Main application areas

  • Logging, debugging, audits
  • Password and credential management
  • IP access control
  • Compliance and usage reports
  • Traffic control and load balancer
  • Data encryption
  • Custom security policies
  • IDS and fraud detection

KEY differentiators

  • Transparent proxy
  • Data manipulation
  • Complex security policies
  • Advanced content filtering
  • Protocol validation

Authentication Methodes

  • Username/Password
  • X.509 Certificates including mutual SSL
  • Windows Kerberos and NTLM
  • Active Directory
  • Security Keys, OAuth and OpenID for REST
  • SAML 1.1, 2.0
  • Custom authentication

Message formats

  • REST & SOAP
  • NET.TCP
  • HTTP(S)
  • XML, JSON, binary, TXT, legacy and unique formats