Whitepaper: The Dark Side of the API Economy - 80019

Report Details

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and partners.

Unfortunately, many organizations still lack competence in the field of API security and tend to downplay API-related risks. Many are also overconfident in the capabilities of their existing tools. This paper aims to dispel several common API myths and provide recommendations on designing a comprehensive and future-proof API security strategy.


Date Title
May 16, 2019

Whitepaper: The Dark Side of the API Economy - 80019

Application Programming Interfaces (API) have become a crucial factor in delivering operational efficiency, scalability, and profitability for most businesses. Nowadays, everything is API-enabled: corporate data is the product and APIs are the logistics of delivering it to customers and…

Read on KC PLUS

Latest Related Reports

Executive View

Cequence API Sentinel

API Sentinel is an API security product focusing on API inventory and usage monitoring, as well as identification, assessment, and mitigation of API-related security risks. As a part of the company's extensible cloud-native Application Security Platform, it provides comprehensive API…

Advisory Note

The Role of APIs for Business

An Application Programming Interface (API) is an intermediary that allows two applications to talk to each other. Without APIs, the digital experiences consumers have grown accustomed to, such as booking a hotel room or in car navigation, would not be possible. In recent years, API…

Buyer's Compass

Buyer's Compass: API Management and Security - 80215

The complexity and breadth of the challenges to discover, monitor and secure all APIs within your enterprise can be daunting. This KuppingerCole Buyer’s Compass will provide you with questions to ask vendors, criteria to select your vendor, and requirements for implementing consistent…

Executive View

Executive View: PingAccess - 80323

With the rising complexity of IT environments and the many integration points to consider, PingAccess provides a flexible architecture that includes Web and API Access Management, whether on-premises or in the cloud. Combining PingFederate with PingAccess offers a complete Web Access…

Executive View

Executive View: Apigee Edge API Management Platform - 80307

Apigee offers a comprehensive platform to support end-to-end API management at every stage of API lifecycle. From API design to publication, productization, and monetization to monitoring and securing live endpoints – everything is managed centrally across on-premises, cloud-based and…

Leadership Compass

Leadership Compass: API Management and Security - 70311

This Leadership Compass provides an overview of the market for API management and security solutions along with recommendations and guidance for finding the products which address your requirements in the most efficient way. We examine the complexity and breadth of the challenges to…

Whitepaper

Whitepaper: Modern Identity Fabrics: A Cornerstone of your Digital Strategy - 80170

Digital Transformation is ubiquitous. Creating new digital business services changes the way IAM needs to be done. Instead of managing existing applications, IAM has to provide identity services that can be consumed by digital services. Focus is shifting from modern UIs for managing…

Executive View

Executive View: Ping Identity Data Governance - 70295

In the increasingly data-driven world today, it is essential to protect against unauthorized data access to prevent exposure and breaches, meet consumer expectations, and comply with the growing number of privacy regulations. PingDataGovernance provides the capabilities to control how data…

Executive View

Executive View: Curity Identity Server - 80159

Curity AB delivers a software-based API-driven identity server for businesses that need help connecting identity infrastructure, digital services, and cloud applications. Their solution adheres to many identity standards, to promote interoperability and to make it easier for clients to…

Leadership Brief

Leadership Brief: Top Cyber Threats - 72574

The way software is used today has clearly shifted towards "as-a-service". Classic on-premises applications are migrating more and more into the (managed) cloud and users are using hybrid scenarios from local and cloud applications on their devices. This Leadership Brief discusses top cyber…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

IGA in a World of Zero Trust

IGA in a World of Zero Trust
Richard Hill

Zero Trust is a key paradigm for cybersecurity today, used well beyond the security circles. The goal is building cybersecurity that “never (blindly) trusts”, but “always verifies.” This traditionally meant verifying Who has access to What resource. In the past, the Who typically meant a human with a digital identity being given access to some application within an organization. Once the individual was given access to said application, that individual would be verified [...]

Hot Topics


Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00