SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Importance of APIs and
their Management in Digitisation Initiatives
Successfully manage your own and third-party APIs to meet
security and compliance requirements!
Roland Wenzke | SEEBURGER AG | House Venue in Bretten, 23.10.2019
© SEEBURGER AG 2019 2
Digitalisation Has its Challenges
COMPLIANCE
Regulation
COMPLIANCE
Compliant with the law
EFFECTIVENESS
Standardisation
SAFETY AND SECURITY
Data Protection
EFFECTIVENESS
Automation
SAFETY AND SECURITY
Scalability
© SEEBURGER AG 2019 3
GDPR
Compliance – Legislators Tighten Data Protection Guidelines
Threat of Heavy Fines
The framework for fines has been considerably
increased by the basic data protection regulation.
While the maximum amount was €300,000 per case
in the past, companies are now threatened with a
maximum fine of up to €20 million or up to four
percent of their worldwide annual turnover for
the most serious data protection violations.
© SEEBURGER AG 2019 4
Consequences of Non-Compliance
Intercepted e-mails enable scamming
Financial Industry
»Mail servers or e-mails are the preferred
technical target for attacks.«
© SEEBURGER AG 2019 5
Data Protection
Especially important for medium-sized businesses!
Total
affected presumably affected not affected
© SEEBURGER AG 2019 6
Data Protection
Highest Risk During Data Transfer
data theft / spied
or intercepted
data
computer
fraud
industrial
secrets
copyright
research violation
system
damage or
sabotage
blackmail manipulation of
financial account
data
© SEEBURGER AG 2019 7
Data Protection - Billions in damages due to data theft
43 billion euros in losses in the 2-year period
Please estimate the damage to your company in Germany within the last two years caused by the type of offence that has occurred.
Basis: All surveyed industrial companies that have been affected by data theft, industrial espionage or sabotage in the last 2 years (n=343)
Source: Bitkom Research
crime type
Loss amounts within the last 2 years in
billion euros
Image damage to customers or suppliers / Negative media coverage 8,8
Patent infringement (even before application) 8,5
Failure, theft or damage of information and production systems or operational processes 6,7
Investigation and replacement costs 5,7
Loss of revenue due to loss of competitive advantages 4,0
Loss of sales due to counterfeit products (plagiarism) 3,7
litigation costs 3,7
Data protection measures (e.g. customer information) 1,4
Extortion with stolen data or encrypted data 0,3
Other losses 0,6
Total damage within the last two years 43,4
© SEEBURGER AG 2019 8
Compliance – Global Players Take a Close Look at Their Suppliers
“Our IT security has everything on the
radar everywhere, every day, every hour.
With the additional networking provided by
the Industrial Cloud, we will know immediately
if an unknown software is installed in a
supplier's IT system. And then we can quickly
assess whether we need to sound the alarm.„
Martin Hoffmann
CIO of the Volkswagen Group on the subject of IT security
© SEEBURGER AG 2019 9
API Interfaces Are a New Threat
The writing is on the wall
https://securityaffairs.co/wordpress/87259/digital-id/venmo-privacy-transactions.html
© SEEBURGER AG 2019 10
API Interfaces Are a New Source of Danger
There are also many examples of warnings
https://nakedsecurity.sophos.com/2019/03/25/thousands-of-coders-are-leaving-their-crown-jewels-exposed-on-github/
https://securityaffairs.co/wordpress/87259/digital-id/venmo-privacy-transactions.html
© SEEBURGER AG 2019 11
https://threatpost.com/critical-cisco-bug-remote-takeover-routers/147826/
API Interfaces Are a New Threat
The writing is on the wall
© SEEBURGER AG 2019 12
https://threatpost.com/internal-accenture-data-customer-information-exposed-in-public-amazon-s3-bucket/128364/
API Interfaces Are a New Threat
The writing is on the wall
© SEEBURGER AG 2019 13
API Interfaces as a Source of Danger
What are the main security vulnerabilities?
The details of the safety standards violation is not always clear.
However typically they take place in the following areas:
Excessive Data Exposure
One speaks of this when an API provides data that is not actually required for the use case. The client
consuming the data can filter it. However, these filters are vulnerable or can be bypassed.
Lack of Resources due to lack of
throttling
If it is not possible to limit the number of parallel calls of an API, this can lead to an overload of the
backend and thus affect the general function of the backend system, up to a total failure. Such a
situation can be caused by an unintentional misconfiguration of the API consumer or by a malicious
intention (DoS/DDoS attacks).
Authentication & Authorization
A sophisticated authorization system is part of the solution to avoid excessive data exposure.
However, the best implementation does not help here if the solution itself offers gaps for an attack for
hackers on the server or the client side, e.g. if authentication tokens are stored unprotected and can
therefore fall into the wrong hands.
Security Misconfiguration
The best security procedures are useless if they are not activated. In general, all aspects of IT and data
security must be included in the implementation.
© SEEBURGER AG 2019 14
API-Based Digitization Initiatives
How do you approach the first challenges?
There are more and more application scenarios,
bringing the API interfaces with them
 API-based B2B integration
 Data as service:
e.g. provide information for ad-hoc retrieval
 Industry initiatives such as Open Banking
 Integration of internal and external applications
(e.g. cloud applications like Salesforce and services
from the cloud like Google Geo-Location)
 Provision of services and data about
Mobile Apps
REST and you are set?
API Integration ranges from trivial to sophisticated
Trivial
API integration point-to-point
Standard
API integration with multiple endpoints
Demanding
API integration of multiple systems,
applications, services
© SEEBURGER AG 2019 15
What is the successful implementation of API Integration
leading to ?
© SEEBURGER AG 2019 16
API-based Digitization Initiatives
Management of security, compliance and profitability?
Typical for API-based digitization initiatives:
 In most cases (as with MFT) these are initiatives that are triggered by the Line of Business.
 APIs are often about consuming cloud services that are designed to be used by a Line of Business.
 The connection to these services is typically achieved via APIs. Typically the use of these cloud services
requires data from the existing internal company systems.
 In the beginning there are only a few use cases which are conencted, but over time the number increases.
© SEEBURGER AG 2019 17
Examples of API Scenarios
Companies of almost every size are dealing with an increasing number of APIs:
 Webshop and ERP connections use case: consume APIs
 CRM (Salesforce) to SAP use case: consume APIs
 Connecting Marketo to CRM Solution use case: Consume APIs
 Grant access to price lists for customers use case: provide APIs
 Grant access to billing and reporting for customers use case: provide APIs
© SEEBURGER AG 2019 18
API Scenario ‘provide’
Provide APIs internally or externally (‘provisioning’)
Internal API
providing systems
API consuming
Apps & Systems
Applications / System
offering REST / SOAP
APIs
© SEEBURGER AG 2019 19
API Scenario ‘provide’
Provide APIs internally or externally (‘provisioning’)
Internal Systems &
Databases without APIs
BIS API Integration
Solution
API integration
Internal API
providing systems
API consuming
Apps & Systems
Applications / System
offering REST / SOAP
APIs
3rd Party Solution
providing REST / SOAP
APIs for connected
Applications and
Systems
Unmanaged
APIs!
Internal Applications
providing data via an API
implemented by a BIS
API Integration service
© SEEBURGER AG 2019 20
API Scenario ‘provide’
Provide APIs internally or externally (‘provisioning’)
Internal Systems &
Databases without APIs
BIS API Integration
Solution
API integration
Internal API
providing systems
API consuming
Apps & Systems
App Developers &
App Owners
API Publishers &
API admins
BIS API
portal
BIS API
gateway
API ManagementApplications / System
offering REST / SOAP
APIs
3rd Party Solution
providing REST / SOAP
APIs for connected
Applications and
Systems
Managed in regards to: Security, Compliance / Governance, Efficiency
Internal Applications
providing data via an API
implemented by a BIS
API Integration service
Managed
APIs!
Managed
APIs!
© SEEBURGER AG 2019 21
API Admins &
API Consumers
BIS API
portal
BIS API
gateway
API Management
API Scenario ‘consume’
Access to ‘consumption of’ APIs from external providers
Internal Systems &
Databases without APIs
BIS API Integration
Solution
API integration
Internal API
consuming systems
APIs provided by
external providers
Unmanaged
API consumption!
Applications / System
consuming externally
provided REST / SOAP
APIs
3rd Party Solution
consuming REST / SOAP
APIs of external
providers
Managed in regards to: Security, Compliance / Governance, Efficiency
Internal Applications
consuming data
provided by BIS API
integration coming from
externally provided APIs
Managed API
consumption!
© SEEBURGER AG 2019 22
CRM APPLICATIONS HR APPLICATIONS E-BUSINESS APPLICATIONS
API-based Digitization Initiatives
e.g. business apps are increasingly booked as cloud services
© SEEBURGER AG 2019 23
API-based Digitization Initiatives
Management of security, compliance and profitability?
What about you?
Economic efficiency? Implement API connection yourself Introducing a Central API Solution
Few API interfaces
"This is what the provider of the cloud service
should do for us"
"Is it worth it?"
Many API interfaces
"We must get rid of the uncontrolled
growth!"
"We should have done this from the beginning!"
Only a few API interfaces Implement API connection yourself Introducing a Central API Solution
Safety and security "I hope that has all been considered"
Central API gateway provides clear
safety standards
Compliance
"GDPR? I don't even know exactly what data
is being exchanged. The Line of Business took
care of this."
Central documentation of all APIs in the API portal.
Governance processes for the introduction of new
APIs
© SEEBURGER AG 2019 24
Benefits of an API Management Solution
Even if it is ‚only‘ about the connection (‚consume‘) of external APIs
Central API catalog creates
transparency and efficiency as well is
reducing costs
Transparency around existing APIs which
avoids duplicate development
Audit trail
Central proof of API usage
API mediation
Enables the decoupling of the used external
APIs from the internally used (API) interfaces
Safety and security
Enables the central, uniform application of
defined security policies. Central protection
for used API keys in the API gateway instead of
decentralized storage in ‚solutions‘ triggered
and / or run by Lines of Business.
Data Leakage / Compliance
Among other things, companies are legally
obliged under EU GDPR and other privacy acts
to protect personal or sensitive data. This also
applies to data that is sent to external services
as a payload in API calls.
© SEEBURGER AG 2019 25
API-based Digitization Initiatives
What do the analysts (Gartner) say?
Source: Gartner Document “Managing the Consumption of Third-Party APIs”, August 2, 2019 from Mark O´Neill
© SEEBURGER AG 2019 26
Overview of the BIS API Management Solution
Manage ‘Provision’ & ‘Consumption’ of APIs
Internal Systems &
Databases Providing &
Consuming data
BIS API Integration
Solution
API integration
Internal systems
Providing & Consuming data
via own APIs
App Developers &
App OwnersAPI Publishers &
API admins
API providing
services
Managed APIs: Security, Compliance / Governance, Efficiency
API consuming
Apps & Systems
EXTERNAL (INTERNET)INTERNAL (INTRANET)
API Integration
platform providing
and consuming APIs
BIS API
portal
BIS API
gateway
API Management
© SEEBURGER AG 2019 27
API Management Security Architecture Overview
API Gateway protects APIs - and also needs protection
Internal Systems &
Databases Providing &
Consuming data
BIS API Integration
Solution
API integration
Internal systems
Providing & Consuming data
via own APIs
App Developers &
App OwnersAPI Publishers &
API admins
API providing
services
Managed APIs: Security, Compliance/Governance, Efficiency
API consuming
Apps & Systems
EXTERNAL (INTERNET)INTERNAL (INTRANET)
API Integration
platform providing
and consuming APIs
API gateway
protection
Unmanaged
APIs!
© SEEBURGER AG 2019 28
API Management Security Architecture Overview
API Gateway protects APIs - and also needs protection
Internal Systems &
Databases Providing &
Consuming data
BIS API Integration
Solution
API integration
Internal systems
Providing & Consuming data
via own APIs
App Developers &
App OwnersAPI Publishers &
API admins
API providing
services
Managed APIs: Security, Compliance/Governance, Efficiency
API consuming
Apps & Systems
EXTERNAL (INTERNET)INTERNAL (INTRANET)
API Integration
platform providing
and consuming APIs
BIS API
portal
BIS API
gateway
API Management
Managed APIs
© SEEBURGER AG 2019 29
API Management Security Architecture Overview
API Gateway protects APIs - and also needs protection
Internal Systems &
Databases Providing &
Consuming data
BIS API Integration
Solution
API integration
Internal systems
Providing & Consuming data
via own APIs
App Developers &
App OwnersAPI Publishers &
API admins
API providing
services
Managed APIs: Security, Compliance/Governance, Efficiency
API consuming
Apps & Systems
EXTERNAL (INTERNET)INTERNAL (INTRANET)
API Integration
platform providing
and consuming APIs
BIS API
portal
BIS API
gateway
API Management
anti
DDoS
messenger
mitigation
WAF
API gateway
protection
© SEEBURGER AG 2019 30
API Management Security Architecture Overview
API Gateway protects APIs - and also needs protection
Explanation of the previous slides:
 API Gateway protects APIs as follows:
 Protection against unauthorized access internally and externally
 Protection against unauthorized content (inbound and outbound)
 Protection against excessive and forbidden consumption
 The API gateway itself must also be protected:
 Web Application Firewall: Analysis of the traffic between the different components
 Anti-DDoS: protection against DDoS attacks that limit availability
 Bot mitigation: protection against unwanted and automated attacks
© SEEBURGER AG 2019 31
API Management
Summary
The following conclusions can be drawn from the points presented:
 The use of APIs continues to grow strongly - and with it the associated dangers.
 For security and compliance reasons, API interfaces should be treated as any sensitive file transfer:
 Manage Files: Managed File Transfer
 Manage APIs: API Management
 It is recommended to start ‚early‘ - not only when an uncontrolled growth in API usasge has occurred.
 ‚Management‘ not only arises when one‘s own APIs are opened externally, but also from the beginning
when API-based services are ‚consumed‘.
 With the SEEBURGER BIS platform, you are equipped to tackle these challenges successfully.
© SEEBURGER AG 2019 32
Thank you very much
Questions or remarks?
We are here for you!
www.seeburger.com
© Copyright 2019 SEEBURGER AG. All rights reserved.
The information in this document is proprietary to SEEBURGER. Neither any part of this document, nor the whole of it may be reproduced, copied, or transmitted in any form or purpose without the
express prior written permission of SEEBURGER AG. Please note that this document is subject to change and may be changed by SEEBURGER at any time without notice. SEEBURGER‘s Software product,
the ones of its business partners may contain software components from third parties.
SAP®, SAP® R/3®, SAP NetWeaver®, SAP Cloud Plattform & Cloud Plattform Integrator®, SAP Archive Link®, SAP S4/Hana®, SAP® GLOBAL TRADE Service® (SAP GTS), SAP Fiori ®, ABAP™ and SAP ARIBA® are
registered trade marks of the SAP AG or the SAP AG Deutschland (Germany). Microsoft, Windows, Windows Phone, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of
Microsoft Corporation in the United States and other countries. Linux is a registered trade mark of Linus Torvalds in the United States and other countries. UNIX, X/Open, OSF/1, and Motif are registered
trademarks of the Open Group. Adobe, the Adobe logo, Acrobat, Flash, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and / or
other countries. HTML, ML, XHTML, and W3C are trademarks, registered trademarks, or claimed as generic terms by the Massachusetts Institute of Technology (MIT), European Research Consortium for
Informatics and Mathematics (ERCIM), or Keio University. Oracle and Java are registered trademarks of Oracle and its affiliates.
All other product and service names mentioned are the trademarks of their respective companies.
4invoice®, iMartOne®, SEEBURGER®, SEEBURGER Business-Integration Server®, SEEBURGER Logistic Solution Professional®, SEEBURGER Web Supplier Hub®, WinELKE®, SEEBURGER File Exchange ®,
SEEBURGER Link ®, SMART E-Invoice ® and other products or services of SEEBURGER which appear in this document as well as the according logos are marks or registered marks of the SEEBURGER AG in
Germany and of other countries worldwide. All other products and services names are marks of the mentioned companies. All contents of the present document are noncommittal and have a mere
information intention. Products and services may be country-specific designed. All other mentioned company and software designations are trade marks or unregistered trade marks of the respective
organizations and are liable to the corresponding legal regulations.
 The information in this document is proprietary to SEEBURGER. No part of this document may be reproduced, copied, or transmitted in any form or purpose without the express prior written
permission of SEEBURGER AG.
 This document is a preliminary version and not subject to your license agreement or any other agreement with SEEBURGER. This document contains only intended strategies, developments, and
functionalities of the SEEBURGER product and is not intended to be binding upon SEEBURGER to any particular course of business, product strategy, and/or development. Please note that this
document is subject to change and may be changed by SEEBURGER at any time without notice.
 SEEBURGER assumes no responsibility for errors or omissions in this document. SEEBURGER does not warrant the accuracy or completeness of the information, text, graphics, links, or other items
contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a
particular purpose, or non-infringement.
 SEEBURGER shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation
shall not apply in cases of intent or gross negligence.
 The statutory liability for personal injury and defective products is not affected. SEEBURGER has no control over the information that you may access through the use of hot links contained in these
materials and does not endorse your use of third-party web pages nor provide any warranty whatsoever relating to third-party web pages.
© SEEBURGER AG 2019 33

Weitere ähnliche Inhalte

Was ist angesagt?

Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Alan Quayle
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionsFakher Oueslati
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of ViewCisco Canada
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?Aeris
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsRobb Boyd
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyAlan Quayle
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionAlan Quayle
 
Evolving Security in Process Control
Evolving Security in Process ControlEvolving Security in Process Control
Evolving Security in Process ControlLockheed-Martin
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyAegify Inc.
 
IoT Meetup September 2019
IoT Meetup September 2019IoT Meetup September 2019
IoT Meetup September 2019IoT Academy
 
Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Amazon Web Services
 
The Business of Enterprise IoT: A survey of US and UK Executives
The Business of Enterprise IoT: A survey of US and UK Executives The Business of Enterprise IoT: A survey of US and UK Executives
The Business of Enterprise IoT: A survey of US and UK Executives Aeris
 
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerReports Corner
 
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Lockheed-Martin
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 

Was ist angesagt? (20)

Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
 
telebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutionstelebriefing-150415-ericssons-security-solutions
telebriefing-150415-ericssons-security-solutions
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Internet of Everything: The CIO's Point of View
Internet of Everything:  The CIO's Point of ViewInternet of Everything:  The CIO's Point of View
Internet of Everything: The CIO's Point of View
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?
 
TechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational InsightsTechWiseTV Workshop: Operational Insights
TechWiseTV Workshop: Operational Insights
 
3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnifyBe a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
Be a Virtual Mobile Network for your M2M/IoT Devices, Martin Giess, EMnify
 
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, VivactionSquareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
Squareway, a Secure Private 3G Network, Cyrille Manente, Vivaction
 
Evolving Security in Process Control
Evolving Security in Process ControlEvolving Security in Process Control
Evolving Security in Process Control
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
F-Secure Corporation
F-Secure CorporationF-Secure Corporation
F-Secure Corporation
 
IoT Meetup September 2019
IoT Meetup September 2019IoT Meetup September 2019
IoT Meetup September 2019
 
Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both Cloud-Based Innovation and Information Security - Choose Both
Cloud-Based Innovation and Information Security - Choose Both
 
The Business of Enterprise IoT: A survey of US and UK Executives
The Business of Enterprise IoT: A survey of US and UK Executives The Business of Enterprise IoT: A survey of US and UK Executives
The Business of Enterprise IoT: A survey of US and UK Executives
 
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on BluemixCapgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
Capgemini Connected Car Demo Using IBM Internet of Things Foundation on Bluemix
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCorner
 
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015Evolving Security in Process Control - Cyber Security for Critical Assets 2015
Evolving Security in Process Control - Cyber Security for Critical Assets 2015
 
Webinar IoT Cloud Platforms and Middleware for Rapid Application Development
Webinar IoT Cloud Platforms and Middleware for Rapid Application DevelopmentWebinar IoT Cloud Platforms and Middleware for Rapid Application Development
Webinar IoT Cloud Platforms and Middleware for Rapid Application Development
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 

Ähnlich wie Importance of APIs and their Management in Digitalisation Initiatives

How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateSEEBURGER
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用Amazon Web Services
 
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)SEEBURGER
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationRogue Wave Software
 
F5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfF5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfFahmiDzikrullah
 
Standard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsStandard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsSEEBURGER
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXNatashaVerma29
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computingTyrone Systems
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...apidays
 
Spectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & LogisticsSpectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & LogisticsNadia Hilger
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Amazon Web Services
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application securityJohn Varghese
 
Unlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyUnlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyMitchell Pronschinske
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroPrime Infoserv
 
Modern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyModern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyDevOps Indonesia
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays
 

Ähnlich wie Importance of APIs and their Management in Digitalisation Initiatives (20)

How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
 
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
More Freestyle Less Duty: Integration Platform as a Service (IPaaS)
 
Disrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformationDisrupt or be disrupted – Using secure APIs to drive digital transformation
Disrupt or be disrupted – Using secure APIs to drive digital transformation
 
F5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdfF5-API-Security-Best-Practices.pdf
F5-API-Security-Best-Practices.pdf
 
Standard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic DocumentsStandard Solutions for Track and Trace of Electronic Documents
Standard Solutions for Track and Trace of Electronic Documents
 
QRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTXQRadar_on_Cloud_client_presentation.PPTX
QRadar_on_Cloud_client_presentation.PPTX
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing6 major cyber security risks to cloud computing
6 major cyber security risks to cloud computing
 
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
APIsecure 2023 - Exploring Advanced API Security Techniques and Technologies,...
 
Spectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & LogisticsSpectos Live Tracking Solutions for Postal & Logistics
Spectos Live Tracking Solutions for Postal & Logistics
 
Becoming an interconnected enterprise
Becoming an interconnected enterpriseBecoming an interconnected enterprise
Becoming an interconnected enterprise
 
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019 Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
Securing the edge with AWS IoT services - FND330 - AWS re:Inforce 2019
 
IBM Internet of Things Offerings
IBM Internet of Things OfferingsIBM Internet of Things Offerings
IBM Internet of Things Offerings
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
 
Unlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning StrategyUnlocking the Cloud Operating Model: The Provisioning Strategy
Unlocking the Cloud Operating Model: The Provisioning Strategy
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
Modern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API FriendlyModern App Architecture - Microservices, API Friendly
Modern App Architecture - Microservices, API Friendly
 
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
apidays Helsinki & North 2023 - API Security in the era of Generative AI, Mat...
 
Mitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-RadarMitigate attacks with IBM BigFix and Q-Radar
Mitigate attacks with IBM BigFix and Q-Radar
 

Mehr von SEEBURGER

Best Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingBest Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingSEEBURGER
 
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceE-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceSEEBURGER
 
Global E-Invoicing
Global E-InvoicingGlobal E-Invoicing
Global E-InvoicingSEEBURGER
 
E-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsE-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsSEEBURGER
 
Collaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionCollaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionSEEBURGER
 
Fifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesFifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesSEEBURGER
 
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform SEEBURGER
 
Kollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungKollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungSEEBURGER
 
Standardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenStandardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenSEEBURGER
 
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceiPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceSEEBURGER
 
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleFifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleSEEBURGER
 
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. SEEBURGER
 
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service SEEBURGER
 
Globales E-Invoicing
Globales E-InvoicingGlobales E-Invoicing
Globales E-InvoicingSEEBURGER
 
E-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenE-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenSEEBURGER
 
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenDie Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenSEEBURGER
 
Closing Compliance Gap
Closing Compliance GapClosing Compliance Gap
Closing Compliance GapSEEBURGER
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsSEEBURGER
 
Protecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferProtecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferSEEBURGER
 
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global Consolidation
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global ConsolidationCASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global Consolidation
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global ConsolidationSEEBURGER
 

Mehr von SEEBURGER (20)

Best Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicingBest Practice Approaches for the Implementation of E-invoicing
Best Practice Approaches for the Implementation of E-invoicing
 
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery ServiceE-Invoicing: Invoice Provisioning with the Invoice Delivery Service
E-Invoicing: Invoice Provisioning with the Invoice Delivery Service
 
Global E-Invoicing
Global E-InvoicingGlobal E-Invoicing
Global E-Invoicing
 
E-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice ReceiptsE-Invoicing: Automate Invoice Receipts
E-Invoicing: Automate Invoice Receipts
 
Collaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner ConnectionCollaborative Product Development with 100% Partner Connection
Collaborative Product Development with 100% Partner Connection
 
Fifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, ExamplesFifty Shades of Cloud - Overview, Best Practices, Examples
Fifty Shades of Cloud - Overview, Best Practices, Examples
 
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
Welchen Innovationsbeitrag leistet eine moderne Integrationsplattform
 
Kollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % PartneranbindungKollaborative Produktentwicklung mit 100 % Partneranbindung
Kollaborative Produktentwicklung mit 100 % Partneranbindung
 
Standardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen DokumentenStandardlösungen für Track & Trace von elektronischen Dokumenten
Standardlösungen für Track & Trace von elektronischen Dokumenten
 
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a ServiceiPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
iPaas: Mehr Kür, weniger Pflicht – Integration Platform as a Service
 
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, BeispieleFifty shades of Cloud - Überblick, Best Practices, Beispiele
Fifty shades of Cloud - Überblick, Best Practices, Beispiele
 
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice. Best Practice-Ansätze bei der Umsetzung von E-Invoice.
Best Practice-Ansätze bei der Umsetzung von E-Invoice.
 
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
E-Invoicing: Rechnungsausgang mit dem Invoice Delivery Service
 
Globales E-Invoicing
Globales E-InvoicingGlobales E-Invoicing
Globales E-Invoicing
 
E-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisierenE-Invocing: Rechnungseingang automatisieren
E-Invocing: Rechnungseingang automatisieren
 
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei DigitalisierungsinitiativenDie Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
Die Bedeutung von APIs und deren Management bei Digitalisierungsinitiativen
 
Closing Compliance Gap
Closing Compliance GapClosing Compliance Gap
Closing Compliance Gap
 
How to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply ChainsHow to Avoid Data Breach Disasters in Automotive Supply Chains
How to Avoid Data Breach Disasters in Automotive Supply Chains
 
Protecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File TransferProtecting SAP® Data with Managed File Transfer
Protecting SAP® Data with Managed File Transfer
 
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global Consolidation
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global ConsolidationCASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global Consolidation
CASE STUDY: How SCA Hygiene Leveraged SAP NetWeaver for Global Consolidation
 

Kürzlich hochgeladen

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 

Kürzlich hochgeladen (20)

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 

Importance of APIs and their Management in Digitalisation Initiatives

  • 1. Importance of APIs and their Management in Digitisation Initiatives Successfully manage your own and third-party APIs to meet security and compliance requirements! Roland Wenzke | SEEBURGER AG | House Venue in Bretten, 23.10.2019
  • 2. © SEEBURGER AG 2019 2 Digitalisation Has its Challenges COMPLIANCE Regulation COMPLIANCE Compliant with the law EFFECTIVENESS Standardisation SAFETY AND SECURITY Data Protection EFFECTIVENESS Automation SAFETY AND SECURITY Scalability
  • 3. © SEEBURGER AG 2019 3 GDPR Compliance – Legislators Tighten Data Protection Guidelines Threat of Heavy Fines The framework for fines has been considerably increased by the basic data protection regulation. While the maximum amount was €300,000 per case in the past, companies are now threatened with a maximum fine of up to €20 million or up to four percent of their worldwide annual turnover for the most serious data protection violations.
  • 4. © SEEBURGER AG 2019 4 Consequences of Non-Compliance Intercepted e-mails enable scamming Financial Industry »Mail servers or e-mails are the preferred technical target for attacks.«
  • 5. © SEEBURGER AG 2019 5 Data Protection Especially important for medium-sized businesses! Total affected presumably affected not affected
  • 6. © SEEBURGER AG 2019 6 Data Protection Highest Risk During Data Transfer data theft / spied or intercepted data computer fraud industrial secrets copyright research violation system damage or sabotage blackmail manipulation of financial account data
  • 7. © SEEBURGER AG 2019 7 Data Protection - Billions in damages due to data theft 43 billion euros in losses in the 2-year period Please estimate the damage to your company in Germany within the last two years caused by the type of offence that has occurred. Basis: All surveyed industrial companies that have been affected by data theft, industrial espionage or sabotage in the last 2 years (n=343) Source: Bitkom Research crime type Loss amounts within the last 2 years in billion euros Image damage to customers or suppliers / Negative media coverage 8,8 Patent infringement (even before application) 8,5 Failure, theft or damage of information and production systems or operational processes 6,7 Investigation and replacement costs 5,7 Loss of revenue due to loss of competitive advantages 4,0 Loss of sales due to counterfeit products (plagiarism) 3,7 litigation costs 3,7 Data protection measures (e.g. customer information) 1,4 Extortion with stolen data or encrypted data 0,3 Other losses 0,6 Total damage within the last two years 43,4
  • 8. © SEEBURGER AG 2019 8 Compliance – Global Players Take a Close Look at Their Suppliers “Our IT security has everything on the radar everywhere, every day, every hour. With the additional networking provided by the Industrial Cloud, we will know immediately if an unknown software is installed in a supplier's IT system. And then we can quickly assess whether we need to sound the alarm.„ Martin Hoffmann CIO of the Volkswagen Group on the subject of IT security
  • 9. © SEEBURGER AG 2019 9 API Interfaces Are a New Threat The writing is on the wall https://securityaffairs.co/wordpress/87259/digital-id/venmo-privacy-transactions.html
  • 10. © SEEBURGER AG 2019 10 API Interfaces Are a New Source of Danger There are also many examples of warnings https://nakedsecurity.sophos.com/2019/03/25/thousands-of-coders-are-leaving-their-crown-jewels-exposed-on-github/ https://securityaffairs.co/wordpress/87259/digital-id/venmo-privacy-transactions.html
  • 11. © SEEBURGER AG 2019 11 https://threatpost.com/critical-cisco-bug-remote-takeover-routers/147826/ API Interfaces Are a New Threat The writing is on the wall
  • 12. © SEEBURGER AG 2019 12 https://threatpost.com/internal-accenture-data-customer-information-exposed-in-public-amazon-s3-bucket/128364/ API Interfaces Are a New Threat The writing is on the wall
  • 13. © SEEBURGER AG 2019 13 API Interfaces as a Source of Danger What are the main security vulnerabilities? The details of the safety standards violation is not always clear. However typically they take place in the following areas: Excessive Data Exposure One speaks of this when an API provides data that is not actually required for the use case. The client consuming the data can filter it. However, these filters are vulnerable or can be bypassed. Lack of Resources due to lack of throttling If it is not possible to limit the number of parallel calls of an API, this can lead to an overload of the backend and thus affect the general function of the backend system, up to a total failure. Such a situation can be caused by an unintentional misconfiguration of the API consumer or by a malicious intention (DoS/DDoS attacks). Authentication & Authorization A sophisticated authorization system is part of the solution to avoid excessive data exposure. However, the best implementation does not help here if the solution itself offers gaps for an attack for hackers on the server or the client side, e.g. if authentication tokens are stored unprotected and can therefore fall into the wrong hands. Security Misconfiguration The best security procedures are useless if they are not activated. In general, all aspects of IT and data security must be included in the implementation.
  • 14. © SEEBURGER AG 2019 14 API-Based Digitization Initiatives How do you approach the first challenges? There are more and more application scenarios, bringing the API interfaces with them  API-based B2B integration  Data as service: e.g. provide information for ad-hoc retrieval  Industry initiatives such as Open Banking  Integration of internal and external applications (e.g. cloud applications like Salesforce and services from the cloud like Google Geo-Location)  Provision of services and data about Mobile Apps REST and you are set? API Integration ranges from trivial to sophisticated Trivial API integration point-to-point Standard API integration with multiple endpoints Demanding API integration of multiple systems, applications, services
  • 15. © SEEBURGER AG 2019 15 What is the successful implementation of API Integration leading to ?
  • 16. © SEEBURGER AG 2019 16 API-based Digitization Initiatives Management of security, compliance and profitability? Typical for API-based digitization initiatives:  In most cases (as with MFT) these are initiatives that are triggered by the Line of Business.  APIs are often about consuming cloud services that are designed to be used by a Line of Business.  The connection to these services is typically achieved via APIs. Typically the use of these cloud services requires data from the existing internal company systems.  In the beginning there are only a few use cases which are conencted, but over time the number increases.
  • 17. © SEEBURGER AG 2019 17 Examples of API Scenarios Companies of almost every size are dealing with an increasing number of APIs:  Webshop and ERP connections use case: consume APIs  CRM (Salesforce) to SAP use case: consume APIs  Connecting Marketo to CRM Solution use case: Consume APIs  Grant access to price lists for customers use case: provide APIs  Grant access to billing and reporting for customers use case: provide APIs
  • 18. © SEEBURGER AG 2019 18 API Scenario ‘provide’ Provide APIs internally or externally (‘provisioning’) Internal API providing systems API consuming Apps & Systems Applications / System offering REST / SOAP APIs
  • 19. © SEEBURGER AG 2019 19 API Scenario ‘provide’ Provide APIs internally or externally (‘provisioning’) Internal Systems & Databases without APIs BIS API Integration Solution API integration Internal API providing systems API consuming Apps & Systems Applications / System offering REST / SOAP APIs 3rd Party Solution providing REST / SOAP APIs for connected Applications and Systems Unmanaged APIs! Internal Applications providing data via an API implemented by a BIS API Integration service
  • 20. © SEEBURGER AG 2019 20 API Scenario ‘provide’ Provide APIs internally or externally (‘provisioning’) Internal Systems & Databases without APIs BIS API Integration Solution API integration Internal API providing systems API consuming Apps & Systems App Developers & App Owners API Publishers & API admins BIS API portal BIS API gateway API ManagementApplications / System offering REST / SOAP APIs 3rd Party Solution providing REST / SOAP APIs for connected Applications and Systems Managed in regards to: Security, Compliance / Governance, Efficiency Internal Applications providing data via an API implemented by a BIS API Integration service Managed APIs! Managed APIs!
  • 21. © SEEBURGER AG 2019 21 API Admins & API Consumers BIS API portal BIS API gateway API Management API Scenario ‘consume’ Access to ‘consumption of’ APIs from external providers Internal Systems & Databases without APIs BIS API Integration Solution API integration Internal API consuming systems APIs provided by external providers Unmanaged API consumption! Applications / System consuming externally provided REST / SOAP APIs 3rd Party Solution consuming REST / SOAP APIs of external providers Managed in regards to: Security, Compliance / Governance, Efficiency Internal Applications consuming data provided by BIS API integration coming from externally provided APIs Managed API consumption!
  • 22. © SEEBURGER AG 2019 22 CRM APPLICATIONS HR APPLICATIONS E-BUSINESS APPLICATIONS API-based Digitization Initiatives e.g. business apps are increasingly booked as cloud services
  • 23. © SEEBURGER AG 2019 23 API-based Digitization Initiatives Management of security, compliance and profitability? What about you? Economic efficiency? Implement API connection yourself Introducing a Central API Solution Few API interfaces "This is what the provider of the cloud service should do for us" "Is it worth it?" Many API interfaces "We must get rid of the uncontrolled growth!" "We should have done this from the beginning!" Only a few API interfaces Implement API connection yourself Introducing a Central API Solution Safety and security "I hope that has all been considered" Central API gateway provides clear safety standards Compliance "GDPR? I don't even know exactly what data is being exchanged. The Line of Business took care of this." Central documentation of all APIs in the API portal. Governance processes for the introduction of new APIs
  • 24. © SEEBURGER AG 2019 24 Benefits of an API Management Solution Even if it is ‚only‘ about the connection (‚consume‘) of external APIs Central API catalog creates transparency and efficiency as well is reducing costs Transparency around existing APIs which avoids duplicate development Audit trail Central proof of API usage API mediation Enables the decoupling of the used external APIs from the internally used (API) interfaces Safety and security Enables the central, uniform application of defined security policies. Central protection for used API keys in the API gateway instead of decentralized storage in ‚solutions‘ triggered and / or run by Lines of Business. Data Leakage / Compliance Among other things, companies are legally obliged under EU GDPR and other privacy acts to protect personal or sensitive data. This also applies to data that is sent to external services as a payload in API calls.
  • 25. © SEEBURGER AG 2019 25 API-based Digitization Initiatives What do the analysts (Gartner) say? Source: Gartner Document “Managing the Consumption of Third-Party APIs”, August 2, 2019 from Mark O´Neill
  • 26. © SEEBURGER AG 2019 26 Overview of the BIS API Management Solution Manage ‘Provision’ & ‘Consumption’ of APIs Internal Systems & Databases Providing & Consuming data BIS API Integration Solution API integration Internal systems Providing & Consuming data via own APIs App Developers & App OwnersAPI Publishers & API admins API providing services Managed APIs: Security, Compliance / Governance, Efficiency API consuming Apps & Systems EXTERNAL (INTERNET)INTERNAL (INTRANET) API Integration platform providing and consuming APIs BIS API portal BIS API gateway API Management
  • 27. © SEEBURGER AG 2019 27 API Management Security Architecture Overview API Gateway protects APIs - and also needs protection Internal Systems & Databases Providing & Consuming data BIS API Integration Solution API integration Internal systems Providing & Consuming data via own APIs App Developers & App OwnersAPI Publishers & API admins API providing services Managed APIs: Security, Compliance/Governance, Efficiency API consuming Apps & Systems EXTERNAL (INTERNET)INTERNAL (INTRANET) API Integration platform providing and consuming APIs API gateway protection Unmanaged APIs!
  • 28. © SEEBURGER AG 2019 28 API Management Security Architecture Overview API Gateway protects APIs - and also needs protection Internal Systems & Databases Providing & Consuming data BIS API Integration Solution API integration Internal systems Providing & Consuming data via own APIs App Developers & App OwnersAPI Publishers & API admins API providing services Managed APIs: Security, Compliance/Governance, Efficiency API consuming Apps & Systems EXTERNAL (INTERNET)INTERNAL (INTRANET) API Integration platform providing and consuming APIs BIS API portal BIS API gateway API Management Managed APIs
  • 29. © SEEBURGER AG 2019 29 API Management Security Architecture Overview API Gateway protects APIs - and also needs protection Internal Systems & Databases Providing & Consuming data BIS API Integration Solution API integration Internal systems Providing & Consuming data via own APIs App Developers & App OwnersAPI Publishers & API admins API providing services Managed APIs: Security, Compliance/Governance, Efficiency API consuming Apps & Systems EXTERNAL (INTERNET)INTERNAL (INTRANET) API Integration platform providing and consuming APIs BIS API portal BIS API gateway API Management anti DDoS messenger mitigation WAF API gateway protection
  • 30. © SEEBURGER AG 2019 30 API Management Security Architecture Overview API Gateway protects APIs - and also needs protection Explanation of the previous slides:  API Gateway protects APIs as follows:  Protection against unauthorized access internally and externally  Protection against unauthorized content (inbound and outbound)  Protection against excessive and forbidden consumption  The API gateway itself must also be protected:  Web Application Firewall: Analysis of the traffic between the different components  Anti-DDoS: protection against DDoS attacks that limit availability  Bot mitigation: protection against unwanted and automated attacks
  • 31. © SEEBURGER AG 2019 31 API Management Summary The following conclusions can be drawn from the points presented:  The use of APIs continues to grow strongly - and with it the associated dangers.  For security and compliance reasons, API interfaces should be treated as any sensitive file transfer:  Manage Files: Managed File Transfer  Manage APIs: API Management  It is recommended to start ‚early‘ - not only when an uncontrolled growth in API usasge has occurred.  ‚Management‘ not only arises when one‘s own APIs are opened externally, but also from the beginning when API-based services are ‚consumed‘.  With the SEEBURGER BIS platform, you are equipped to tackle these challenges successfully.
  • 32. © SEEBURGER AG 2019 32 Thank you very much Questions or remarks? We are here for you! www.seeburger.com
  • 33. © Copyright 2019 SEEBURGER AG. All rights reserved. The information in this document is proprietary to SEEBURGER. Neither any part of this document, nor the whole of it may be reproduced, copied, or transmitted in any form or purpose without the express prior written permission of SEEBURGER AG. Please note that this document is subject to change and may be changed by SEEBURGER at any time without notice. SEEBURGER‘s Software product, the ones of its business partners may contain software components from third parties. SAP®, SAP® R/3®, SAP NetWeaver®, SAP Cloud Plattform & Cloud Plattform Integrator®, SAP Archive Link®, SAP S4/Hana®, SAP® GLOBAL TRADE Service® (SAP GTS), SAP Fiori ®, ABAP™ and SAP ARIBA® are registered trade marks of the SAP AG or the SAP AG Deutschland (Germany). Microsoft, Windows, Windows Phone, Excel, Outlook, PowerPoint, Silverlight, and Visual Studio are registered trademarks of Microsoft Corporation in the United States and other countries. Linux is a registered trade mark of Linus Torvalds in the United States and other countries. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Adobe, the Adobe logo, Acrobat, Flash, PostScript, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and / or other countries. HTML, ML, XHTML, and W3C are trademarks, registered trademarks, or claimed as generic terms by the Massachusetts Institute of Technology (MIT), European Research Consortium for Informatics and Mathematics (ERCIM), or Keio University. Oracle and Java are registered trademarks of Oracle and its affiliates. All other product and service names mentioned are the trademarks of their respective companies. 4invoice®, iMartOne®, SEEBURGER®, SEEBURGER Business-Integration Server®, SEEBURGER Logistic Solution Professional®, SEEBURGER Web Supplier Hub®, WinELKE®, SEEBURGER File Exchange ®, SEEBURGER Link ®, SMART E-Invoice ® and other products or services of SEEBURGER which appear in this document as well as the according logos are marks or registered marks of the SEEBURGER AG in Germany and of other countries worldwide. All other products and services names are marks of the mentioned companies. All contents of the present document are noncommittal and have a mere information intention. Products and services may be country-specific designed. All other mentioned company and software designations are trade marks or unregistered trade marks of the respective organizations and are liable to the corresponding legal regulations.  The information in this document is proprietary to SEEBURGER. No part of this document may be reproduced, copied, or transmitted in any form or purpose without the express prior written permission of SEEBURGER AG.  This document is a preliminary version and not subject to your license agreement or any other agreement with SEEBURGER. This document contains only intended strategies, developments, and functionalities of the SEEBURGER product and is not intended to be binding upon SEEBURGER to any particular course of business, product strategy, and/or development. Please note that this document is subject to change and may be changed by SEEBURGER at any time without notice.  SEEBURGER assumes no responsibility for errors or omissions in this document. SEEBURGER does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.  SEEBURGER shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of these materials. This limitation shall not apply in cases of intent or gross negligence.  The statutory liability for personal injury and defective products is not affected. SEEBURGER has no control over the information that you may access through the use of hot links contained in these materials and does not endorse your use of third-party web pages nor provide any warranty whatsoever relating to third-party web pages. © SEEBURGER AG 2019 33