Layer 7 Unveils XMLLayer 7 Unveils XML
Layer 7 Technologies announced the launch of four new SecureSpan XML appliances
October 9, 2006
ORLANDO, Fla. -- Layer 7 Technologies, the leader in XML security and networking, announced today the launch of four new SecureSpan XML appliances. Layer 7 Technologies is the first XML security and networking vendor to introduce a suite of XML appliances and gateway software for Service Oriented Architectures (SOA) and Web Oriented Architectures (WOA) including SOAP, POX, AJAX and REST. The new XML acceleration, security and networking appliances will help businesses address a progressive set of security, complexity, scalability and networking issues.
"The requirement for parsing, transformation, acceleration, security and management means that the network really strains under the weight of XML", said Frank Kenney, Research Director for Gartner. "Specialized appliances represent a compelling solution to supplying an effective SOA infrastructure."
The use of XML data in the enterprise is increasing exponentially. SOA deployments often use XML or Web services but Web applications built on AJAX, RSS and POX are often more ubiquitous, adding to the pervasive use of XML. Depending on the application, various combinations of XML processing may be required, including parsing, transformation, acceleration, security, cryptography, signing, federation and support for implementing specific SOA standards or specifications. These operations place a tremendous burden on the network infrastructure, middleware and application platforms. The strategic use of XML appliances simplifies the deployment and management of applications while ensuring tight control over the flow of data.
"Layer 7's approach is a pragmatic and flexible way to address the range of problems that customers have around SOA and Web 2.0," said Ron Schmelzer, Senior Analyst at ZapThink. "The new family of XML appliances helps address the key pain points we see."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Business Buyers Guide to Password Managers