commercial-in-confidence instantly

12
instantly Commercial-In-Confidence The contents of this presentation including network diagrams, client logos, user stories and any pricing information remains commercial in confidence and are not to be reproduced or distributed outside the immediate team without authorisation.

Upload: others

Post on 01-May-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Commercial-In-Confidence instantly

instantly

Commercial-In-Confidence

The contents of this presentation including network diagrams, client logos, user stories and any pricing information remains commercial in confidence and are not to be reproduced or distributed outside the immediate team without authorisation.

Page 2: Commercial-In-Confidence instantly
Page 3: Commercial-In-Confidence instantly
Page 4: Commercial-In-Confidence instantly

Client: Global Computer Hardware Manufacturer

Enterprise Problem:

DreamFactory Resolution:

●●

Page 5: Commercial-In-Confidence instantly

Client: Global Management Consulting Firm

Enterprise Problem:

DreamFactory Resolution:

●●

Page 6: Commercial-In-Confidence instantly

Client: North American Technology Distributor

Enterprise Problem: DreamFactory Resolution:

Page 7: Commercial-In-Confidence instantly

Client: Big 4 Consultancy

Enterprise Problem:

DreamFactory Resolution:

● - Enterprise Architect

Page 8: Commercial-In-Confidence instantly

Scaling DreamFactory

Page 9: Commercial-In-Confidence instantly

SQL

Universal Connectors

Push & Pub Sub

NoSQL

Email

Logging & Reporting

Version Control

Auth

Scripting

Cache

Storage

Page 10: Commercial-In-Confidence instantly

Restrict data/resource consumption

Scope limit according to service, user, endpoint, and even method

Define limit periods in minutes, hours, or days.

HTTP status code compliant (429)

Lock down API access using point-and-click UI

Create read-only APIs

Restrict access according to endpoint and method

Unique API keys

Basic authentication

LDAP, Active Directory

SAML-based SSO

Map AD/LDAP groups to roles

ELK stack integration

Real-time traffic dashboards using Kibana or Grafana

Define exacting logging specifications.

Security & Compliance

Page 11: Commercial-In-Confidence instantly

Rigorous Authorization

Information Confidentiality

IP Theft Prevention