SlideShare a Scribd company logo
1 of 25
Download to read offline
Lessons Learned From Four Years of API
Management Implementation Success at Unum
Tom Porterfield
DevOps: API Management and Application Development
Unum
Senior Software Engineer
DO3X98S
@TwitterHandle
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
ABOUT UNUM
WHERE IT STARTED
PROTECTING CRITICAL ASSETS
THE ROLE OF A MEDIATOR
WHAT IS AN API
PUTTING IT ALL TOGETHER
1
2
3
4
5
6
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
About UNUM
Who is Unum?
Unum is a leading provider of employee benefits, including disability, life and voluntary insurance. Nearly one in five U.S.
employers who provide group long term disability benefits and more than 42 percent of the Fortune 500 do business with Unum.
With operations in the United States and the United Kingdom, Unum is a diverse family of businesses with a 160-year history.
Our family of businesses
Unum Group consists of Unum US and Colonial Life in the United States and Unum UK in the United Kingdom. With primary
offices in Chattanooga, Tenn., and Portland, Maine, Unum employs about 10,000 people worldwide.
Unum US is a market leader in group and individual disability benefits in the United States, and is one of the largest providers of
group life and voluntary workplace benefits.
Colonial Life is one of the leading providers of voluntary worksite benefits, including disability, life, accident and critical illness
coverage, in the United States.
Unum UK is the leading provider of income protection and critical illness coverage in the United Kingdom, and also offers dual
benefit and life products and services.
Unum's vision and values
Unum's vision is to be the leading provider of employee benefits products and services that help employers manage their
businesses and employees protect their families and livelihoods.
It Started With SOA
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is SOA
 Service Oriented Architecture (SOA) is driven by business agility need, not
technical advancements
 SOA is an architectural style
– Contrary to some vendors, you cannot buy a SOA
– It is about approaches and principles, not fixed technical solutions or patterns
 Focuses on reuse, agility, integration, interoperability, standards…
 SOA is about the principles of constructing loosely-coupled, reusable, application-
agnostic business services
 SOA is about focusing on building services that map to business capabilities
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Unum’s Approach
Business Capability Mapping:
 The enterprise Domain Model AKA Business Object Model is a conceptual model,
which defines the business objects of interest to the enterprise and how they
relate to one another
 It may also define critical attributes associated with a given business object,
especially if they are needed for business rules; however, this model is not a fully
attributed model
 This model sets the stage for driving out the enterprise vocabulary that is then
expanded upon once the fully attributed data objects are built out in the
Enterprise Data and Message Models
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Unum Enterprise SOA
 Service Model (Service Interfaces and Contracts)
 Enterprise Data Model, used to drive message entities and contracts
 Business Services
 Message Based
 Workflow
 Orchestration
 Rules
Business ServicesRules
Workflow
Orchestration
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Enterprise Models
IT Owned:
Business Object
Model
(aka Domain Model)
Enterprise Data
Model
(logical view)
Enterprise
Message Model
(physical view) Drives generation
of entity schemas
Enterprise
Glossary of
Terms
Central source of all business
concepts/objects and terms
identified through project initiatives
and used in development of rules.
Provides for an enterprise wide
common language and meaning of
terms used in the business.
Database Implementation
Data Models
e.g., DB2, SQL Server, Teradata
Logical
Data
Model
Physica
l Data
Model
LEGEND:
Green = Enterprise Models
Blue = Database Models (application level)
Pink = Enterprise Glossary
Enterprise
Service Model
(Service Interfaces
& Contracts)
Mediation’s Role
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is Service Mediation
 An intermediate layer between service clients and physical service
– Provides a unified interface to service clients
 aka virtual service, compared to physical service
– Service clients no longer communicate directly with physical service
– Service mediation can interpret message requests from service clients and
decide how to communicate the request to the physical service
– Service mediation is fully trusted by physical service
– From a client perspective, the service response only comes from the mediated
(virtual) service. Client is unaware of physical implementation
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Benefits of Service Mediation
 Separate physical service technical implementation from service clients to allow more flexible
service implementation, such as versioning, physical server location and set up, service
technology selection and so on
– Service mediation exposes virtual service interface with service contract that can be accessed with
industry standard way of communication, but not a particular service communication requirement
– Physical service selects a particular vendor product or technology that fits best with the physical
service logic implementation
– Physical Service clients will only care about service contract and use the standard way to access service
 Physical service focuses on implementing service logic to deliver business requirements and
leaves service mediation to handle additional service requirements, such as security,
exception formatting, message validation, etc.
 Service mediation applies runtime policy and capabilities to filter message traffic, validate
messages, control traffic, route traffic and so on
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA API Gateway
 Used as a mediation gateway for all of our enterprise services (and a number of tactical services) for
internal consumers
 Provides additional flexibility by decoupling the consumer service endpoint from the
physical implementation
– Allowing for split routing
 Send message to different physical service based on service version
– Control service availability
 Prevent messages from being routed to physical service when that service is scheduled to be unavailable
– Throttle consumer traffic
 Prevent a high volume consumer from impacting overall service performance by restricting the amount of traffic that
consumer is allowed to send to a service
 Optimized for XML
– Very fast schema validation
 Prevents invalid messages from ever reaching the physical service
 And more…
Role in Unum’s SOA Architecture
What is an API
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Web API and SOA
 Web API is one of the masks of SOA service
 SOA is not dead
 SOA service is from capability provider’s view
 Web API is from capability consumer’s view
 Web API’s success relies on SOA
service’s maturity
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
API Categories
 Private
– SOAP
– URI Style
 Public
– URI Style
– Hypermedia Style
 Partner
– SOAP
– URI Style
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
ESB Technology at Unum
ESB = CA API Gateway + IBM Integration Bus
21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA API Gateway as Part of Enterprise Service Bus
 Protection
– No unauthorized access to services
– Invalid messages stopped at
the perimeter
 Reliability
– Throttle high volume consumers
(BizTalk) to prevent impact to customers
– Enforce usage metrics (Salesforce)
 Flexibility
– Decouple consumer
from implementation
– Routing based on version or other
message content
Securing the Perimeter of the Web Service/API Boundary
CA API Gateway
Service Client
HTTP
IBM Integration Bus
Enterprise Identity
Provider
Management Console
Application Servers
MQ
Mainframe
MDM Server
Informatica
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA API Gateway in DMZ
 Authentication/Authorization
– SAML 2.0 Single Sign-on
 Unum EE’s securely access cloud providers
– Workday, Box, Salesforce,
BrightIdea, ServiceNow
 Partners securely access Unum services
– WS-Security
– OAuth 2.0
 Mobile
– Mutual SSL
 Lightweight Message Transformation
– SOAP 1.1 to 1.2
– XML to JSON and back
 Protection
– Protect against Denial of Service (DoS)
– Protect against replay attack
Securely enable access to Unum resources for partners
Cloud Application
Enterprise Service Bus
Firewal
Admin Portal
Tablet
Web Application
Smart Phone
or PDA
CA API Gateway
Enterprise Identity
Provider
Firewal
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO3X102S
Case Study: American Family Insurance Shifts to a
Mobile-First Development Strategy with CA
API Management
Thu Nov 19 at 3:00 pm
DO3T30T
TechTalk: Unlock the Value of APIs through Direct and
Indirect Business Models with CA API Management
Thu Nov 19 at 4:30 pm
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Unlock the
Value of APIs
API Developer Portal
Theater 3
Simplify API
Design &
Creation
Live API Creator
Theater 3
Accelerate
Mobile/IoT
Development
Mobile App Services
Theater 3
Extend Existing
Architectures
API Gateway
Theater 3
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsHello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsCA Technologies
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementCA Technologies
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellCA API Management
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementCA Technologies
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...CA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
Trends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonTrends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonCA API Management
 
Modernize Service-Oriented Architecture with APIs
Modernize Service-Oriented Architecture with APIsModernize Service-Oriented Architecture with APIs
Modernize Service-Oriented Architecture with APIsApigee | Google Cloud
 
Free Your Data: Accelerating Innovation by Using API's to Unlock Core Systems
Free Your Data: Accelerating Innovation by Using API's to Unlock Core SystemsFree Your Data: Accelerating Innovation by Using API's to Unlock Core Systems
Free Your Data: Accelerating Innovation by Using API's to Unlock Core SystemsMuleSoft
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer AppsCA API Management
 
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...MuleSoft
 
APIs in the Enterprise - Lessons Learned
APIs in the Enterprise - Lessons Learned APIs in the Enterprise - Lessons Learned
APIs in the Enterprise - Lessons Learned Apigee | Google Cloud
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachCA Technologies
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management SolutionCA API Management
 

What's hot (20)

Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of ThingsHello, Dishwasher! The Looming Identity Crisis on the Internet of Things
Hello, Dishwasher! The Looming Identity Crisis on the Internet of Things
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 
Visa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API ManagementVisa Europe Drives Innovation in Commerce and Payments with API Management
Visa Europe Drives Innovation in Commerce and Payments with API Management
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
CA API Gateway
CA API GatewayCA API Gateway
CA API Gateway
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Trends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop LondonTrends in Web APIs Layer 7 API Management Workshop London
Trends in Web APIs Layer 7 API Management Workshop London
 
Modernize Service-Oriented Architecture with APIs
Modernize Service-Oriented Architecture with APIsModernize Service-Oriented Architecture with APIs
Modernize Service-Oriented Architecture with APIs
 
Free Your Data: Accelerating Innovation by Using API's to Unlock Core Systems
Free Your Data: Accelerating Innovation by Using API's to Unlock Core SystemsFree Your Data: Accelerating Innovation by Using API's to Unlock Core Systems
Free Your Data: Accelerating Innovation by Using API's to Unlock Core Systems
 
5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps5 Steps for End-to-End Mobile Security with Consumer Apps
5 Steps for End-to-End Mobile Security with Consumer Apps
 
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...
API Driven IoT Insights Revolutionize Beer Inventory Management at Buffalo Wi...
 
APIs in the Enterprise - Lessons Learned
APIs in the Enterprise - Lessons Learned APIs in the Enterprise - Lessons Learned
APIs in the Enterprise - Lessons Learned
 
Protecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data BreachProtecting the Software-Defined Data Center from Data Breach
Protecting the Software-Defined Data Center from Data Breach
 
How to Choose the Right API Management Solution
How to Choose the Right API Management SolutionHow to Choose the Right API Management Solution
How to Choose the Right API Management Solution
 

Similar to Lessons Learned From Four Years of API Management Implementation Success at Unum

Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...CA Technologies
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...CA Technologies
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5Shobhit Srivastava
 
Enterprise API deployment best practice
Enterprise API deployment best practiceEnterprise API deployment best practice
Enterprise API deployment best practiceSanjay Roy
 
Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...CA Technologies
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...CA Technologies
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureProlifics
 
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...CA Technologies
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyCA Technologies
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENCA Technologies
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesCAST
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 

Similar to Lessons Learned From Four Years of API Management Implementation Success at Unum (20)

Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
Enterprise API deployment best practice
Enterprise API deployment best practiceEnterprise API deployment best practice
Enterprise API deployment best practice
 
Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...Case Study: Rogers Communications Integrates CA API Management and CA Service...
Case Study: Rogers Communications Integrates CA API Management and CA Service...
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Cloud Options for a Modern Architecture
Cloud Options for a Modern ArchitectureCloud Options for a Modern Architecture
Cloud Options for a Modern Architecture
 
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
Hewlett Packard Enterprise View on Going Big with API Management - Applicatio...
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case Study
 
Managing Service Providers for Today’s Digital Business
Managing Service Providers for Today’s Digital BusinessManaging Service Providers for Today’s Digital Business
Managing Service Providers for Today’s Digital Business
 
Modernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GENModernizing COBOL Applications with CA GEN
Modernizing COBOL Applications with CA GEN
 
Shifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business OutcomesShifting Vendor Management Focus to Risk and Business Outcomes
Shifting Vendor Management Focus to Risk and Business Outcomes
 
SOACS-Overview.pdf
SOACS-Overview.pdfSOACS-Overview.pdf
SOACS-Overview.pdf
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Esquare company preso
Esquare company presoEsquare company preso
Esquare company preso
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Lessons Learned From Four Years of API Management Implementation Success at Unum

  • 1. Lessons Learned From Four Years of API Management Implementation Success at Unum Tom Porterfield DevOps: API Management and Application Development Unum Senior Software Engineer DO3X98S @TwitterHandle #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda ABOUT UNUM WHERE IT STARTED PROTECTING CRITICAL ASSETS THE ROLE OF A MEDIATOR WHAT IS AN API PUTTING IT ALL TOGETHER 1 2 3 4 5 6
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD About UNUM Who is Unum? Unum is a leading provider of employee benefits, including disability, life and voluntary insurance. Nearly one in five U.S. employers who provide group long term disability benefits and more than 42 percent of the Fortune 500 do business with Unum. With operations in the United States and the United Kingdom, Unum is a diverse family of businesses with a 160-year history. Our family of businesses Unum Group consists of Unum US and Colonial Life in the United States and Unum UK in the United Kingdom. With primary offices in Chattanooga, Tenn., and Portland, Maine, Unum employs about 10,000 people worldwide. Unum US is a market leader in group and individual disability benefits in the United States, and is one of the largest providers of group life and voluntary workplace benefits. Colonial Life is one of the leading providers of voluntary worksite benefits, including disability, life, accident and critical illness coverage, in the United States. Unum UK is the leading provider of income protection and critical illness coverage in the United Kingdom, and also offers dual benefit and life products and services. Unum's vision and values Unum's vision is to be the leading provider of employee benefits products and services that help employers manage their businesses and employees protect their families and livelihoods.
  • 6. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is SOA  Service Oriented Architecture (SOA) is driven by business agility need, not technical advancements  SOA is an architectural style – Contrary to some vendors, you cannot buy a SOA – It is about approaches and principles, not fixed technical solutions or patterns  Focuses on reuse, agility, integration, interoperability, standards…  SOA is about the principles of constructing loosely-coupled, reusable, application- agnostic business services  SOA is about focusing on building services that map to business capabilities
  • 7. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Unum’s Approach Business Capability Mapping:  The enterprise Domain Model AKA Business Object Model is a conceptual model, which defines the business objects of interest to the enterprise and how they relate to one another  It may also define critical attributes associated with a given business object, especially if they are needed for business rules; however, this model is not a fully attributed model  This model sets the stage for driving out the enterprise vocabulary that is then expanded upon once the fully attributed data objects are built out in the Enterprise Data and Message Models
  • 8. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Unum Enterprise SOA  Service Model (Service Interfaces and Contracts)  Enterprise Data Model, used to drive message entities and contracts  Business Services  Message Based  Workflow  Orchestration  Rules Business ServicesRules Workflow Orchestration
  • 9. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Enterprise Models IT Owned: Business Object Model (aka Domain Model) Enterprise Data Model (logical view) Enterprise Message Model (physical view) Drives generation of entity schemas Enterprise Glossary of Terms Central source of all business concepts/objects and terms identified through project initiatives and used in development of rules. Provides for an enterprise wide common language and meaning of terms used in the business. Database Implementation Data Models e.g., DB2, SQL Server, Teradata Logical Data Model Physica l Data Model LEGEND: Green = Enterprise Models Blue = Database Models (application level) Pink = Enterprise Glossary Enterprise Service Model (Service Interfaces & Contracts)
  • 11. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Service Mediation  An intermediate layer between service clients and physical service – Provides a unified interface to service clients  aka virtual service, compared to physical service – Service clients no longer communicate directly with physical service – Service mediation can interpret message requests from service clients and decide how to communicate the request to the physical service – Service mediation is fully trusted by physical service – From a client perspective, the service response only comes from the mediated (virtual) service. Client is unaware of physical implementation
  • 12. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Benefits of Service Mediation  Separate physical service technical implementation from service clients to allow more flexible service implementation, such as versioning, physical server location and set up, service technology selection and so on – Service mediation exposes virtual service interface with service contract that can be accessed with industry standard way of communication, but not a particular service communication requirement – Physical service selects a particular vendor product or technology that fits best with the physical service logic implementation – Physical Service clients will only care about service contract and use the standard way to access service  Physical service focuses on implementing service logic to deliver business requirements and leaves service mediation to handle additional service requirements, such as security, exception formatting, message validation, etc.  Service mediation applies runtime policy and capabilities to filter message traffic, validate messages, control traffic, route traffic and so on
  • 13. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA API Gateway  Used as a mediation gateway for all of our enterprise services (and a number of tactical services) for internal consumers  Provides additional flexibility by decoupling the consumer service endpoint from the physical implementation – Allowing for split routing  Send message to different physical service based on service version – Control service availability  Prevent messages from being routed to physical service when that service is scheduled to be unavailable – Throttle consumer traffic  Prevent a high volume consumer from impacting overall service performance by restricting the amount of traffic that consumer is allowed to send to a service  Optimized for XML – Very fast schema validation  Prevents invalid messages from ever reaching the physical service  And more… Role in Unum’s SOA Architecture
  • 14. What is an API
  • 15. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 16. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
  • 17. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Web API and SOA  Web API is one of the masks of SOA service  SOA is not dead  SOA service is from capability provider’s view  Web API is from capability consumer’s view  Web API’s success relies on SOA service’s maturity
  • 18. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD API Categories  Private – SOAP – URI Style  Public – URI Style – Hypermedia Style  Partner – SOAP – URI Style
  • 19. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD ESB Technology at Unum ESB = CA API Gateway + IBM Integration Bus
  • 20. 21 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA API Gateway as Part of Enterprise Service Bus  Protection – No unauthorized access to services – Invalid messages stopped at the perimeter  Reliability – Throttle high volume consumers (BizTalk) to prevent impact to customers – Enforce usage metrics (Salesforce)  Flexibility – Decouple consumer from implementation – Routing based on version or other message content Securing the Perimeter of the Web Service/API Boundary CA API Gateway Service Client HTTP IBM Integration Bus Enterprise Identity Provider Management Console Application Servers MQ Mainframe MDM Server Informatica
  • 21. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA API Gateway in DMZ  Authentication/Authorization – SAML 2.0 Single Sign-on  Unum EE’s securely access cloud providers – Workday, Box, Salesforce, BrightIdea, ServiceNow  Partners securely access Unum services – WS-Security – OAuth 2.0  Mobile – Mutual SSL  Lightweight Message Transformation – SOAP 1.1 to 1.2 – XML to JSON and back  Protection – Protect against Denial of Service (DoS) – Protect against replay attack Securely enable access to Unum resources for partners Cloud Application Enterprise Service Bus Firewal Admin Portal Tablet Web Application Smart Phone or PDA CA API Gateway Enterprise Identity Provider Firewal
  • 22. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 23. 24 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO3X102S Case Study: American Family Insurance Shifts to a Mobile-First Development Strategy with CA API Management Thu Nov 19 at 3:00 pm DO3T30T TechTalk: Unlock the Value of APIs through Direct and Indirect Business Models with CA API Management Thu Nov 19 at 4:30 pm
  • 24. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Unlock the Value of APIs API Developer Portal Theater 3 Simplify API Design & Creation Live API Creator Theater 3 Accelerate Mobile/IoT Development Mobile App Services Theater 3 Extend Existing Architectures API Gateway Theater 3
  • 25. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15