Layer 7 Unveils XMLLayer 7 Unveils XML
Layer 7 Technologies announced the launch of four new SecureSpan XML appliances
October 9, 2006

ORLANDO, Fla. -- Layer 7 Technologies, the leader in XML security and networking, announced today the launch of four new SecureSpan XML appliances. Layer 7 Technologies is the first XML security and networking vendor to introduce a suite of XML appliances and gateway software for Service Oriented Architectures (SOA) and Web Oriented Architectures (WOA) including SOAP, POX, AJAX and REST. The new XML acceleration, security and networking appliances will help businesses address a progressive set of security, complexity, scalability and networking issues.
"The requirement for parsing, transformation, acceleration, security and management means that the network really strains under the weight of XML", said Frank Kenney, Research Director for Gartner. "Specialized appliances represent a compelling solution to supplying an effective SOA infrastructure."
The use of XML data in the enterprise is increasing exponentially. SOA deployments often use XML or Web services but Web applications built on AJAX, RSS and POX are often more ubiquitous, adding to the pervasive use of XML. Depending on the application, various combinations of XML processing may be required, including parsing, transformation, acceleration, security, cryptography, signing, federation and support for implementing specific SOA standards or specifications. These operations place a tremendous burden on the network infrastructure, middleware and application platforms. The strategic use of XML appliances simplifies the deployment and management of applications while ensuring tight control over the flow of data.
"Layer 7's approach is a pragmatic and flexible way to address the range of problems that customers have around SOA and Web 2.0," said Ron Schmelzer, Senior Analyst at ZapThink. "The new family of XML appliances helps address the key pain points we see."
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023