Bonus $100
Promo Codes 2024
Users' Choice
90
89
88
85

CA integrates API Gateway with Samsung KNOX

13 Nov 2014
00:00
Read More

At CA World 2014, CA Technologies announced that it has bolstered security and usability for Samsung KNOX-managed enterprise mobile apps with CA Mobile API Gateway.

The company also announced new and expanded API management solutions that accelerate mobile and web application delivery.

The integrated mobile app security solution gives Samsung KNOX enterprise users mobile app single sign-on (SSO) while controlling app access to the enterprise API.

Samsung KNOX is a mobile security platform designed to provide device, app and data protection for Android devices. The Mobile API Gateway integrates with existing identity infrastructures and offers SSO across multiple apps, whether mobile, web or additional third party apps. It also protects the apps by controlling the connection to the API and backend data based on user, device and app status and condition.

“Over the next five years, we expect up to 800 million mobile devices in use across the enterprise. Protecting and enabling app use on those devices is critical to business success. Samsung KNOX, integrated with CA’s API management and security technology, gives our customers extended breadth of security, from the device to the API, while maintaining user convenience,” said Dr. Injong Rhee, senior vice president of KNOX Business, IT & Mobile Communications Division at Samsung Electronics.

Together, the CA Mobile API Gateway and Samsung KNOX deliver security that leverages existing identity infrastructure to deliver convenient app SSO across all app types, including native mobile, hybrid and web-based.

The CA Mobile API Gateway with Samsung KNOX also includes development tools and SDKs for building seecure apps.

“The risk of device compromise and experiencing app loss of integrity is too great a gamble in the business world,” said Rahim Bhatia, senior vice president, API Management at CA Technologies. “Organizations need to ensure that the users, apps and devices that have access to their APIs and backend data are approved and have met strict check points.”

.

Related content

Rating: 5