With both delivery and management of security increasingly moving to the cloud, organizations of all sizes are presented with new approaches to security that use APIs to reduce the complexity of securing applications.
SAP has more than 1,500 applications and services, and with the emergence of SAP HANA as an in-memory computing platform, the company plans to expand its application portfolio even more. The challenge is figuring out how to make it easier for developers to integrate all those applications.
In the age of the cloud, integration is everything. What was once a labor-intensive service is rapidly becoming a set of capabilities in the cloud that IT organizations can dynamically invoke as needed. We’re still some distance from making that integration process completely turnkey. But we’re getting a little closer with each passing day.
ServiceNow is a fairly widely used cloud software-as-a-service application that IT organizations use to manage the workflow around calls to help desks. But thanks to the API that ServiceNow built, that application is being more broadly used to create workflow applications outside the IT department.
Payment for services rendered has always been a quixotic journey for small to midsize businesses (SMBs). You would think the companies that deliver IT services to SMBs would have figured out how to automate the payment process long ago, but in reality, integrating the QuickBooks financial software that small companies rely on with the professional services management software that IT services use to manage projects and track billing is a significant challenge.
Now with almost two years in operation, custom analytics cloud platform Keen IO believe they have both a strong analytics product for existing customers, and the potential to quickly move into emerging market domains in the years ahead. Their strategy? To win over developers first, and let the developers evangelize back to end customers. The company provides the Keen IO API to help businesses process information by defining each piece of data as an event that can be catalogued and analyzed.
One of the more problematic elements of building any application is managing end user identities. Writing the code to manage who gets to access any given application not only is time consuming; it doesn’t usually add much in the way of unique value to the application.
Good Technology has released what they are calling an ‘open API mobile set’ as part of their Shared Services Framework. The intention is to give more power to inhouse developer teams to move beyond app-connected workflows to incorporate service functions into seamless business processes. The workflows are protected by framework-driven security containerization, making it easier for developers to reuse code and connect various apps through APIs all within a secure mobile framework. ProgrammableWeb spoke with John Dasher, VP of Product Marketing at Good Technology.
Threat Stream, SaaS-based cyber threat intelligence platform, offers its real-time stream of actionable intelligence to developers through the Threat Stream API. Threat Stream’s big data security driven analytics creates an actionable, context rich stream of intelligence that meets the needs of government and enterprise security operations. Machine learning and sophisticated algorithms reduce false-positives and give users world class security capabilities.
Pactas, recurring billing solution provider, offers the Pactas API that allows developers to include Pactas functionality within third party apps and websites. Any need for recurring billing (e.g. carsharing, music flatrates, cloud services, etc.) can be simplified and streamlined with the Pactas solution. Pactas enables users to manage subscriptions, track payments, and map pricing. Access to the platform can customize to each users’ situation depending on need, resources, and integration opportunities.