Product vs toolkit: API and IAM security

被引:0
|
作者
Macy J. [1 ]
机构
[1] Forum Systems, United States
关键词
1;
D O I
10.1016/S1353-4858(19)30073-X
中图分类号
学科分类号
摘要
Marketing departments are great at capitalising on the latest industry trends. Whether it's slapping the ‘cloud’ badge onto their product or putting ‘security’ in their verbiage to appease their customers, it is a common marketing approach to reposition a product in a way that will improve sales. In the current era of conglomerate-acquired technologies, large-scale marketing departments will pay top dollar to get air cover from analysts (such as paying for a dot on the Gartner Magic Quadrant) to claim universal capabilities in niche market segments. The term ‘security’ when used in the context of application programming interface (API) and identity access management (IAM) solutions doesn't always mean what you might expect. Many frameworks aimed at these areas are often little more than increasingly large collections of features built on a baseline that is inherently insecure, argues Jason Macy of Forum Systems. Security products are built with a locked-down architecture with self-integrity checks to ensure that the product itself cannot be compromised. And the two functions are being combined in technology known as an API security gateway. © 2019 Elsevier Ltd
引用
收藏
页码:13 / 15
页数:2
相关论文
共 50 条
  • [1] Exhibit & product guide to IAM '98
    I&CS Instrumentation & Control Systems, 1998, 71 (04):
  • [2] Machine Learning in Action: Securing IAM API by Risk Authentication Decision Engine
    Djosic, Nebojsa
    Nokovic, Bojan
    Sharieh, Salah
    2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [3] The proactive security toolkit and applications
    Barak, B
    Herzberg, A
    Naor, D
    Shai, E
    6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 1999, : 18 - 27
  • [4] Software security and the DirectPlay API
    Wilson, A
    DR DOBBS JOURNAL, 1997, 22 (04): : 66 - +
  • [5] Software security and the directplay API
    Wilson, Andrew
    Miller Freeman Publ Inc, San Mateo, CA, USA (22):
  • [6] Security assessment: Case studies for implementing the NSA IAM.
    Gordon, RS
    LIBRARY JOURNAL, 2004, 129 (12) : 112 - 112
  • [7] Leveraging Healthcare API to transform Interoperability: API Security and Privacy
    Faruk, Md Jobair Hossain
    Patinga, Arleen Joy
    Migiro, Lornna
    Shahriar, Hossain
    Sneha, Sweta
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 444 - 445
  • [8] The security API of IRO-DB
    Essmayr, W
    Pernul, G
    Tjoa, AM
    COMMUNICATIONS AND MULTIMEDIA SECURITY, VOL 3, 1997, : 178 - 189
  • [9] DBST: A develop toolkit for database security
    Liu, X
    Han, Z
    Shen, CX
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 728 - 731
  • [10] NPRA, API to hold security workshops
    不详
    CHEMICAL & ENGINEERING NEWS, 2003, 81 (16) : 15 - 15