SlideShare a Scribd company logo
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	

Best	Prac*ces	in	Deploying	API	
Gateways	
API	World	2017	
	
	
	
Greg	DiFruscio	
Director	of	Support	
gdifruscio@forumsys.com
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Why they are an essential component of a secure, robust and
scalable API infrastructure.
Best practices and common deployment
scenarios of API Gateways.
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
TYPES	of	API	GATEWAYS
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
#1	 API	Gateway	Basics	
Deployed	similar	to	a	reverse	proxy	(protocol	
break)	
The	gateway	represents	the	endpoint	API	and	
appears	to	the	consumer	as	if	it	is	the	applica*on	or	
service	itself	
Can	be	located	on-premise	or	in	cloud	
Move	the	security,	iden*ty,	and	management	
processing	out	to	the	API	Gateway	*er	–	let	the	
APIs	focus	on	the	business	requirement	
While	API	Gateways	expose	the	APIs,	not	all	API	
Gateways	truly	secure	the	APIs
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
IAM	(Iden*ty	and	Access	Management)	designed	for	
Iden*ty	and	Access	Control	and	centralizing	IAM	agents	
IAM	Gateway	products	support	limited	API	types	(i.e.	
REST)	
Limited	support	for	network	protocols	(i.e.	REST	APIs	
over	HTTP)	
Very	liUle	or	no	ability	to	provide	informa*on	
assurance	of	the	API	data	
Typically	built	on	insecure	plaVorms	–	soWware	only	or	
unhardened	virtual	appliance	
#2	 API	IAM	Gateways
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
More	versa*le	than	IAM	Gateways	with	broader	support	for	API	
types	and	network	protocols	
Evolved	from	ESB	integra*on	plaVorms	where	integra*on	and	
payload	conversion	are	core	func*ons	
Usually	developer	centric	
OWen	provide	developer	portals	for	API	consumers,	self	
documen*ng	APIs	
Typically	built	on	open	plaVorms	designed	for	flexibility	
Inherently	suscep*ble	to	aUack	and	compromise	
#3	 API	Management	Gateways
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Security	first	focus	–	product	form	factors	and	feature	sets	
Products	hardened	against	cyber	aUack	–	closed	systems	
Include	API	Iden*ty	features	from	IAM	space	
Include	API	Governance	features	from	API	Management	space	
Include	API	Security	from	Cybersecurity	space	
Support	for	wide	array	of	API	types	and	network	protocols	
Focus	on	content	layer	security	(e.g.	schema	valida*on,	
encryp*on,	dsig)	in	addi*on	to	TLS	
Bi-direc*onal	scanning	to	prevent	threats	as	well	as	data	leakage	
#4	 API	Security	Gateways
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Which	type	of	API	Gateway	is	right	for	you?	
	
Is	HTTP/S	only	protocol	sufficient?	
Are	REST	API	services	the	only	type	you	will	need	to	support?	
Are	you	concerned	about	malware	and	other	API	exploits	
embedded	within	the	payloads?	
Do	you	need	to	support	legacy	applica*ons	and	services?	
Are	you	concerned	with	data	leakage	and	sensi*ve	informa*on	
loss?
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
DEPLOYING	API	GATEWAYS
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
On-Premise	or	cloud?	
Hardware,	virtual,	soWware,	AMI,	
other?	
#1	 Loca*on	and	Form	Factor	
Where	are	the	services?	
Where	are	the	clients?	
Where	are	the	user	iden*ty	
repositories?
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
API	types	(e.g.	REST,	SOAP,	XML,	Web	Portals,	etc.)	
Network	protocols	(HTTP/S,	SFTP,	JMS,	SMTP,	AMQP	1.0,	
mixing)	
Iden*ty,	access	control,	and	SSO	requirements	(Iden*ty	
Repositories)	
API	security	requirements	(TLS,	Schema	valida*on,	AV	scanning,	
parameter	valida*on,	method	valida*on,	etc.)	
API	integra*on	/	media*on	requirements	(JSON	to/from	XML,	
etc.)	
Logging	requirements	
Custom	Error	handling		
#2	 Use	Case	Discussion
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Simple	is	beUer	(point	and	click,	no	coding	necessary)	
Error	on	the	side	of	security	
Start	basic	and	add	processing	layers	
Reusing	policy	objects		
Policy	naming	conven*ons	
Propaga*on	of	policies	across	environments	
Automa*on	via	APIs	
#4	 Policy	Configura*on	and	Management
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Ask	your	vendor	for	a	security	review	of	your	policies	
Check	for	sensi*ve	informa*on	in	logs	
Check	for	weak	ciphers	and	TLS	/	SSL	protocols	
Posi*ve	and	nega*ve	tes*ng	
Review	errors	generated	on	gateway	and	errors	returned	from	
applica*ons	
Do	it	before	moving	into	produc*on	
Schedule	them	oWen	
	
#4	 Security	Review
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
BEST	PRACTICES	IN	API	SECURITY
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
	
Secure	OS	–	the	infrastructure	is	a	target	
Secure	policy	/	configura*on	storage	
Protect	your	private	keys	
#1	 Product	Security
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
#2	 API	Security	Policy
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Aim	for	agentless	approach	
Protect	iden*ty	repositories	
Use	SSO	and	Federa*on	
#3	 API	Iden*ty	
Mul*-Context	authen*ca*on	and	
authoriza*on	
Reduce	dependencies	on	vendor	specific	
implementa*ons
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Rewri*ng	URLs	–	obfuscate	your	path	
Mapping	payload	formats	–	for	integra*on	as	well	as	security	
Mapping	user	aUribute	informa*on	retrieved	from	iden*ty	call	
Querying	LDAP,	Databases,	APIs	(t-junc*on	processing)	
Network	protocol	media*on	(e.g.	HTTPS	to/from	Ac*veMQ)	
#4	 API	Integra*on
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Integrate	with	central	SIEM	/	logging	system	(e.g.	Splunk,	ELK,	
Graylog,	etc.)	
Build	real	*me	Dashboards	from	gateway	logs	
Leverage	big	data	analy*cs	for	alerts,	trends,	reports	
#3	 API	Monitoring
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
Choose	the	right	type	of	API	Gateway	for	your	current	and	future	
needs	
Decide	where	the	API	Gateway(s)	will	live	and	what	form	factors	
are	correct	for	your	environment	
Spend	the	*me	upfront	to	architect	the	solu*on	and	build	the	
policies	in	accordance	to	your	plan	
Your	APIs	and	your	API	infrastructure	are	targets	–	API	Security	
means	security	features	as	well	as	secure	architecture	
	
Conclusions
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
ForumOS™.		FIPS	140-2	Level	II	purpose-built	chassis.		NIAP	NDPP	
CerPfied.		Patented	cryptographic	acceleraPon	
Fully	encapsulated	virtualized	rendiPon	of	Hardware	system	in	a	
deployable	Amazon	AMI			
Windows,	Linux,	or	Solaris	deployable	in	any	compuPng	ecosystem	
(single-package	install	with	no	dependencies)	
FORM	FACTORS	
API	Security	Gateway	
Fully	encapsulated	virtualized	rendiPon	of	Hardware	system	in	a	
deployable	OVA	VMWare	image	
Hardware	
Virtual	
Cloud	
SoWware
Forum	Systems			|			www.forumsys.com			|			888.811.0060			|			75	Second	Avenue,	Suite	520		Needham,	MA	02494	
To	learn	more	visit	us	at		
h[p://info.forumsys.com/api_world

More Related Content

What's hot

Sba dc netapp_dg (1)
Sba dc netapp_dg (1)Sba dc netapp_dg (1)
Sba dc netapp_dg (1)purushotham m
 
Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
AppViewX
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration
Chris Cavallo
 
AssureBridge - SSO With Many B2B Customers - Marketing Presentation
AssureBridge - SSO With Many B2B Customers - Marketing PresentationAssureBridge - SSO With Many B2B Customers - Marketing Presentation
AssureBridge - SSO With Many B2B Customers - Marketing Presentation
AssureBridge
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
NetworkCollaborators
 
AVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & ServicesAVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & Services
Williams_j_j
 
Coral Active HTML5 Agent Desktop
Coral Active HTML5 Agent DesktopCoral Active HTML5 Agent Desktop
Coral Active HTML5 Agent DesktopPSS Help
 
Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco Canada
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
ITpreneurs
 
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
EMC
 
Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
Keith Harris
 
CNS - An Introduction
CNS - An IntroductionCNS - An Introduction
CNS - An Introduction
cnssources
 
An Introduction to CNS
An Introduction to CNSAn Introduction to CNS
An Introduction to CNS
cnssources
 
Coral Active HTML5 Agent Desktop
Coral Active HTML5 Agent DesktopCoral Active HTML5 Agent Desktop
Coral Active HTML5 Agent Desktop
PSS Help
 
DSS_Resource_Guide_booklet_2015
DSS_Resource_Guide_booklet_2015DSS_Resource_Guide_booklet_2015
DSS_Resource_Guide_booklet_2015Jan Robin
 

What's hot (20)

Sba dc netapp_dg (1)
Sba dc netapp_dg (1)Sba dc netapp_dg (1)
Sba dc netapp_dg (1)
 
JAL Resume
JAL ResumeJAL Resume
JAL Resume
 
Best Practices for Certificate Management
Best Practices for Certificate ManagementBest Practices for Certificate Management
Best Practices for Certificate Management
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration
 
AssureBridge - SSO With Many B2B Customers - Marketing Presentation
AssureBridge - SSO With Many B2B Customers - Marketing PresentationAssureBridge - SSO With Many B2B Customers - Marketing Presentation
AssureBridge - SSO With Many B2B Customers - Marketing Presentation
 
Cisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlexCisco Connect 2018 Indonesia - Cisco HyperFlex
Cisco Connect 2018 Indonesia - Cisco HyperFlex
 
AVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & ServicesAVT Systems Ltd - Solutions & Services
AVT Systems Ltd - Solutions & Services
 
Coral Active HTML5 Agent Desktop
Coral Active HTML5 Agent DesktopCoral Active HTML5 Agent Desktop
Coral Active HTML5 Agent Desktop
 
Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr Cisco’s Cloud Strategy, including our acquisition of CliQr
Cisco’s Cloud Strategy, including our acquisition of CliQr
 
Why SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking CareersWhy SDN Skills is a Big Boost to Networking Careers
Why SDN Skills is a Big Boost to Networking Careers
 
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
Oracle PeopleSoft on Cisco Unified Computing System and EMC VNX Storage
 
Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Secure Enterprise Mobility
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
2012 ah apj deploying byod
2012 ah apj   deploying byod2012 ah apj   deploying byod
2012 ah apj deploying byod
 
CNS - An Introduction
CNS - An IntroductionCNS - An Introduction
CNS - An Introduction
 
R.Netmeating
R.NetmeatingR.Netmeating
R.Netmeating
 
An Introduction to CNS
An Introduction to CNSAn Introduction to CNS
An Introduction to CNS
 
Coral Active HTML5 Agent Desktop
Coral Active HTML5 Agent DesktopCoral Active HTML5 Agent Desktop
Coral Active HTML5 Agent Desktop
 
DSS_Resource_Guide_booklet_2015
DSS_Resource_Guide_booklet_2015DSS_Resource_Guide_booklet_2015
DSS_Resource_Guide_booklet_2015
 

Similar to Best Practices in Deploying API Gateways

Three Innovations that Define a “Next-Generation Global Transit Hub”
Three Innovations that Define a “Next-Generation Global Transit Hub”Three Innovations that Define a “Next-Generation Global Transit Hub”
Three Innovations that Define a “Next-Generation Global Transit Hub”
Khash Nakhostin
 
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
apidays
 
API Management Microservices beyond HIP
API Management Microservices beyond HIPAPI Management Microservices beyond HIP
API Management Microservices beyond HIP
SmartWave
 
Accelerate Digital London Technical Masterclass
Accelerate Digital London Technical MasterclassAccelerate Digital London Technical Masterclass
Accelerate Digital London Technical Masterclass
Apigee | Google Cloud
 
xConf-2022-api-gateway-service-mesh.pdf
xConf-2022-api-gateway-service-mesh.pdfxConf-2022-api-gateway-service-mesh.pdf
xConf-2022-api-gateway-service-mesh.pdf
Wesley Reisz
 
Unlocking the Cloud Operating Model
Unlocking the Cloud Operating ModelUnlocking the Cloud Operating Model
Unlocking the Cloud Operating Model
Mitchell Pronschinske
 
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must KnowwebMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
Kellton Tech Solutions Ltd
 
Breeze overview
Breeze overviewBreeze overview
Breeze overview
Yang Cheng
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
Shiu-Fun Poon
 
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesSecurely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Khash Nakhostin
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Technologies
 
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
Rockwell Automation
 
Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2
Apigee | Google Cloud
 
Gab2015 samir arezki_api management
Gab2015 samir arezki_api managementGab2015 samir arezki_api management
Gab2015 samir arezki_api management
Vincent Thavonekham-Pro
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
Samir Arezki ☁
 
Techorama 2014 - Azure API management and Service Virtualization
Techorama 2014 - Azure API management and Service VirtualizationTechorama 2014 - Azure API management and Service Virtualization
Techorama 2014 - Azure API management and Service Virtualization
Sam Vanhoutte
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2
 
What You Need to Know About Operationalizing Your AWS Transit Hub
What You Need to Know About Operationalizing Your AWS Transit HubWhat You Need to Know About Operationalizing Your AWS Transit Hub
What You Need to Know About Operationalizing Your AWS Transit Hub
Khash Nakhostin
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit Network
Khash Nakhostin
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
Natalia Kataoka
 

Similar to Best Practices in Deploying API Gateways (20)

Three Innovations that Define a “Next-Generation Global Transit Hub”
Three Innovations that Define a “Next-Generation Global Transit Hub”Three Innovations that Define a “Next-Generation Global Transit Hub”
Three Innovations that Define a “Next-Generation Global Transit Hub”
 
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
apidays LIVE JAKARTA - Take control of your microservices with App Mesh by Ak...
 
API Management Microservices beyond HIP
API Management Microservices beyond HIPAPI Management Microservices beyond HIP
API Management Microservices beyond HIP
 
Accelerate Digital London Technical Masterclass
Accelerate Digital London Technical MasterclassAccelerate Digital London Technical Masterclass
Accelerate Digital London Technical Masterclass
 
xConf-2022-api-gateway-service-mesh.pdf
xConf-2022-api-gateway-service-mesh.pdfxConf-2022-api-gateway-service-mesh.pdf
xConf-2022-api-gateway-service-mesh.pdf
 
Unlocking the Cloud Operating Model
Unlocking the Cloud Operating ModelUnlocking the Cloud Operating Model
Unlocking the Cloud Operating Model
 
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must KnowwebMethods 10.5 and webMethods.io Integration: Everything You Must Know
webMethods 10.5 and webMethods.io Integration: Everything You Must Know
 
Breeze overview
Breeze overviewBreeze overview
Breeze overview
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In MinutesSecurely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
Securely Connecting Your Customers to Their Cloud-Hosted App – In Minutes
 
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA MicrogatewayCA Microgateway: Deploying, Configuring, and Extending CA Microgateway
CA Microgateway: Deploying, Configuring, and Extending CA Microgateway
 
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
Battery-free, Info-enabled AGVs Bring Portable Assembly Lines to Automotive I...
 
Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2
 
Gab2015 samir arezki_api management
Gab2015 samir arezki_api managementGab2015 samir arezki_api management
Gab2015 samir arezki_api management
 
Azure API Management
Azure API ManagementAzure API Management
Azure API Management
 
Techorama 2014 - Azure API management and Service Virtualization
Techorama 2014 - Azure API management and Service VirtualizationTechorama 2014 - Azure API management and Service Virtualization
Techorama 2014 - Azure API management and Service Virtualization
 
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIsWSO2- OSC Korea - Accelerating Digital Businesses with APIs
WSO2- OSC Korea - Accelerating Digital Businesses with APIs
 
What You Need to Know About Operationalizing Your AWS Transit Hub
What You Need to Know About Operationalizing Your AWS Transit HubWhat You Need to Know About Operationalizing Your AWS Transit Hub
What You Need to Know About Operationalizing Your AWS Transit Hub
 
Seven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit NetworkSeven Criteria for Building an AWS Global Transit Network
Seven Criteria for Building an AWS Global Transit Network
 
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17 IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
IBM DataPower Weekly Webcast - The Value of Datapower Frameworks - 11.03.17
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Best Practices in Deploying API Gateways