0% found this document useful (0 votes)
86 views10 pages

Secure Mobile Access For Enterprise Employees

Simplify security and management for enterprise-level apps and BYOD Enterprises are increasingly concerned with leveraging mobile technology to maximize employee productivity, efficiency and availability. Meanwhile, employees are already taking the initiative by using their own personal mobile devices for business purposes – a phenomenon known as “bring-your-own-device” (BYOD).

Uploaded by

Layer7Tech
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views10 pages

Secure Mobile Access For Enterprise Employees

Simplify security and management for enterprise-level apps and BYOD Enterprises are increasingly concerned with leveraging mobile technology to maximize employee productivity, efficiency and availability. Meanwhile, employees are already taking the initiative by using their own personal mobile devices for business purposes – a phenomenon known as “bring-your-own-device” (BYOD).

Uploaded by

Layer7Tech
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

SecureMobileAccessforEnterpriseEmployees

SimplifyingSecurity&ManagementforEnterpriseLevelApps&BYOD

Layer7Technologies

WhitePaper

SecureMobileAccessfortheEnterprise

Contents
Introduction..................................................................................................................................................3 BYOD&Apps:InnovationThroughConsumerization..................................................................................3 TheBenefitsofEverywhereAccess..........................................................................................................4 TheBYODMovement ...............................................................................................................................4 . MobileIntegration:UsingAppstoLeverageInternalInformationAssets&Services .................................5 . UsingAPIstoEnableEnterpriseMobility.................................................................................................5 AddressingtheChallengesofEnterprise/MobileIntegration......................................................................6 1.AdaptingInternalInformationAssetsforMobileConsumption..........................................................6 2.OptimizingAppPerformanceWhenAccessingEnterpriseInformation...............................................7 3.SecuringMobileAccesstoEnterpriseAPIs...........................................................................................7 4.MakingAPIsDiscoverable&ConsumableforDevelopers....................................................................8 SimplifyingSecureEnterpriseMobilitywithaMobileAccessGateway...................................................9 Layer7SolutionsforSimplifyingSecureEnterpriseMobileAccess.............................................................9 Conclusion.....................................................................................................................................................9 AboutLayer7Technologies........................................................................................................................10 ContactLayer7Technologies.....................................................................................................................10 LegalInformation........................................................................................................................................10

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

Introduction
MobiletechnologyisrevolutionizingthecorporateITlandscape.Enterpriseswanttoleveragemobileto maximizeemployeeproductivity,efficiencyandavailability.Meanwhile,employeesarealreadytaking theinitiativebyusingtheirownpersonalmobiledevicesforbusinesspurposes.Forenterprises,the benefitsofenterprisemobilityandtherealityofthebringyourowndevice(BYOD)movementare becomingimpossibletoignore. For enterprises, the benefits of enterprise mobility and the reality of BYOD are becoming impossible to ignore. Thetruepotentialofmobiledevicesisintheappstheyrun.Togetrealvalue frommobile,enterprisesneedtoprovidetheiremployeeswithappsthatcan accesscorporateresourcesandinformation,evenwhenthedevicesbeingused arenotundercorporatecontrol.Forenterprises,thiscreatessignificant challengesrelatedtosecurityandinformationadaptation.

Makingcorporatedataandapplicationfunctionalityavailabletoappsresiding onemployeesmobiledevicescanbeachievedbyusingAPIstoexposeon premisesystemsanddatatodevelopersbuildingmobileapps.UsingAPIsforenterprise/mobile integrationisarecentparadigmrequiringaspecificsolutiontoensurethemaintenanceofsecurityand governance.Inthiscontext,aSOAGatewaywithAPIProxycapabilitiescanbeusedasaMobileAccess Gatewaytoaddressidentity,dataandapplicationadaptationandsharingcontrolacrossanAPI.

ThisLayer7Technologieswhitepaperexploresthechallengesofenterprisemobilityandprovides practicaladviceonhowtouseanAPIproxyasaMobileAccessGateway.ItdescribesrealLayer7use casestoshowhowenterprisesbenefitfromprovidingemployeeswithmissioncriticalmobileapps.It alsoexplainshowtheLayer7APIProxyandsupportingcomponentsofLayer7sAPIManagementSuite arehelpingtheseenterprisestodeliversecuremobileaccess.

BYOD & Apps: Innovation Through Consumerization


Mobiletechnologyisbeingusedincreasinglyintheworkplaceandbyremoteworkersinterfacingwith theextendedenterprisethroughappsandservices.TherunawaypopularityoftheAppleiPadhas acceleratedthistrendgreatlyoverthelastcoupleofyearsbutotherappdrivenplatformssuchas theiPhone,GooglesAndroidsmartphoneOSandWindowsMobileareplayingasignificantrole.The Blackberryplatformstillwidelyusedinenterprisesettingshasalsoembracedthemobile appparadigm. Forlargecompanies,governmentaldepartmentsandmanyothertypesoforganization,therearetwo keyfactorsdrivingtheenterprisemobilityrevolutionandmakingitvitalthatenterprisesaddressthe challengesofsecuremobility: 1. Theremarkableefficienciesandcostsavingsofferedbyprovidingeverywhereaccess

2. TheBYODmovementandtheconsumerizationofenterpriseIT

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

The Benefits of Everywhere Access


Mobiletechnologypresentsorganizationswithpotentialefficienciesthataresimplytoobeneficialto ignore.OneLayer7customerinthehealthinsurancesectorprovidesagreatexample.Thecustomers representativesmakearoundtwomillionhousecallstomemberseveryyear.Traditionally,member datagatheredatahousecallwouldberecordedbyhandandkeyedintoacentraldatabasewhenthe representativereturnedtotheoffice. Itwasclearthatprovidingrepresentativeswithmobiletechnologywouldmakethisprocessquickerand moreaccurate.Therefore,thecompanycreatedaniPadappdesignedtohelprepresentatives interactivelyassessmembersneeds.Thisapplicationisnowhelpingtoreducetimespenton administrativetasksandincreasetimespentwithmembersleadingtomoreefficientdecisionmaking andenhancedmemberservices. Inthisexample,alargeorganizationbenefitedfromprovidingitsstaffwithmobiledevices.Thiscaseis certainlynotuniquemanyenterpriseorganizationsareseeingsimilarbenefitsfromequippingtheir salesstaffwithmobiletechnology.However,inmanycases,enterprisesarepresentedwiththemobile workforceasaforegoneconclusionandarespecificallybenefittingfromthefactthatemployeesare usingtheirownconsumerfocuseddevicesintheworkplace.

The BYOD Movement


BYODisaresultoftheconsumerizationofIT.AsNathanClevengerobservesinhisexcellentbookiPadin theEnterprise,theflowofITinnovationhasreversed.Formerly,governmentresearchwouldleadto technologicalinnovations,whichwouldthenbeleveragedbybusinessesandfinallypackagedfor consumers.Now,technologicalinnovationsareemergingdirectlyfromconsumerelectronicsand consumertechnologiesarebeingembracedbythebusinessworld. Nevertheless,notalltheenterprisesthatarebeginningtoincorporateconsumerfocusedmobile technologyaredoingsoproactively.Moreoftenthannot,employeesarenotwaitingfortheir employerstoequipthemwithmobiledevicestheyaresimplybringingtheirowndevicestothe workplace(hencethetermBYOD).Moreover,theseindividualsarenotwaitingoraskingfortheirIT departmentspermissiontousethesedevicesforworktheyarejustdoingso. Andtheyaredoingsoenmasse.IDGConnectsiPadforBusiness2012studyfoundthat67%ofNorth AmericaniPadownerswereusingtheiriPadsatworkandthenumbersweresimilarlyhighworldwide. ThismeansthatBYODisarealityenterprisesaregoingtohavetodealwith,whethertheylikeitornot. Peopleclearlywanttousetheirmobiledevicesatwork,sotryingtoturnbackthetideofBYODcould haveaseriousimpactonemployeesatisfaction.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

SmartorganizationswillseeBYODforthemassiveopportunityitis.Theusecasedescribedearliershows thegreatbenefitsanorganizationcangainfromprovidingitsemployeeswithmobiledevices.Now imaginetheadditionalcostsavingsandefficienciesthatcanbegainedfromleveragingmobiledevices employeeshavealreadypurchasedforpersonaluseandarealreadyfamiliarwithonatechnicallevel. Ofcourse,astheusecasealsoshowsus,mobiledevicesareonlyhalfthestory.Hardware(specifically theemergenceoftheiPadandsimilartablets)hasbeenthecatalystforarevolutioninenterprise mobilitybutappsaretherealpayoff.BYODshowsusthatpeoplearealreadyusingtheirdevicesfor work.Toreallybenefitfrommobile,enterprisesneedtobuildappsspecificallydesignedtohelptheir employeesworkmoreeffectively.

Mobile Integration: Using Apps to Leverage Internal Information Assets & Services
Enterprise IT organizations have often reacted to any new technology paradigm with a rip and replace approach Sohowdoyoubuildappstoenablethemobileworkforce?Inthepast, enterpriseITorganizationsalltoooftenreactedtoanynewtechnology paradigmwitharipandreplaceapproachaccommodatingthenew technologybyattemptingtobuildnewITsystemsorportoldprocessesto newpackagedplatforms.Thisapproachyieldedlimitedreturnsanda moreflexible,efficientalternativewasclearlyneeded.

Overthelastdecade,moreandmoreenterprisearchitectshaveadopted anapproachdrivenbyapplicationprogramminginterfaces(APIs)inordertomakedataandapplication functionalityavailabletootherapplications.Thesearchitectscreateservicesthatallowthemtoeasily consumeandreuseexistingITinvestmentswhilecreatingnewbusinessprocessesbycomposing multipleoperationstogetherintohigherlevelapplications. ThisapproachknownasServiceOrientedArchitecture(SOA)canbeleveragedintheenterprise mobilecontext.Keydataandapplicationscanbeextendedanddeliveredasservices,viaAPIs,tomobile apps.Morespecifically,ServiceOrientedinterfacescanbequicklyadaptedintomobilefriendlyAPIs thatexposeinternalenterpriseinformationassetstomobiledevelopersandtheappstheybuild,using formatsandsecuritymodelsmobiledevicescaneasilyconsume.

Using APIs to Enable Enterprise Mobility


TheAPIdrivenservicesassociatedwithSOAmaybeexposedinternallyorexternally.OpeningAPIsto internalandexternaldeveloperssimplifiesthecreationofapplicationsabletointegratewiththe enterprisesinformationassetsinordertobenefitarangeofstakeholdersfromemployeestopartners tocustomers.Theseapplicationsmayresidewithintheenterprise,atpartnerorganizations,onthe Web,intheCloudoronmobiledevices.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

Forthesakeofthiswhitepaper,weareprimarilyconcernedwiththecreationofmobileappsbyinternal developersforusebyemployees(andpartners)acrosstheextendedenterprise.Ausecasefrom anotherLayer7customerdemonstrateshoweffectivethisstrategycanbe.Thecustomer,oneofthe largestUSbasedairlines,launchedanambitiousAPIpublishingprogramtargetedatbothinternaland externaldevelopers;employeesandcustomers. Internally,theseAPIsallowedthecompanysdeveloperstocreatearangeofappsdesignedtoenable themobileworkforce.Forexample,anappwascreatedthatwasdesignedtohelpgroundcrews expeditetheloadingandunloadingofbaggagefromflights,decreasingbaggagehandlingtimesto maximizecustomersatisfaction.(Externally,appsweredevelopedthatgavecustomersfulleritinerary managementcapabilitiesbycombiningtheairlinesscheduleandticketinformationwithvalueadded informationprovidedbyoutsidesources.) Layer7srolewastohelpthecompanyaddressthechallengesofpublishing,integratingandsecuring theseAPIs,therebyenhancingkeybusinessprocesseswithoutcompromisingcorporateintegrity.

Addressing the Challenges of Enterprise/Mobile Integration


APIsprovidethetechnicalcomponentsinternaldevelopersneedtointegrateonpremiseinformation assetswiththeappstheybuildforemployeesmobiledevices.However,forthisapproachtowork,four challengesmustbemet: 1. 2. 3. 4. AdaptingInformationAssetsforMobileConsumption OptimizingAppPerformanceWhenAccessingEnterpriseInformation SecuringMobileAccesstoEnterpriseAPIs MakingAPIsDiscoverable&ConsumableforDevelopers

1. Adapting Internal Information Assets for Mobile Consumption


Thereareanumberofchallengesassociatedwithmakinginternalinformationassetsusablebyamobile app.Firstly,informationassetsinlegacyformatsneedtobereworkedasRESTfulAPIsthatcanbe accessedasXMLorincreasinglyJSONdatamessagingformats.Thisrequiresanefficientsystemfor translatinganybackendinformationassetintoaRESTfulAPIthatcommunicatesoverHTTP/SusingJSON messaging.Itmayalsorequireareconstitutionorrecompositionofinternalinformationassetsinto newAPIscustomizedtospecificusersorapps. ThiskindofdatatranslationandAPIrecompositionisideallysuitedtotheSOAGatewaysthatare commonlyusedtointegrateapplicationsinSOAbytranslatingdataformats,orchestratingservice interactions,virtualizingAPIsandbridgingdifferentprotocolsandtransports.Connectingamobileapp toanenterpriseapplicationisthereforerenderedasjustanotherintegrationproblem.SomeAPIProxies cansimilarlyhandlethiskindofintegrationchallengeforasimplersubsetofenterpriseapplications.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

2. Optimizing App Performance When Accessing Enterprise Information


Whenintegratingenterpriseapplicationswithmobileapps,performanceisalwaysakeyconsideration. AnenterprisethatispublishingmobileAPIswillneedwaystoacceleratethedeliveryofdatawhile reducingdatatrafficvolumesbecause: Thedatawillbetravelingonrelativelylowbandwidthmobilenetworks Mobileusagecanscalegeometricallyastheenterpriseopensapplicationsfirsttoemployees andthenconsumers,whichplacesaheavyburdenontheseapplications

Again,aSOAGatewayorAPIProxymaybeabletohelptheenterpriseaddressthesechallenges.Thisis becausesomeSOAGatewaysdeliverawiderangeoffunctionalityformanagingandoptimizingdata trafficloads,including: Throttlingrequeststhatexceedacertainthresholdorshapingtrafficbasedonconsiderations likelocation,timeofdayorsubscriberlevel,thusselectivelylimitingperformancesappingload onbackendapplications. Usingsophisticatedcachingcapabilitiesinorderto:(a)minimizethenumberofrequeststhat getpassedtobackendapplications;(b)improvelatencyresponsetimes. Compressingdataonthefly,tominimizetrafficsenttoandfromamobileapp.SomeGateways canloadbalanceacrossmultiplebackendapplicationinstances,ensuringmoreevenly distributedloadacrossAPIsandsimplifyingscaleoutofbackendapplications. PrioritizingAPIcallstoensurethatpaidsubscribersorkeyusersreceiveaconsistentqualityof service,withguaranteedaccesstoenterpriseresources.Thisfunctioncanalsobeusedto reserveAPIaccesscapacitybasedonaspecifictraffictype.

WhendeployedintheCloud,someSOAGatewayscanalsohelpautoscalebackendservicesandeven dynamicallyaddGatewaynodestoaclusterinordertoprocessmoretraffic.

3. Securing Mobile Access to Enterprise APIs


SecurityisamajorconcernwheneveranapplicationoutsidetheDMZlikeamobileappneedsto accessinformationinsidetheenterprise.APIshavetobeprotectedagainstattackormisuse.Thedata transmittedtoandfromtheAPIneedstobesecured(throughencryption,tokenizationorredaction) anditsintegrityverified.AndaccesstotheinformationresourcesexposedviatheAPIswillneedtobe controlledatagranularlevel,basedontheidentityorroleoftherequestor. ControlofaccesstoinformationexposedthroughanAPIisaneventhornierissue.Ausermayuse differentappsondifferentdevicestoaccessapieceofdataorfunctionalityexposedthroughthesame enterpriseAPI.Thoseappscanbebuiltbydifferentgroupsordesignedasmashupsofdifferent informationassets.EachappmayuseadifferentuserID,complicatingtheidentificationoftheuser. Furthermore,usersdislikeretypingappspecificidentitiesonmobiledevicesandwouldpreferto delegatethatauthenticationtoapreexistingtrustedapp.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

ToaddressthedilemmascreatedbytheneedtoprovideflexibleyetsecureaccesscontrolforAPIsin thesemorecomplicatedmobile(andsimilarWebbased)scenarios,anewstandardOAuthhas emerged.OAuthisanevolvingprotocolthatmakesitpossibletoidentifyauserandtheresourcesthat userisinterestedinaccessingviaanintermediateapp,withoutnecessarilyrequiringtheusertoentera usernamepasswordcombinationspecifictotheapp. TheOAuthspecificationallowsenterprisestograntauthorizationrightstoanappbasedon:(a)the userspreexistingcredentialswithintheorganization;(b)atrustrelationshipbetweentheenterprise andtheintermediateapp.Thiskindoftransitivetrustandrightspassinghappensinthebackground theuseronlyneedstoestablishtrustoncefortheintermediateapp. WhileOAuthsolvespricklyaccessproblemsparticulartomobileappdynamics,itremainscomplicated forenterprisestosetup.Inparticular,therearechallengesaroundintegratingOAuthwithan enterprisesexistingidentityinfrastructure.Toaddressthesechallenges,anAPIProxymaycomewithan OAuthToolkitortokenserver,whichwillsimplifytheprocessofdeployingandmaintaininganOAuth accessinfrastructureontopofanAPI. Butaccesscontrolisnormallyjustthebeginningofthesecuritychallengesfacinganenterpriseand thesechallengesareexacerbatedinaBYODscenario,wheretheenterprisecannotlockdownmobile devicesthewayitcouldwithdesktopcomputers.Keychallengesinclude: Protectingagainstdenialofservice,crosssitescripting,SQLinjectionandURLtamperingattacks Preventingaccidentaldamagecausedbypoorlywrittenapps DeployingascalablesystemforpreservingdatasecurityincommunicationtoandfromAPIs,in ordertomeetdataprivacystandardslikeFIPS,PCIDSSandHIPAA

Again,someSOAGatewaysandAPIProxiescanhelpenterprisesaddressthesechallengesbyprovidinga rangeofAPI,dataandURLsecurityfeatures.

4. Making APIs Discoverable & Consumable for Developers


Acriticalelementinenablingintegrationbetweenmobileappsandenterpriseservicesoccursbeforethe firstbyteofdataisexchanged.InordertobuildmobileappsbasedonenterpriseAPIs,developersand developerteamsneedcertaininformationontheAPIstheycancall.Thismayincludeinformationonthe functionalityanAPIexposes,thedataitreturns,bestpracticesforitsuseandsoforth. Enterprisesthereforeneedsystemsfordeveloperonboarding(i.e.registeringdeveloperstouseanAPI) andmanagement.ThiscanbeachievedbydeployinganAPIPortalacentrallocationwheredevelopers gotogetdocumentationonanAPI,testitsbehavior,signupforusage,trackAPIhealthandcollaborate withotherdevelopers.SomeSOAGatewayandAPIProxyvendorsprovideintegratedAPIPortalstoease thegovernanceofAPIsandthedevelopersthatusethem.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

Simplifying Secure Enterprise Mobility with a Mobile Access Gateway


Aswehaveseen,thetypeofinfrastructurethathasemergedoverthelastdecadeorsotoenable secureSOAaccesstoAPIscanbeappliedtomobileappintegration.ADMZdeployedSOAGatewayor APIProxywithanintegratedOAuthToolkitandAPIPortalmaybeabletoactasaMobileAccess Gateway,addressingthespecificdataadaptation,performanceoptimization,securityanddeveloper managementchallengesassociatedwithexposinginternalinformationassetstomobiledevelopers andapps.

Layer 7 Solutions for Simplifying Secure Enterprise Mobile Access


Layer7TechnologiesAPIManagementSuiteofproductsdeliversalltheextendedMobileAccess Gatewayfunctionalitynecessaryforsecureenterprise/mobileintegration.TheAPIManagementSuite representsthemostcomprehensiveAPImanagementsolutionavailableandhasbeenusedinmultiple successfulintegrations,includingtheusecasesdescribedinthiswhitepaper. TheAPIManagementSuiteincludes: SecureSpanAPIProxy TheAPIProxydeliversallthecorefunctionalityrequiredforaneffectiveMobileAccess Gateway,includingAPIsecurity,datafiltering,contenttransformationandoutofthebox integrationwithleadingaccesscontrolsystemsandstandards. Layer7APIPortal TheAPIPortalprovideseverythingenterprisesneedinordertoonboardandmanage mobileappdevelopers,makingitsimpletocreateaportalthroughwhichdeveloperscan discover,learnaboutandregisterforavailableAPIs. Layer7EnterpriseServiceManager TheEnterpriseServiceManagerprovidesacentraldashboardthatmakesitsimpleto monitorProxyoperationsandmanageAPIversioning,lifecycleanddeploymentacross internaldatacentersandtheCloud. Layer7OAuthToolkit TheOAuthToolkitmakesitsimpletoimplementOAuthinenterprise/mobileintegrations, facilitatingefficientidentityfederationandsecureaccessmanagementwhenusingthe SecureSpanAPIProxyasaMobileAccessGateway.

Conclusion
Enterprisesstandtogainconsiderablebenefitsfromenablingtheirstafftousemobiledevices formissioncriticaldailyworktasks.WiththeBYODmovementgainingmomentum,manyenterprise employeesarealreadyusingtheirownmobiledevicesforwork.Therealpayoffwillcome asmoreenterprisesfindwaystobuildappsthatsecurelyandefficientlyinterfacewithonpremise systemsanddata.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

SecureMobileAccessfortheEnterprise

TheLayer7APIManagementSuiteprovideseverythingenterprisesrequiretoleverageAPIsasamethod forreusingexistinginformationassetstocreateappsthattrulyenablethemobileworkforce.The SecureSpanAPIProxydeliversallthefunctionalityrequiredforaneffective,enterpriselevelMobile AccessGateway.Layer7sAPIPortal,EnterpriseServiceManagerandOAuthToolkitprovidethe additionalintegratedfeaturesneededforacompletesolution.

About Layer 7 Technologies


Withmorethan150customersacrosssixcontinentsandsuccessfulpartnershipswithsomeofthelargestISVsand resellersintheindustry,Layer7TechnologiesistheleaderinsecurityandgovernanceforSOA,APIandCloud.Our awardwinningSecureSpanfamilyofXMLGatewaysfeaturessophisticatedruntimegovernance,enterprisescale managementandindustryleadingXMLsecurity.OurCloudSpanfamilyenablesenterprisesandserviceproviders tosecurelyconsumeCloudservices,aswellasprotectandcontroltheirownapplicationsdeployedinpublicand privateClouds.Foundedin2002,Layer7hasahistoryofhelpingorganizationsaddresstheirsecurity,visibilityand governanceissuesbyenablingthemtocontrol,manageandadapttheirWebservices,nomatterthedeployment modelintheenterpriseorintheCloud.

Contact Layer 7 Technologies


Layer7Technologieswelcomesyourquestions,commentsandgeneralfeedback. Email: [email protected] Web Site: www.layer7.com Phone: (+1)6046819377 18006819377(tollfreewithinNorthAmerica) Fax: (+1)6046819387 Address: Layer7Technologies 1200GStreet,NW,Suite800 Washington,DC20005 Layer7Technologies Suite4051100MelvilleStreet Vancouver,BCV6E4A6 Canada

Legal Information
Copyright2012byLayer7Technologies,Inc.(www.layer7.com).Contentsconfidential.Allrightsreserved. SecureSpanisaregisteredtrademarkofLayer7Technologies,Inc.Allothermentionedtradenamesand/or trademarksarethepropertyoftheirrespectiveowners.

Copyright2012byLayer7Technologies,Inc.(www.layer7.com)

10

You might also like