3
Sec The SecureSpan Networking Gateway offers: Application Services Governance Centrally enforce policies that ensure security, compliance, reliability, and quality of service for all application services no matter where they reside – in the enterprise or in the cloud. Extensible Policies The SecureSpan Custom Assertion SDK allows Java programmers to create new policy assertions to address unique requirements. To learn more about Layer 7 and how it can address your organization’s SOA and Web services needs, call 1-800-681-9377 (toll free within North America) or +1.604.681.9377 Impl Contr polici Runti As org and ad challen but wi runtim rules, o The Se policy deploy service enterp solutio Co (su ad ke M au m an di Ad m ne Exten Layer 7 graphi monito better based create Sample manag cureSpanXML Network lement a robust, extensible runtime go rol, monitor and adapt application services over ies around security, compliance, SLAs and qualit ime Policy Enforcement ganizations increase their adoption of Web services, attem dapt them over time by imposing general IT rules become nging. For this reason, most organizations adopt a policy- ithout the ability to control and audit how policy gets dep me, there’s no way to ensure consistent security, adheren or compliance with regulatory requirements. ecureSpan XML Networking Gateway combines policy ma enforcement, delivering an effective governance model f ying the Networking Gateway as a central Policy Enforcem e providers and consumers (no matter where they’re loca prise, or in public or private clouds), organizations can cre on that offers the ability to: ontrol Services – enforce policies that call out to identity uch as an LDAP or IAM system) to ensure security; verify dherence to industry or government-mandated specificat ey non-repudiation data in logs and audit files to facilitate Monitor Services enforce policies that throttle and/or re utomatically heading off service performance issues befo maintain availability and reach-ability. Additionally, implem nd react to network slowdowns, poor service response tim isruption in order to conform to SLAs and maintain Qualit dapt Services change the way application services resp modifying policies and deploying them in real time to Netw eed to bring down the appliances. nsibility 7 provides dozens of out-of-the-box assertions with whic ically build policies to address the most common aspects oring application services. But for those organizations tha r fit their business needs, Layer 7 provides the Custom Po SDK extends the rich palette of SecureSpan policy assert e policies that address unique requirements, such as: proprietary message processing pattern recognition and filtering interfacing to third-party infrastructure And many more e custom assertions are provided for integration to a ran gement products from Sun, IBM, CA, Oracle and others. king Gateway overnance solution r time by enforcing ty of service. mpting to control, monitor es more and more -driven Web services model, ployed and enforced at nce to corporate business anagement with runtime for distributed SOAs. By ment Point (PEP) between ated – in the traditional eate a runtime governance management infrastructure messages for integrity and tions; and capture and track e compliance. eroute incoming messages, ore they happen in order to ment policies that measure mes or even service ty of Service. pond at runtime by centrally working Gateways without the ch organizations can of controlling, managing and at want to tailor a solution to olicy Assertion SDK. The Java- tions allowing organizations to nge of leading identity

Layer 7 SecureSpan XML Gateway

Embed Size (px)

DESCRIPTION

Layer 7 SecureSpan XML Gateway provides an effective SOA runtime governance solution

Citation preview

Page 1: Layer 7 SecureSpan XML Gateway

SecureSpan

The SecureSpan Networking

Gateway offers:

Application Services Governance

Centrally enforce policies that

ensure security, compliance,

reliability, and quality of service for

all application services no matter

where they reside – in the enterprise

or in the cloud.

Extensible Policies

The SecureSpan Custom Assertion

SDK allows Java programmers to

create new policy assertions to

address unique requirements.

To learn more about Layer 7 and

how it can address your

organization’s SOA and Web services

needs, call 1-800-681-9377 (toll

free within North America) or

+1.604.681.9377

Implement a

Control,

policies around

Runtime Policy Enforcement

As organizations

and adapt them over time

challenging.

but without the ability to control and audit how policy gets deployed and enforced

runtime

rules, or compliance with regulatory requirements.

The Secu

policy enforcement, delivering an effective

deploying

service providers and consumers

enterprise

solution

• Control

(such as an LDAP or IAM system)

adherence

key non

• Monitor Services

automatically head

maintain availability and reach

and react to network slowdowns, poor service response times or even service

disrupti

• Adapt Services

modifying policies and deploy

need to bring

Extensibility

Layer 7 provides dozens of out

graphically build policies to address the most common aspects of controlling, managing and

monitoring application services. But

better fit

based SDK extends the rich palette of SecureSpan policy assertions

create policies that addre

• • • •

Sample custom assertions are provided for integration to a range of leading identity

management

SecureSpan™ XML Networking Gateway

Implement a robust, extensible runtime governance solution

Control, monitor and adapt application services over time by enforcing

policies around security, compliance, SLAs and quality of

Runtime Policy Enforcement

organizations increase their adoption of Web services, attempting to control, monitor

nd adapt them over time by imposing general IT rules becomes more

challenging. For this reason, most organizations adopt a policy-

ithout the ability to control and audit how policy gets deployed and enforced

ime, there’s no way to ensure consistent security, adherence to

or compliance with regulatory requirements.

SecureSpan XML Networking Gateway combines policy management

policy enforcement, delivering an effective governance model for

deploying the Networking Gateway as a central Policy Enforcement

service providers and consumers (no matter where they’re located

enterprise, or in public or private clouds), organizations can create

solution that offers the ability to:

Control Services – enforce policies that call out to identity management infrastructure

(such as an LDAP or IAM system) to ensure security; verify messages for

adherence to industry or government-mandated specifications

key non-repudiation data in logs and audit files to facilitate compliance.

Monitor Services – enforce policies that throttle and/or rerout

automatically heading off service performance issues before they happen

maintain availability and reach-ability. Additionally, implement policies that

and react to network slowdowns, poor service response times or even service

disruption in order to conform to SLAs and maintain Quality of Service.

Adapt Services – change the way application services respond at runtime by centrally

modifying policies and deploying them in real time to Networking Gateways

need to bring down the appliances.

Extensibility

Layer 7 provides dozens of out-of-the-box assertions with which organizations can

graphically build policies to address the most common aspects of controlling, managing and

monitoring application services. But for those organizations that want to

better fit their business needs, Layer 7 provides the Custom Policy Assertion SDK.

based SDK extends the rich palette of SecureSpan policy assertions

create policies that address unique requirements, such as:

proprietary message processing

pattern recognition and filtering

interfacing to third-party infrastructure

And many more

Sample custom assertions are provided for integration to a range of leading identity

management products from Sun, IBM, CA, Oracle and others.

XML Networking Gateway

runtime governance solution

over time by enforcing

uality of service.

adoption of Web services, attempting to control, monitor

general IT rules becomes more and more

-driven Web services model,

ithout the ability to control and audit how policy gets deployed and enforced at

ensure consistent security, adherence to corporate business

policy management with runtime

model for distributed SOAs. By

nforcement Point (PEP) between

(no matter where they’re located – in the traditional

, organizations can create a runtime governance

identity management infrastructure

verify messages for integrity and

mandated specifications; and capture and track

repudiation data in logs and audit files to facilitate compliance.

reroute incoming messages,

nce issues before they happen in order to

mplement policies that measure

and react to network slowdowns, poor service response times or even service

and maintain Quality of Service.

respond at runtime by centrally

ing them in real time to Networking Gateways without the

box assertions with which organizations can

graphically build policies to address the most common aspects of controlling, managing and

anizations that want to tailor a solution to

, Layer 7 provides the Custom Policy Assertion SDK. The Java-

based SDK extends the rich palette of SecureSpan policy assertions allowing organizations to

Sample custom assertions are provided for integration to a range of leading identity

Page 2: Layer 7 SecureSpan XML Gateway

Copyright © 2010 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are

trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.

Key Features

SOA Governance

Runtime enforcement of

governance policies

• Enforce security policies such as those that digitally sign and/or encrypt parts of

the message; issue security tokens to ensure proper authentication, etc

• Enforce compliance with policies such as those that verify message structure

and content to meet corporate, industry or government standards, etc

• Enforce reliability with policies such as those that reroute traffic to facilitate

failover; throttle traffic to ensure availability and maintain quality of service, etc

Centralized SLA

enforcement/Quality of

Service

• Throttling/rate limiting controls provide the ability to support service over

subscription with per-service throttling of excess messages

• Service availability features include support for strict failover, round robin, best

effort and latency-based routing

Transport and protocol

mediation

• Full support for Class of Service based message processing and routing based on

identity, message content, time of day, etc

• Transport mediation between HTTP, HTTPS, MQS, JMS

Service virtualization • Smart WSDL generation for non-SOAP services

• WSDL remapping and service virtualization based on requestor identities

• Authorization controls for access to specific service operations

Policy Lifecycle

WS-Policy-based graphical

policy editor & composer

• Compose inheritable policy statements from 70+ pre-made policy assertions

• Branch policy execution based on logical conditions, message content,

externally retrieved data or transaction specific environment variables

• Publish policies to popular registries for lifecycle management

• Service & operation level policies with inheritance for simplified administration

• Policy lifecycle and migration management across development, test, staging

and production, as well as geographically distributed data centers

• API-level access to administration

• SDK-level policy creation for simplified policy customization

On-the-fly policy changes • Polices can be updated live across clusters with no downtime required

Create custom policies • Policy SDK allows for custom policy assertion creation using Java

Identity and Message Level Security

Identity-based access to

services and operations

• Integration with leading external identity, access, SSO and federation systems

• Onboard identity store for administering identities and staging new services

Manage security for cross-

domain and B2B

relationships

• Credential chaining, credential remapping and support for federated identity

• Integrated STS/SAML issuer supports SAML 1.1/2.0

• Integrated PKI CA for automated deployment and management of client-side

certificates and RA ability for external CA’s including Verisign

Cryptography • Optional onboard HSM, as well as support for external HSMs (i.e., SafeNet Luna)

• Support for elliptic curve cryptography (conforms to NSA’s Suite B algorithms)

• FIPS 140-2 support in both hardware (Level 3) and software (Level 1)

Threat Protection

Filter XML content for Web

2.0 and SOA

• Configurable validation & filtering of HTTP headers, parameters and form data

• Detection of classified or “dirty” words or arbitrary signatures with subsequent

scrubbing, rejection or redaction of messages

• Support for XML, SOAP, POX, AJAX, REST and other XML-based services

Prevent XML attack and

intrusion

• Protect against XML parsing; XDoS and OS attacks; SQL and malicious scripting

language injection attacks

• Protection against XML content tampering and viruses in SOAP attachments

Page 3: Layer 7 SecureSpan XML Gateway

Copyright © 2010 Layer 7 Technologies Inc. All rights reserved. SecureSpan and the Layer 7 Technologies design mark are

trademarks of Layer 7 Technologies Inc. All other trademarks and copyrights are the property of their respective owners.

XML Acceleration

Accelerated XML message

processing offload

• High speed message transformations based on internal or external XSLT

• High speed message validation against predefined external schema

• High speed message searching, element detection and content comparisons

Optional hardware-based

acceleration

• ASIC-based hardware accelerator can be optionally used to maximize message

throughput and minimize processing latency

Enterprise-scale Management

Operations Console • A single, real time view of all Gateways across the enterprise and cloud showing

audits, events and key metrics

Policy Migration • Centrally move policies between environments (development, testing, staging,

production, etc), settings (enterprise, cloud, etc) or geographies, automatically

resolving discrepancies such as SSG licenses, IP addresses, IT resources (i.e.,

LDAPs may be named differently), etc

Services Reporting • Configurable, out-of-the-box reports provide insight into SSG operations,

service-level performance, and service user experience

Remote Patching • Selectively update any software installed on Gateways, including system files

and operating system

Disaster Recovery • Centrally back up SSG config files and policies from one or more

Gateways/clusters, and remotely restore, enabling full disaster recovery

Management API • Remote management APIs allow customers to hook their existing, third-party

management tools into the SSG, simplifying asset management

Form Factors

Hardware • Active-active clusterable, dual power supply, mirrored hot-swappable drives, 2-

way dual core Sun 1U server

Software • Solaris 10 for x86 and Niagara, SUSE Linux, Red Hat Linux 4.0/5.0

Virtual Appliance • VMware/ESX (VMware Ready certified)

Cloud • Amazon EC2 AMI

Supported Standards

XML 1.0, SOAP 1.2, REST, AJAX, XPath 1.0, XSLT 1.0, WSDL 1.1, XML Schema, LDAP 3.0, SAML 1.1/2.0, PKCS #10,

X.509 v3 Certificates, FIPS 140-2, Kerberos, W3C XML Signature 1.0, W3C XML Encryption 1.0, SSL/TLS 1.1 / 3.0,

SNMP, SMTP, POP3, IMAP4, HTTP/HTTPS, JMS 1.0, MQ Series, Tibco EMS, FTP, WS-Security 1.1, WS-Trust 1.0, WS-

Federation, WS-Addressing, WSSecureConversation, WS-MetadataExchange, WS-Policy, WS-SecurityPolicy, WS-

PolicyAttachment, WS-SecureExchange, WSIL, WS-I, WS-I BSP, UDDI 3.0, XACML 2.0, MTOM

To learn more about how Layer 7 can address your needs, call us today at +1 800.681.9377 (toll free

within North America) or +1.604.681.9377or visit us at www.layer7tech.com.