Systems | Development | Analytics | API | Testing

The Red Velvet Rope of Low-Code Data Security

Here at Appian we're really excited to have released our low-code data security feature earlier this year. If you're not sure what that is, you're in good company. Even our parents just look at us blankly before saying "that's nice, dear" and changing the subject. Someone who doesn't love us unconditionally might be more skeptical.

5 ways we make sure your data is safe on Bitrise - compliance, access control, encryption, and more

Some of the world's most security-conscious companies rely on Bitrise to build safely. This article is a summary of the most important security-related measures we take to make sure your sensitive data is always protected.

Elastic stack-based Analytics Integration with WSO2 Identity Server

WSO2 Identity Server is an API-driven open source IAM product designed to help you build effective CIAM solutions. ELK-based analytics solution is introduced to view the login and session-related analytics data. Three dashboard templates are provided by default: Auth dashboard, Session dashboard, and alert dashboard. The session dashboard includes statistics related to sessions that get created for different applications accessed via the WSO2 Identity Server. Auth dashboard includes statistics related to login attempts made via the WSO2 Identity Server. The Alert dashboard includes suspicious Login Alerts and Long session alerts.

Multi-Attribute Login with WSO2 Identity Server

Depending on the business, the applications may need to authenticate with different login attributes. For example, social media applications use userId, email, or mobile number as the identifier, Internet banking applications use userId or username as the identifier, Corporate enterprise applications use email as the identifier. In WSO2 Identity Server 6.0.0 provides the capability to use different login attributes as a productized feature. It gives users the flexibility to choose their preferred identity attribute when logging in, such as email, username, or mobile number. A privileged user in the organization can configure the list of allowed attributes that can be used as the login identifier.

Why delivery lead time matters in mobile development and how to improve it

Lead time is a crucial metric in software development; it measures the time between the allocation of the work through code commit and finally to production. For us, lead time is essentially the time from backlog to the app store, or from production to the app store.

The Costs Associated With API Integrations and How To Minimize Them

Application programming interface (API) integrations can be considerable cost savings for your business. Integrating with an API eliminates the need to develop and maintain custom integrations for each application or system you use. However, you should be aware of some costs associated with API integrations before you decide to integrate. This article will discuss the different types of expenses related to API integrations and how to minimize those costs.

WSO2 Private CIAM Cloud Delivers B2B CIAM Capabilities Through Organization Management

WSO2 Private CIAM Cloud supports B2B and B2C business models through the B2B organization management feature. Unlike other CIAM products that are limited to simple organization management, the B2B organization management in WSO2 Private CIAM Cloud handles complex nesting.