SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
 




                                              SecureSpan Mobile Access Gateway  
                                           
                                              Securely Open Enterprise & Cloud Applications to Mobile Devices
                                              Enterprises are facing an increasing array of mobile challenges, from BYOD to iPad field enablement. 
The Mobile Access Gateway                     Central to these challenges is the need to surface internal enterprise information assets in mobile ready 
                                              formats that can be easily consumed by both mobile developers and the apps they create.  
enables you to: 
                                              The SecureSpan Mobile Access Gateway simplifies the process of adapting internal data, application and 
Secure mobile apps                            security infrastructure for mobile use. The Gateway provides a centralized way to control security and 
                                              management policies for information assets exposed via APIs to mobile developers and apps.  
       Adapt existing applications 
        and data into mobile ready 
                                              Secure, Adapt, Optimize & Integrate with Ease 
        data and API formats 
                                              The Mobile Access Gateway is lightweight, low‐latency mobile middleware with integrated security and 
       Secure internal information           management controls designed to help enterprises safely and reliably expose internal assets to 
        exposed to mobile apps                developers and remote apps, as mobile APIs. The Gateway solves critical mobile‐specific identity, 
                                              security, adaptation, optimization and integration challenges.  
       Secure internal information 
        and developers via APIs 
                                              Benefits 
Enable mobile developers                      Identity: Extend Enterprise Identity to Mobile 
       Create a central portal to help            Map Web SSO and SAML to mobile‐friendly OAuth, OpenID Connect and JSON Web tokens  
        developers discover and                    Create granular access policies at the user, app and device levels 
        consume mobile APIs 
                                                   Build composite access policies combining geolocation, message content etc. 
Optimize Mobile Access                             Simplify PKI‐based certificate delivery and provisioning 
       Optimize mobile                       Security: Firewall Mobile Applications 
        performance and scale                      Protect REST, SOAP and OData APIs against DoS and API attacks 
       Integrate with mobile‐                     Proxy API streaming protocols like HTML5 WebSockets and XMPP messaging 
        specific cloud services and                Enforce FIPS 140‐2 grade data privacy and integrity  
        social networks 
                                                   Validate data exchanges, including all JSON, XML, header and parameter content 
 
Learn More About the                          Adaptation: Translate & Orchestrate Data & APIs 
Layer 7 SecureSpan Mobile                          Surface any legacy application or database as REST APIs 
Access Gateway                                     Quickly map between data formats such as XML and JSON 
       Phone                                      Recompose and virtualize APIs to specific mobile identities, apps and devices 
        +1‐800‐681‐9377                            Orchestrate API mashups with configurable workflow   
        (toll free within North America)      Optimization: Handle Scale  
        or +1‐604‐681‐9377 
                                                   Cache calls to backend applications 
       Email                                      Recompose small backend calls into efficiently aggregated mobile requests 
        info@layer7.com 
                                                   Compress traffic to minimize bandwidth costs and improve user experience 
       Web                                        Pre‐fetch content for hypermedia‐based API calls 
        www.layer7.com 
                                              Integration: Centralize Cloud Connectivity 
       Facebook                                   Proxy and manage app interactions with social networks 
        www.facebook.com/layer7 
                                                   Broker call‐outs to cloud services like Salesforce.com 
       Twitter                                    Bridge connectivity to iPhone, Windows and Android notification services 
        @layer7 
                                                   Integrate with legacy applications using ESB capabilities 
 
                                              Help Developers Discover & Consume Mobile APIs 
                                              To help mobile developers discover and consume APIs published by the Mobile Access Gateway, 
                                              enterprises can also deploy the Layer 7 API Portal. The API Portal addresses key developer management 
                                              requirements including: 
                                                   Developer registration and API key issuance 
                                                   API discovery and documentation 
                                                   API education and testing 
           
                                                   API usage monitoring, subscription and monetization 

                    Copyright © 2012 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are  
                    trademarks of Layer 7 Technologies, Inc. All other trademarks and copyrights are the property of their respective owners. 
Features 
Identity 
Access Control                        Support for OAuth, OpenID Connect, SAML, X.509 certificates, LDAP etc. 
                                      Support for HTTP basic, digest, SSL client‐side certificate authorization etc. 

Identity Integration                  Integration with enterprise identity, access, SSO and federation systems including LDAP, 
                                       Microsoft Active Directory/Federated Services, Oracle Access Manager, IBM Tivoli (TAM and 
                                       TFIM), CA SiteMinder and SOA Security Manager, RSA ClearTrust, Sun Java Access Manager 
                                       and Novell Access Manager 
                                      Mapping between Web Access Tokens and mobile token exchange mechanisms 
                                      SAML to OAuth enablement 
Mobile Application Firewalling  & Data Security 
Threat Protection                     Validate HTTP parameters, REST query/POST parameters, JSON data structures, XML  
                                       schemas etc. 
                                      Protect against cross‐site scripting (XSS), SQL injection and DoS attacks 
                                      Track failed authentications and/or policy violations to identify patterns and potential threats 

Data Streaming Proxy                  Proxy mobile streaming protocols like WebSockets and XMPP 

Privacy & Digital                     On‐board PKI and cert management with optional HSM 
Certificates                          Fast elliptic curve cryptography (conforms to NSA's Suite B algorithms) 
                                      FIPS 140‐2 support in both hardware and software 
Adaptation & Orchestration 
API Orchestration                     Compose and orchestrate REST and OData APIs from any legacy backend API  

SLA Controls                          Control API usage: throttle to ensure backend services are not overwhelmed; limit by user, 
                                       time of day, location etc.; quota manage (e.g. number of uses/user per day) 

JSON Conversion                       Map enterprise data sources to JSON (e.g. EDI standard formats, flat files, Oracle, IBM DB2, 
                                       Microsoft SQL Server) 
Optimization 
Compression                           Dynamic message compression 
                                      JSON conversion 

Message Caching                       Cache responses to common API requests, decreasing backend service load 
                                      Pre‐fetch hypermedia API content 

Request Aggregation                   Aggregate responses to mobile devices to save on‐device processing and latency   
Cloud & Social Integration 
Cloud Services SSO                    Enable and manage Single Sign‐On (SSO) from enterprise identities to cloud services, such  
                                       as Salesforce.com 

Social Networks                       Proxy and manage mobile application access to social networks and services including 
                                       Facebook, Twitter, LinkedIn and many more 
                                      Detect and filter for sensitive or confidential content with subsequent scrubbing, rejection or 
                                       redaction of messages 

Notification Services                 Send messages across multiple mobile platforms (iOS, Android, Windows Mobile)  
Supported Standards 
REST, JSON, XML, OAuth 1.0a and 2.0, OpenID Connect, JSON Web Token (JWT), XMPP, WebSocket, Apple Push Notification 
Service, Android C2MD Framework, OData, PCI‐DSS, AJAX, LDAP, SAML, PKCS, X.509 Certificates, FIPS 140‐2, Kerberos, SSL/TLS, 
SNMP, SMTP, POP3, IMAP4, HTTP/HTTPS, JMS, MQ Series, Tibco EMS, FTP/FTPS, IPv6 
 
 




         Copyright © 2012 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are  
         trademarks of Layer 7 Technologies, Inc. All other trademarks and copyrights are the property of their respective owners. 

Más contenido relacionado

Más de CA API Management

API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...CA API Management
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device UniverseCA API Management
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...CA API Management
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...CA API Management
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 

Más de CA API Management (20)

API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
Revisiting Geddes' Outlook Tower - Mike Amundsen, Director of API Architectur...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
Enabling the Multi-Device Universe
Enabling the Multi-Device UniverseEnabling the Multi-Device Universe
Enabling the Multi-Device Universe
 
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
Building APIs That Last for Decades - Irakli Nadareishvili, Director of API S...
 
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
The Art of API Design - Ronnie Mitra, Director of API Design, API Academy at ...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 

Securespan Mobile Access Gateway

  • 1.   SecureSpan Mobile Access Gateway       Securely Open Enterprise & Cloud Applications to Mobile Devices   Enterprises are facing an increasing array of mobile challenges, from BYOD to iPad field enablement.  The Mobile Access Gateway  Central to these challenges is the need to surface internal enterprise information assets in mobile ready  formats that can be easily consumed by both mobile developers and the apps they create.   enables you to:  The SecureSpan Mobile Access Gateway simplifies the process of adapting internal data, application and  Secure mobile apps  security infrastructure for mobile use. The Gateway provides a centralized way to control security and  management policies for information assets exposed via APIs to mobile developers and apps.    Adapt existing applications  and data into mobile ready  Secure, Adapt, Optimize & Integrate with Ease  data and API formats  The Mobile Access Gateway is lightweight, low‐latency mobile middleware with integrated security and   Secure internal information  management controls designed to help enterprises safely and reliably expose internal assets to  exposed to mobile apps  developers and remote apps, as mobile APIs. The Gateway solves critical mobile‐specific identity,  security, adaptation, optimization and integration challenges.    Secure internal information  and developers via APIs  Benefits  Enable mobile developers  Identity: Extend Enterprise Identity to Mobile   Create a central portal to help   Map Web SSO and SAML to mobile‐friendly OAuth, OpenID Connect and JSON Web tokens   developers discover and   Create granular access policies at the user, app and device levels  consume mobile APIs   Build composite access policies combining geolocation, message content etc.  Optimize Mobile Access   Simplify PKI‐based certificate delivery and provisioning   Optimize mobile  Security: Firewall Mobile Applications  performance and scale   Protect REST, SOAP and OData APIs against DoS and API attacks   Integrate with mobile‐  Proxy API streaming protocols like HTML5 WebSockets and XMPP messaging  specific cloud services and   Enforce FIPS 140‐2 grade data privacy and integrity   social networks   Validate data exchanges, including all JSON, XML, header and parameter content    Learn More About the   Adaptation: Translate & Orchestrate Data & APIs  Layer 7 SecureSpan Mobile    Surface any legacy application or database as REST APIs  Access Gateway   Quickly map between data formats such as XML and JSON   Phone   Recompose and virtualize APIs to specific mobile identities, apps and devices  +1‐800‐681‐9377    Orchestrate API mashups with configurable workflow    (toll free within North America)   Optimization: Handle Scale   or +1‐604‐681‐9377   Cache calls to backend applications   Email   Recompose small backend calls into efficiently aggregated mobile requests  info@layer7.com   Compress traffic to minimize bandwidth costs and improve user experience   Web    Pre‐fetch content for hypermedia‐based API calls  www.layer7.com  Integration: Centralize Cloud Connectivity   Facebook       Proxy and manage app interactions with social networks  www.facebook.com/layer7   Broker call‐outs to cloud services like Salesforce.com   Twitter   Bridge connectivity to iPhone, Windows and Android notification services  @layer7   Integrate with legacy applications using ESB capabilities      Help Developers Discover & Consume Mobile APIs  To help mobile developers discover and consume APIs published by the Mobile Access Gateway,  enterprises can also deploy the Layer 7 API Portal. The API Portal addresses key developer management  requirements including:   Developer registration and API key issuance   API discovery and documentation   API education and testing     API usage monitoring, subscription and monetization  Copyright © 2012 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are   trademarks of Layer 7 Technologies, Inc. All other trademarks and copyrights are the property of their respective owners. 
  • 2. Features  Identity  Access Control   Support for OAuth, OpenID Connect, SAML, X.509 certificates, LDAP etc.   Support for HTTP basic, digest, SSL client‐side certificate authorization etc.  Identity Integration   Integration with enterprise identity, access, SSO and federation systems including LDAP,  Microsoft Active Directory/Federated Services, Oracle Access Manager, IBM Tivoli (TAM and  TFIM), CA SiteMinder and SOA Security Manager, RSA ClearTrust, Sun Java Access Manager  and Novell Access Manager   Mapping between Web Access Tokens and mobile token exchange mechanisms   SAML to OAuth enablement  Mobile Application Firewalling  & Data Security  Threat Protection   Validate HTTP parameters, REST query/POST parameters, JSON data structures, XML   schemas etc.   Protect against cross‐site scripting (XSS), SQL injection and DoS attacks   Track failed authentications and/or policy violations to identify patterns and potential threats  Data Streaming Proxy   Proxy mobile streaming protocols like WebSockets and XMPP  Privacy & Digital   On‐board PKI and cert management with optional HSM  Certificates   Fast elliptic curve cryptography (conforms to NSA's Suite B algorithms)   FIPS 140‐2 support in both hardware and software  Adaptation & Orchestration  API Orchestration   Compose and orchestrate REST and OData APIs from any legacy backend API   SLA Controls   Control API usage: throttle to ensure backend services are not overwhelmed; limit by user,  time of day, location etc.; quota manage (e.g. number of uses/user per day)  JSON Conversion   Map enterprise data sources to JSON (e.g. EDI standard formats, flat files, Oracle, IBM DB2,  Microsoft SQL Server)  Optimization  Compression   Dynamic message compression   JSON conversion  Message Caching   Cache responses to common API requests, decreasing backend service load   Pre‐fetch hypermedia API content  Request Aggregation   Aggregate responses to mobile devices to save on‐device processing and latency    Cloud & Social Integration  Cloud Services SSO   Enable and manage Single Sign‐On (SSO) from enterprise identities to cloud services, such   as Salesforce.com  Social Networks   Proxy and manage mobile application access to social networks and services including  Facebook, Twitter, LinkedIn and many more   Detect and filter for sensitive or confidential content with subsequent scrubbing, rejection or  redaction of messages  Notification Services   Send messages across multiple mobile platforms (iOS, Android, Windows Mobile)   Supported Standards  REST, JSON, XML, OAuth 1.0a and 2.0, OpenID Connect, JSON Web Token (JWT), XMPP, WebSocket, Apple Push Notification  Service, Android C2MD Framework, OData, PCI‐DSS, AJAX, LDAP, SAML, PKCS, X.509 Certificates, FIPS 140‐2, Kerberos, SSL/TLS,  SNMP, SMTP, POP3, IMAP4, HTTP/HTTPS, JMS, MQ Series, Tibco EMS, FTP/FTPS, IPv6      Copyright © 2012 Layer 7 Technologies Inc. All rights reserved.  SecureSpan and the Layer 7 Technologies design mark are   trademarks of Layer 7 Technologies, Inc. All other trademarks and copyrights are the property of their respective owners.