Click here to close now.


@CloudExpo Authors: Pat Romanski, Elizabeth White, Marc Crespi, Carmen Gonzalez, Liz McMillan

Blog Feed Post

Intel Expressway API Manager and The Rise of Mobile Middleware

I just returned from an exhilarating trip to the Gartner AADI show in Las Vegas last week. There are a lot of exciting things happening at Intel in the Data-center Software Division (DSD), especially with respect to the Expressway Product Line.

First, we had our first live demo of the integrated solution that showcases Intel(R) Expressway API Manager and the Mashery API Management Portal. This is a true best of breed match between what we think is one of the best security gateways in the market and the de-facto market leader in API management, bringing the best possible product set to our end customers.

Second, we did multiple workshops with Gartner visionary Appcelerator. They make a slick cross-platform mobile development environment that produces native code for mobile applications, and the cool part is that the developer only has to write their code in JavaScript. So you can think of their tool as a cross-compiler that churns out native code optimized for Android, iOS, Blackberry and Windows devices but  only requires the developer to have a working knowledge of JavaScript.

The combination of Appcelerator Titanium and Intel(R) Expressway API Manager is a killer best of breed architecture for jumpstarting an Enterprise ready native mobile application. In fact, we showed a live proof of concept that went from a non RESTful back-end to a native application running on an iPhone with Enterprise grade data level security controls in 15 minutes.

Enterprises and Native Mobile Applications

Let’s walk through the scenario. Suppose you are a large Enterprise and you want to get a mobile project going at your enterprise. Furthermore, you don’t really want to compromise with HTML5 – native applications typically provide the best performance and device integration. Here are some of the hurdles – first you will likely have fragmentation in your data-center. You probably have:

  • Disparate middleware and database technologies
  • Disparate identity management silos
  • Disparate programming languages, with different levels of expertise
  • Current architecture optimized for web browsers, e.g. n-tier designed for a thin/dumb client
  • Vertical integration prohibits cloud outsourcing
  • Inconsistent security model across domains

And now, on top of these challenges you want:

  • BYOD with enterprise native mobile applications
  • Low development costs
  • Fast time to market
  • Robust security for Enterprise data

API Enabling Your Existing Architecture

Mobile applications have tremendous value for a mobile sales force. The example we took was a sales manager who is on the road and wishes to access enterprise data securely, directly from the mobile device. We took two examples of data – localized revenue information and the protection of personally identifiable information. In the first example this is a revenue report of local retail stores, which might be accessed by a manager on the road using the location of the tablet or smartphone.

In the second example we can take that same manager and assume he is hiring new employees and has to enter sensitive personally identifiable information (PII) such as a social security number, name, address, date of birth or maybe a driver’s license number.

Here is what the architecture looks like:




On the right hand side we have the Enterprise and the existing architecture. In this example we assumed the Enterprise has a RESTful service for handling new hire information and a SOAP web service for querying revenue information. Further, we assumed the Enterprise currently uses Active Directory for its identities.

Using the Intel(R) Expressway API Manager as a mobile middleware we can put a RESTful facade in front of these disparate systems and expose two simple endpoints for the mobile device. Further, the gateway performs important functions, including:

  • The termination and acceleration of SSL (remember, with mobile, you may easily scale to hundreds of thousands of individual “apps”, all hitting the back-end infrastrcture)
  • Perimeter security for content based threats, such as SQL injection
  • Delegated authentication to the Enterprise LDAP based on an API key in the request
  • Throttling of requests, including denial of service protection (remember, again, with mobile devices there could be thousands)
  • Optimization of content sent back to the device. In our example we showed the transformation of XML to JSON, which is optimized for the mobile phone
  • Data protection, including format preserving encryption, a special mode of AES that prefers the length and character set of data-types. This is especially useful for handling the new hire information, such as the social security number
  • Routing and composition of data accessed form multiple databases. Mobile applications may need to aggregate data from multiple databases, combine it into a single response before it is sent to the mobile device

The best part about the Intel(R) Expressway API Manager is that this entire flow can all be designed in Eclipse using drag-and-drop actions. No coding is required. If you are looking for a quick way to jump-start a native mobile application at your enterprise with minimal back-end changes, give us a shout. We may be able to help!


Read the original blog entry...

More Stories By Application Security

This blog references our expert posts on application and web services security.

@CloudExpo Stories
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends an...
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
DevOps Summit, taking place at the Santa Clara Convention Center in Santa Clara, CA, and Javits Center in New York City, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait...
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems is strained, in large part due to misaligned objectives. In his session at DevOps Summit, James Urquhart, Senior Vice President of Performance Analytics at SOASTA, Inc., will discuss how measuring user outcomes –...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...