Rohde & Schwarz Cybersecurity

Application security is of increasing concern to organizations, particularly following the series of software supply chain attacks in recent years. With the shift to microservices architectures and container-based deployments, new models for protecting workloads are required, that also…

Whitepaper

Software Supply Chain Security: Don’t Get Your Code Tampered

Recent events such as the SolarWinds and Kaseya incidents have demonstrated the need to focus significantly more on software supply chain security. Thus, avoiding code tampering by external attackers and internal parties is essential. This whitepaper looks at how to increase security…

Executive View

Authlete API Authorization

Authlete is a set of APIs for service providers to implement the standard protocols OAuth and OIDC (OpenID Connect). It enables developers of digital services to offload protocol operations and access token lifecycle management to the backend service and thus simplifies development and…

Leadership Compass

API Management and Security

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements most efficiently. We examine the complexity and breadth of the challenges to discover,…