A How-to Guide to OAuth & API Security

OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Get Whitepaper

Choosing the Right API Management Solution for the Enterprise User

The application programming interface (API) may be an old concept but it is one that is undergoing a transformation as, driven by mobile and cloud requirements, more and more organizations are opening their information assets to external developers.

Today, 75% of Twitter traffic and 65% of Salesforce.com traffic comes through APIs. But APIs are not just for the social Web. According to ProgrammableWeb.com, the number of open APIs being offered publicly over the Internet now exceeds 2000—up from just 32 in 2005. Opening APIs up to outside developers enables many technology start-ups to become platforms, by fostering developer communities tied to their core data or application resources. This translates into new reach (think Twitter’s rapid growth), revenue (think Salesforce.com’s AppExchange) or end user retention (think Facebook).

Get Whitepaper

5 OAuth Essentials for API Access Control

OAuth puts the user in control of delegating access to an API. This allows one service to integrate with another service on behalf of that user. The same social Web providers who popularized the pattern of exposing an API to enable third-party developers to enrich their platforms were the first ones to apply such delegated authorization mechanisms. OAuth was defined in 2006, to standardize mechanisms of this kind.
Get Whitepaper

Five Simple Strategies for Securing APIs

Since the early days of computing, developers have struggled to make applications communicate. Specialized protocols, such as COM+, CORBA, and even SOAP, emerged over the years, but none were sufficient to meet the need for scale, simplicity, and cross-language functionality.

APIs are the technology behind this approach. APIs allow developers to create an open architecture for sharing functionality and data between applications. APIs are like windows into an application—a direct conduit that leads straight into the core functionality and data residing in the heart of the app.

Get Whitepaper

5 Ways to Get Top Mobile App Developer Talent for Your Open APIs

Opening APIs to developers outside the enterprise can enable the creation of apps that add value in innovative and often unexpected ways –without the enterprise having to invest directly in app development. However, this will only happen when the enterprise can grow an ecosystem of visionary developers creating cutting edge apps that provide consumers with something of real value.

In this eBook, we will provide a detailed overview of five key ways smart enterprises attract and nurture top third-party developer talent.

Get Whitepaper

Protecting Your APIs Against Attack and Hijack

The best practice for API security architecture is to separate out API implementation and API security into distinct tiers. Under this model, an API developer can focus completely on the application domain, ensuring that each API is well designed and promotes integration between different apps. CA API Gateway provides the API security administrator with complete control over access control, threat detection, confidentiality, integrity and audit across every API the organization publishes.
Get Whitepaper

Secure Mobile Access for Enterprise Employees

Mobile technology is revolutionizing the corporate IT landscape. Enterprises want to leverage mobile to maximize employee productivity, efficiency and availability. Meanwhile, employees are already taking the initiative by using their own personal mobile devices for business purposes. For enterprises, the benefits of enterprise mobility and the reality of the “bring-your-own-device” (BYOD) movement are becoming impossible to ignore.
Get Whitepaper

Verkürzung des Zeitrahmens zur Beschleunigung der Anwendungsbereitstellung

Wie wäre es, wenn Sie bei der Bereitstellung von Anwendungen Ihren Zeitrahmen VERKÜRZEN und Anwendungen um 25 bis 50 Prozent schneller, hochwertiger und mit weniger Aufwand bereitstellen könnten? Wie wäre es, wenn Sie Ihren Zeitrahmen VERKÜRZEN und einen Investitionsertrag von 100 Prozent bereits bei der Bereitstellung Ihrer nächsten Anwendung erzielen könnten? Wie wäre es, wenn Sie Aufgaben verkürzen könnten und DevOps endlich Realität wäre?
Get Whitepaper

Ein praxisorientierter Leitfaden für die Einführung von DevOps

In der Application Economy ist jedes Unternehmen ein Softwareunternehmen. Daher wird DevOps auch schnell zu einer der wichtigsten Disziplinen in Ihrem Unternehmen werden. Der Fokus von DevOps liegt auf der Verbesserung der Qualität und beschleunigten Bereitstellung von Anwendungen auf dem Markt. Und dazu ist eine enge Zusammenarbeit zwischen Development und Operations erforderlich.
Get Whitepaper

CA Cloud Service Management: Register for a 30 Day Trial

CA Cloud Service Management is purpose-built for speed—rapidly accelerating time to value where other SaaS solutions fall short. Implement in days, adopt with minimal training, configure without programmers, automate end-user requests and get automatic upgrades. Simplified pricing gives you predictable costs—no nickel and diming or complex pricing charges. The CA advantage means rapid time to value, ease of use and low cost of ownership.
Get Whitepaper

The Business Value of Red Hat Integration Products

For this white paper, IDC interviewed six organizations that report achieving significant business value by using Red Hat JBoss Fuse, in particular by making their application integration and development efforts more efficient and productive. Register now to learn exactly how these organizations are earning back their investments in only 8 months!
Get Whitepaper

An EMM Checklist CIOs: Factors to Consider When Choosing an EMM Solution

As you decide on an Enterprise Mobility Management (EMM) solution, there are dozens, if not hundreds, of factors to weigh. Comparing features across three or four shortlisted solutions can become incredibly time-consuming.

As a starting point, consider the issues in the following list. It’s derived from third-party research and best practices. While not exhaustive, it covers the critical areas you’ll need to think through as you arrive at a decision.

You may also want to review our CIO’s Guide to EMM, which addresses the same topics, and others, in more detail.

Get Whitepaper

Best Practices in BYOD: How Smart Enterprises Are Making It Work

Today, employees are tech savvy and want more of a say about the tools that they use to get their work done. But BYOD creates a number of challenges when it comes to enterprise mobility, and it’s essential that organizations know how to go about finding – and managing – the Enterprise Mobility Management (EMM) platform that meets their needs today and will continue to in the future. Because BYOD will undoubtedly expand to include other technologies, devices, and mobile endpoints.
Get Whitepaper

Best Practices in Cross-Platform MAM

As the idea of comprehensive Enterprise Mobility Management (EMM) has taken shape, organizations are increasingly enabling the kind of true mobility their employees have been clamoring for – and apps are a driving force.

For businesses, the ability to make this sort of mobility a reality for users has a lot to do with new developments in technology: advances not just in Mobile Device Management (MDM), but in Mobile App Management (MAM), Mobile Content Management (MCM) and security. MDM systems manage the basic configuration of device settings, access parameters, and policies/controls. MAM and MCM are software and services that can control how apps and content are accessed and used inside and outside of the office.

Get Whitepaper