Feeds

CA piles into API management with Layer 7 acquisition

If stuff is moving to the cloud, you might as well own the transfer point

Securing Web Applications Made Simple and Scalable

CA Technologies has hopped into API management via the acquisition of Layer 7 technologies as the company continues to reinvent itself for the software-as-a-service era.

The acquisition follows a similar move by Intel to acquire Mashery last week, and API Management company Mulesoft's announcement it had trousered a further $37m from VC firms at the start of April.

Money is flooding into API management, because the technology provides a way for companies to better organize access to the application programming interfaces of individual applications, and also track usage of them.

As more and more companies are likely to produce several applications that can be manipulated by customers or end-users via an API, companies like Layer 7 Technologies are developing a business around giving business better access to all the valuable information stored in that usage data, while also securing those APIs as well. The company was founded in 2002 and provides both on-premise and cloud-delivered API management tech.

"We use APIs every day, whether accessing flight data from our mobile device, using Google Maps from a hotel website or making payments online," Mike Denning, CA Technologies' security general manager, said in a canned statement.

"There are billions of API calls a day and that number is going to increase with the proliferation of smart devices, ranging from vehicles, meters, TVs and other devices, as they start interacting over APIs. Without API security and management, thousands of business services are vulnerable to disruption."

CA Technologies' acquisition is part of a larger shift by the company towards as-a-service technologies, as it looks to keep itself relevant in the latest fashionable remote-software era. The company expects Layer7's products will sit alongside its Identity and Access Management Suite, including its CA SiteMinder, and CA LISASuite.

"The combination of CA Technologies and Layer 7 solutions will help organizations to better manage and secure APIs and deliver more confidently and quickly the cloud, mobile and composite applications that run today’s business services."

The company has ridden such transitions before, and successfully managed the switch over from mainframes to client/server, so it has form here.

The news comes alongside CA World in Las Vegas, in which the company is telling the assembled journalists, customers, and partners that it really understands cloud computing and has been doing it for a long time – a song it has been singing at CA Worlds around the world in 2012, 2011 and even 2010 as well, by this hack's reckoning.

Financial terms of the acquisition were not disclosed. Layer 7 has nearly 300 enterprise customers, and has offices in the US, Canada, and Europe. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.