Hi [[ session.user.profile.firstName ]]

WSO2

  • Date
  • Rating
  • Views
  • Adaptive Authentication: What, why and how?
    Adaptive Authentication: What, why and how?
    Thanuja Jayasinghe Associate Technical Lead, WSO2 and Abilashini Thiyagarajah Software Engineer, WSO2 Recorded: Jan 30 2019 49 mins
    Authentication is the process of recognizing a user’s identity in order to provide access to any resource. In the history of identity and access management (IAM), we have come across different authentication mechanisms that have evolved rapidly in terms of security. But customer experience trumps everything; it’s the path to retention leading towards the success of an enterprise and not all of these mechanisms are able to provide greater usability

    This webinar will discuss the evolution of authentication mechanisms, advantages and the disadvantages of each, and how adaptive authentication may be the answer.
  • APIs in a Microservice Architecture
    APIs in a Microservice Architecture
    Nuwan Dias, Director, WSO2 Recorded: Dec 19 2018 60 mins
    Microservices are revolutionizing how organizations build their enterprise architectures. We have spent a good couple of years talking deeply about APIs and their benefits, and understanding how APIs fit into an enterprise. The core benefits of disintegrated architectures can only be reaped if the system as a whole, including APIs, services, CI/CD processes, and development practices are designed with these objectives in mind.

    With the rapid adoption of microservice architectures (MSA), the designs for securing, controlling, and monitoring our APIs have to be rethought and adjusted to reap the core benefits of an MSA.

    During this webinar Nuwan will discuss:

    -The impact of MSA on your API strategies and designs
    -Possible changes in API design and deployment, API security, control and monitoring, and CI/CD
  • Distributed Stream Processing with WSO2 Stream Processor
    Distributed Stream Processing with WSO2 Stream Processor
    Tishan Dahanayakage Associate Technical Lead, WSO2 Recorded: Dec 19 2018 55 mins
    Stream processing is inherently associated with fast data rates and can consume a lot of resources. Owing to growing business needs, when the incoming data rate exceeds 100k, a simple high available deployment of a stream processing solution would not be able to handle such a large amount of data. This has created the need for distributed stream processing.
    WSO2 Stream Processor has the capability to execute Siddhi streaming applications in a distributed and parallel manner in multiple nodes. Users can annotate the Siddhi applications with distributed processing information, where the system then decompose and run the applications parallelly in multiple worker nodes.
    In this webinar, we will focus on the following key areas:
    * High-level architecture of WSO2 Stream Processor
    * Concepts for distributed processing
    * The deployment architecture for distributed stream processing
    * Writing a distributed Siddhi applications
    * Fault tolerance
    * Allocation and re-balancing algorithms
  • WSO2 Stream Processor: Graphical Editor, HTTP & Message Trace Analytics and More
    WSO2 Stream Processor: Graphical Editor, HTTP & Message Trace Analytics and More
    Sriskandarajah Suhothayan, Director, WSO2 Recorded: Dec 19 2018 63 mins
    Organizational success depends on our ability to sense the environment, grab opportunities and eliminate threats that are present in real-time. Such real-time processing is now available to all organizations (with or without a big data background) through the new WSO2 Stream Processor.
    In this webinar, we will look at WSO2 Stream Processor’s new features and improvements and explain how they make an organization excel in the current competitive marketplace. Some key features we will consider are:
    * WSO2 Stream Processor’s highly productive developer environment, with graphical drag-and-drop, and the Streaming SQL query editor
    * The ability to process real-time queries that span from seconds to years
    * Its interactive visualization and dashboarding features with improved widget generation
    * Its ability to processing at scale via distributed deployments with full observability
    * Default support for HTTP analytics, distributed message trace analytics, and Twitter analytics
  • Stream Processing in Action
    Stream Processing in Action
    Nirmal Fernando, Senior Lead Solutions Engineer, WSO2 Recorded: Dec 19 2018 62 mins
    Today, many industries are looking for innovative ways to digitally transform their businesses in order to remain competitive and enhance profitability. There are key technology enablers that support an enterprise’s digital transformation efforts, including analytics. Real-time insights of data in motion helps organizations to gain the business intelligence they need for digital transformation.
    From a business perspective, the potential benefits that analytics can offer an organization are many — you can use location and contextual data to create better customer experiences; create radically new data-based products for your business; make more informed decisions in complex scenarios; carry out effective monitoring and analysis; detect even the smallest change and trigger immediate action; and extend your solutions to analyze the past, present, and future.
    In this webinar we will
    * Introduce the WSO2 Stream Processor
    * Discuss stream processing use-cases in a few industries
    * Demonstrate a stream processing solution for one of the use-cases discussed above
  • Open Banking and PSD2: Are your APIs ready for external testing?
    Open Banking and PSD2: Are your APIs ready for external testing?
    Seshika Fernando, Head - Financial Solutions, WSO2 & Kaveen Rodrigo Software Engineer, WSO2 Recorded: Dec 19 2018 47 mins
    Several months after the compliance deadline, the journey towards open banking continues. By March 2019, all EU and UK banks are required to have their open API portals ready with the required security and third party provider (TPP) capabilities. No more excuses to delay compliance, this time you have to get cracking on your open API efforts.
    This webinar is designed to help you prepare for the March 2019 deadline. Our solution experts have designed a set of mock bank APIs as well as effort estimates to give you a clear understanding of what you need to comply on time, or even ahead. Get your open banking developers and architects together for this webinar as we cover:
    * A checklist of technology and compliance requirements for March 2019
    * How WSO2 Open Banking can get you compliant on time
    * What to expect for the September 2019 Regulatory Technical Standards (RTS) deadlines
    * How to keep the momentum - Extending the Open banking implementation to cover the September 2019 deadline.
  • GDPR Compliance with WSO2 Identity Server
    GDPR Compliance with WSO2 Identity Server
    Hasintha Indrajee, Associate Technical Lead & Ayesha Dissanayaka Senior Software Engineer, WSO2 Recorded: Dec 19 2018 59 mins
    The General Data Protection Regulation (GDPR) enhances the fundamental rights that protect personal data belonging to an individual and provides businesses certainty on data processing. Companies that collect data from European Union (EU) residents need to comply with its strict new rules on data collection and processing including while storing, transferring, sharing, and deleting data.
    If the GDPR affects your company, you need to make sure you select the right technology before you embark on your compliance strategy. A random combination of products that behaves in a GDPR compliant way isn’t enough when catering to complex requirements. Instead of relying on inbuilt product capabilities, you need to have a set of APIs that control the ingredients of consent.
    To help you become GDPR compliant, WSO2’s product stack now comes with enhanced capabilities specifically targeted towards compliance. This webinar will explore how WSO2 Identity Server helps deliver GDPR compliance through its capabilities below:
    * A comprehensive API which supports Kantara consent management specification
    * Obtaining user consent during single sign-on
    * Obtaining user consents during self sign up
    * Sharing and obtaining data honoring user given consent
    * Capabilities in the user portal to manage users consent
    * Administrating consent purposes
    * Engaging consent management with services
    * WSO2 Privacy Toolkit
  • GDPR and API Security
    GDPR and API Security
    Sanjeewa Malalgoda Senior Technical Lead, WSO2 Recorded: Dec 19 2018 68 mins
    If your organization collects, stores or otherwise processes the data of individuals who live in the European Union (EU), the General Data Protection Regulation (GDPR) affects you. The primary responsibility for GDPR compliance lies with the controller (those who collect data). However, processors (usually API management and mediation platforms) are equally liable for how they handle data. So your API management solution also needs to comply with the regulations of GDPR.
    API gateways can be perfectly positioned to address GDPR because it protects both data and user access at the point at which it enters and leaves the systems. This is very efficient because it ensures that security is embedded within the API itself, and not the apps that access the API. This allows app developers to focus on improving the functionality of their applications because they know API security is already taken care of.
    In this webinar we will discuss how GDPR affects an API management solution. The following topics will be covered:
    * The role of API management in a GDPR compliant solution
    * How GDPR effects API management
    * Principles relating to personal data processing and security of processing
    * Data protection by design and by default
  • CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
    CIAM: Conquering the Phygital Battleground with WSO2 Identity Server
    Johann Nallathamby, Senior Lead Solutions Engineer, WSO2 Recorded: Dec 19 2018 55 mins
    In the age of the customer, businesses battle to retain the trust and loyalty of existing customers as well as to win new customers in the phygital (physical and digital) space. Customer Identity and Access Management (CIAM) is an essential weapon, which you must wield to win this battle. But the difficulty is that the conditions of the battleground are dynamic and the targets are moving fast.
    If your CIAM solution is undesirably restrictive, it can detract from the customer experience. On the other hand, if it’s not restrictive enough it compromises your security. Finding out the right balance for your business can be challenging. Most organizations don’t have the technical capacity to build a CIAM solution in-house that’s dynamic, flexible, and scalable enough to compete in the market. On the other hand, complex multi-vendor solutions are hard to integrate, customize, and scale up to your business demands.
    By adopting the right technology, following best practices and avoiding common pitfalls, you’ll be able to create a strong CIAM solution. With WSO2 Identity Server, you have the ability to implement a lean, extensible, scalable, and developer-friendly solution that is able to meet the core requirements of CIAM.
    In this webinar we will look at:
    * The business objectives that require a CIAM strategy for your organization
    * Key functional and non-functional requirements of CIAM
    * Technical best practices to follow and pitfalls to avoid when implementing a CIAM solution
    * Building an effective CIAM solution with WSO2 Identity Server
  • The Role of IAM in Microservices
    The Role of IAM in Microservices
    Darshana Gunawardana, Technical Lead & Farasath Ahamed, Senior Software Engineer, WSO2 Recorded: Dec 19 2018 62 mins
    Security by design is applicable to the microservices paradigm the same way it is applicable to any software architecture. Monolithic applications handle end user authentication and authorization in a central manner, but with microservices, each independent module has to perform necessary end user authentication and authorization along with validating service-to-service trust.
    Adding to that, the granularity of these services and frequent interactions between them makes securing microservices more challenging. Using the same approach when solving security considerations of monolithic services is not applicable.
    Moreover, current authentication and authorization protocols cannot directly address these requirements, so they need the flexibility of identity and access managers to adapt to the required changes.
    In this webinar, Darshana & Farasath will explore
    * Challenges of securing microservices
    * Best practices to overcome them
    * A demonstration on how WSO2 Identity Server can be used in microservice architecture

Embed in website or blog