API & Data Security Solutions
Safeguard Critical Data Wherever It Resides

Based on Bootstrap 3.2

EIF-iSign Web & API Security System

Instantly add scoped authentication, authorisation, and user management to secure your web or mobile apps

EIF iSign is a complete system for companies not implementing a full API Gateway, but who still need to add ultra-secure authentication, authorisation, and user management to their web, mobile apps, and APi’s.

Use EIF iSign in any combination of private cloud, public cloud, SaaS or API based implementations.

Highly flexible with fine and course grained authorisation and validation, EIF implements open standards such as OAuth2.0 and uses MD5 RIPEMD160 or SHA2 512 encryption.

EIF iSign integrates seamlessly with EIF iCore to allow for the complete cycle of development, deployment and securing of IBMi API's

EIF Digital Security Patterns

Digital Security Patterns is set of pre-defined Datapower-based integration infrastructure patterns and API Connect Extensions for all common digital integration use cases.

Use these security patterns for rapid, and repeatable REST and SOAP-based API deployments of secure API’s and their related services.

Reusable patterns ensure more secure & consistent deployments for Single-Sign-On and other types of authenticated services such as:

  • Microsoft Active Directory / LDAP Delegation Implementation
  • ICRX Tokens
  • RACF Passkey Tokens and more
Extensive documentation

XRAY - Search & Secure PCI (Sensitive) Data

IBM's QRadar and Guardium Security and Privacy tools are combined with ThoughtMakers XRAY, for an end-to-end data security solution.

The combined solution helps classify and secure data across multiple industries, both proactively and real-time.

Key Features

  • Provides near real-time visibility for threat detection
  • Enables more effective threat management
  • Delivers security intelligence in cloud environments.
  • Detailed data access and user activity reports for compliance.
  • Transparent, rapid implementation
  • Centralized key and policy management
  • Compliance-ready capabilities-such as the Health Insurance Portability and Accountability Act (HIPAA) and PCI Data Security Standard (PCI DSS).
  • Research unstructured data patterns in all data forms and places
  • Reduces and prioritizes alerts

Secure The Data That Powers Your Business

ThoughtMakers XRay software is a data-pattern discovery tool. XRay scans storage media for specific data patterns, for data relating to credit card numbers or other sensitive data for POPI PCI-DSS type audits. XRay integrates with Guardium/QRadar to log activities and offer real time alerts on security issues.

Our solution helps clients support a full range of use cases – compliance initiatives, privacy initiatives, big data security projects, and projects to outthink insiders all the way through comprehensive data protection.

Analyze your data risk:

  • Discover and classify sensitive data – and uncover compliance risks – automatically
  • Know who is accessing data, spot anomalies, and stop data loss with data activity monitoring across files, databases, Hadoop distributions, NoSQL platforms, and more
  • Analyze data usage patterns to rapidly uncover and remediate risks with advanced, automated analytics and machine learning such as outlier detection
  • A Threat Diagnostic Center scans and analyzes audited data to detect symptoms that may indicate a database attack underway – from the inside or from the outside – such as detecting SQL injections and malicious stored procedures
  • A dynamic Data Protection Dashboard centralizes key indicators of data and data repository risk mitigation and compliance progress for key stakeholders, so they can see the data security heartbeat of the organization and act appropriately.

Protect your critical data:

  • Shield the business from liability with automated data compliance and extensive audit capabilities for data at rest and data in motion
  • Protect critical data through encryption, masking, redaction, and dynamic blocking and alerting
  • Alert or block elicit internal & external data and file access with real-time response, including identifying abnormal or suspicious behavior..

Seamlessly adapt your data security to changes in your environment

  • Support traditional and new data technologies - such as Hadoop, noSQL and Cloud
  • Support your entire data protection journey – from compliance to end-to-end data protection with the same infrastructure and approach
  • Reduce costs and improve results using a single data protection infrastructure for your entire environment