KrakenD
Engineered for peak performance and efficient resource use, KrakenD can manage a staggering 70k requests per second on just one instance. Its stateless build ensures hassle-free scalability, sidelining complications like database upkeep or node synchronization.
In terms of features, KrakenD is a jack-of-all-trades. It accommodates multiple protocols and API standards, offering granular access control, data shaping, and caching capabilities. A standout feature is its Backend For Frontend pattern, which consolidates various API calls into a single response, simplifying client interactions.
On the security front, KrakenD is OWASP-compliant and data-agnostic, streamlining regulatory adherence. Operational ease comes via its declarative setup and robust third-party tool integration. With its open-source community edition and transparent pricing model, KrakenD is the go-to API Gateway for organizations that refuse to compromise on performance or scalability.
Learn more
Stigg
Introducing the pioneering monetization platform tailored for today’s billing ecosystem. This solution mitigates risks, enables concentration on core tasks, and enhances the variety of pricing and packaging alternatives while minimizing code requirements. Serving as a distinct middleware, a monetization platform integrates seamlessly between your application and your business tools, becoming an essential part of the contemporary enterprise billing framework. Stigg consolidates all the APIs and abstractions that billing and platform engineers would otherwise need to develop and maintain internally. By acting as your authoritative source of information, it offers robust and adaptable entitlements management, making the process of implementing pricing and packaging adjustments a straightforward, self-service task devoid of risk. With Stigg, engineers gain precise control over the components that can be priced and packaged individually. You can impose restrictions and manage your customers' commercial permissions at a feature level, simplifying intricate billing concepts within your code. Ultimately, entitlements represent the cutting-edge approach to software monetization, providing a versatile and adaptive framework for hybrid pricing strategies, ensuring businesses can thrive in a competitive landscape. This fresh approach not only streamlines billing processes but also empowers companies to innovate and respond to market demands quickly.
Learn more
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
Learn more
PHEMI Health DataLab
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages:
Lets analysts work with data without breaching privacy guidelines
Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data.
Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage.
Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns.
Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines.
Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
Learn more