WSO2

Santa Clara, CA, USA
2005
  |  By Sagara Gunathunga
In the digital age, we interact with countless applications, whether for personal, professional, or recreational purposes. Many of these applications appear consumer-oriented but are, in fact, business-to-business (B2B) applications. For example, when accessing healthcare services, payroll systems, or school management platforms, you are likely using applications where your provider (such as your GP or employer) is a business customer of a larger B2B application.
  |  By Chathuranga Siriwardana
Do you have an open API specification that needs to be transformed into a functional mock server? With Choreo’s latest release, you can now use Prism Mock service components to mock your open API specifications. This is powered by Prism, an open source technology, allowing you to tap into Choreo’s robust functionalities, including API management, observability, DevOps, and more.
  |  By Nadheesh Jihan
Choreo is a powerful internal developer platform (IDP) as a service built for enterprises, offering a comprehensive suite of tools for CI/CD, API management, DevOps, observability, and business insights. It provides an all-in-one solution for building, deploying, governing, and monitoring enterprise applications—eliminating the need for developers to build complex CI/CD workflows or set up custom platforms.
  |  By Sanjeewa Malalgoda
Today, WSO2 launched updates to the open source API management platform for building and managing full lifecycle APIs with new releases of its core WSO2 API Manager offering and WSO2 API Platform for Kubernetes (WSO2 APK).
  |  By Chathura Ekanayake
Many business processes involve communicating with external parties such as suppliers, logistics providers, insurance providers, and government institutions. Unlike internal communications, these inter-organizational communications usually have to follow various regulations and standards, and could introduce delays if one party doesn’t comply. Therefore, effective business-to-business (B2B) integrations are a key part of most digital transformation projects.
  |  By Udara Pathum
As highlighted in the Quantum-Safeness of WSO2 Products blog, there is an urgent need for alternative asymmetric encryption methods. Post-quantum algorithms (Q) are gradually gaining prominence but require time to establish trust within the industry. Therefore, combining classical (C) and post-quantum (Q) Key Encapsulation Mechanisms (KEMs) ensures resilience against classical and quantum attacks. The Ballerina Swan Lake Update 9 release adds support for post-quantum secure end-to-end encryption.
  |  By Chathura Ekanayake
Organizations generate vast amounts of data daily during various business operations. For example, whenever a customer checks out out at a retail outlet, data such as the customer identifier, retail outlet identifier, time of check out, list of purchased items, and the total sales value can be captured in the Point of Sales (PoS) system. Similarly, field sales staff may record possible sales opportunities in spreadsheets.
In today's interconnected digital landscape, effective management of customer identities is not just a technical requirement but a strategic asset. Customer identity and access management (CIAM) systems are at the heart of this, ensuring secure and seamless user experiences across numerous digital interfaces. Whether for individual consumers or business clients, CIAM facilitates personalised interactions while safeguarding sensitive data, complying with global regulations, and improving business enablement and operational efficiency.
  |  By WSO2
Utilising WSO2's API management and integration, TOTSCo provides stable, secure, and efficient service switch for telecom customers.
  |  By Frank Leymann
We begin with a very brief overview on the underpinnings of quantum computing and the notion of quantum algorithms. Next we show the threats on today’s cryptographic protocols that originate from quantum algorithms.
  |  By WSO2
Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.
  |  By WSO2
In this episode, Sanjiva and Asanka explore the evolving landscape of digital modernization. They discuss how modernization is not a one-time project but an ongoing journey, transitioning from digital transformation to digital modernization. The conversation delves into various modernization styles, such as rehosting, replatforming, rebuilding, and replacing, and addresses challenges like cost, skills, and organizational resistance. They also highlight the role of platforms and AI in accelerating modernization, with a focus on cost savings, risk reduction, and business agility.
  |  By WSO2
Dive into an in-depth walkthrough of Choreo (An Internal Developer Platform as a Service), showcasing how this powerful Internal Developer Platform simplifies development workflows, automates deployments, enhances API security, and streamlines cloud-native application delivery. From code to production, learn how Choreo helps developers accelerate app modernization with ease, offering real-time monitoring, multi-cloud Kubernetes support, and seamless integrations. Whether you're new to Choreo or looking to leverage its full potential, this demo will guide you through every step.
  |  By WSO2
WSO2 API Manager is stepping into the age of AI. We’re thrilled to announce one of the core features that we have released with WSO2 API Manager 4.3.0: Introducing AI-Based Search for Developer Portal.
  |  By WSO2
Watch our online meetup to learn how to implement seamless, secure access, and engage with industry experts. Whether you're a developer or architect, this session will provide valuable insights and practical guidance. Key Topics: Optimizing developer experiences API-driven, app-native/browserless authentication experiences Organization management for B2B SaaS applications Creating frictionless, secure access for your employees, consumers, and business customers.
  |  By WSO2
Customer identity and access management (CIAM) encompasses the systems and processes that handle consumer identities and their access to services. In healthcare, CIAM applies not only to patients but also to healthcare providers, administrative staff, and other stakeholders involved in care delivery. Given the complexities of healthcare, including patient data privacy and the integration of diverse systems, CIAM is vital for effective digital transformation.
  |  By WSO2
In this special edition, hosts Sanjiva and Asanka are joined by WSO2 co-founder Paul Fremantle for an in-person recording in the studio. Sanjiva leads the discussion, while Paul and Asanka, co-authors of the cell-based architecture, share their insights and experiences. Together, they explore the core principles of cell-based architecture, its practical applications, and how it reshapes modern software architecture.
  |  By WSO2
In this screencast, we dive into the advantages of using GraphQL over traditional REST APIs and how to deploy and manage GraphQL APIs using WSO2 API Platform for Kubernetes (APK).
  |  By WSO2
Welcome to the Choreo Community Call! In this session, we’ll dive into deploying a static website and configuring custom domains using WSO2 Choreo.
  |  By WSO2
WSO2 API Manager is stepping into the age of AI. We’re thrilled to announce one of the core features that we have released with WSO2 API Manager 4.3.0: AI-based API Testing. If you have any questions or need further information, feel free to reach out in the comments or contact us directly.
  |  By WSO2
APIs have been in the technology canvas for nearly two decades now, with almost all the major software vendors releasing their APIs after the year 2000. For example, Salesforce and eBay released their APIs in 2000, Amazon in 2002, and Facebook in 2006. Today, APIs are a fundamental building block in digital business and integrations.
  |  By WSO2
Customer Identity and Access Management (CIAM), a subgenre of IAM, enables organizations to scale and ensure secure, seamless digital experiences for their customers, while collecting and managing customer identity data purposefully. Powerful CIAM solutions provide a variety of key features including customer registration, social logins, account verification, self-service account management, consent and preference management, single sign-on (SSO), multi-factor authentication (MFA), and adaptive authentication as well as other nice-to-have features.
  |  By WSO2
Current estimates suggest widespread adoption of open source software (OSS) in organizations worldwide. Compared to sectors such as operating systems and big data, adoption in the security and identity management sector has been low until now. While there were a number of open source projects around libraries for security and identity management-related functionalities, there were only a few projects based on an end-to-end security or identity and access management (IAM) solution.
  |  By WSO2
With the fast-growing popularity of cloud computing, an increasing number of organizations are now moving towards cloud-based solutions. Gartner predicts that1, "by 2020, 90 percent of organizations will adopt hybrid infrastructure management" where some parts of a solution would be in the cloud while other parts would be in traditional on-premises data centers.
  |  By WSO2
Identity and access management (IAM) is the efficient integration and management of identities, giving users access to the right resources at the right time. Identity is no longer a mere security project for enterprises. In the integration and API domain, as businesses continue to increase the number of internal and third-party APIs, it's more important than ever that APIs are integrated and governed securely. In the user domain, with increasing user identity spaces, company-wide policies, complex structure hierarchies and roles, regulatory pressures, and customer-facing applications, security becomes a bigger challenge each day for identity architects and administrators.

Founded in 2005, WSO2 enables thousands of enterprises, including hundreds of the world's largest corporations, top universities, and governments, to drive their digital transformation journeys—executing more than 18 trillion transactions and managing more than 500 million identities annually. Using WSO2 for API management, integration, and customer identity and access management (CIAM), these organisations are harnessing the full power of their APIs to securely deliver their digital services and applications.

Our open-source, API-first approach to software that runs on-premises and in the cloud helps developers and architects to be more productive and rapidly compose digital products to meet demand while remaining free from vendor lock-in. WSO2 has over 900 employees worldwide with offices in Australia, Brazil, Germany, India, Sri Lanka, the UAE, the UK, and the US.

Our Products:

  • Choreo - iPaaS: Reduce complexity. Build cloud-native, digital products and solutions with agility and at scale.
  • API Manager: Harness the full power of your APIs to optimize business performance.
  • Enterprise Integrator: Speed application development with the fastest integration runtime available in the market.
  • Identity Server: Effectively build API-driven CIAM solutions that delight customers.

Next-generation technologies to future-proof your business.