Interview with Eugene Kuznetsov, Founder, President and CTO of DataPower Technology Inc.
by Mirko Zorz - Friday, 24 January 2003.
Applying these new granular security policies is not trivial. XML, SOAP and other Web Services protocols rely on a human-readable text-based encoding standard that is not only inherently less secure than byte-encoded formats but also more onerous to process. Consequently, XML Web Services security mandates the use of technologies that can parse, filter and transform XML and SOAP packets at wirespeed performance levels to apply security polices down to the element level of an XML document without hindering the application itself; in other words, it can't be a choice between performance of applications OR securing applications. Companies need both.

XML Security Gateways are one example of the XML-Aware network devices that work with existing security infrastructure to provide the key functions that are required for implementing essential XML Web Services security practices.

Does DataPower have any international growth opportunities?

DataPower first introduced its XML-aware network devices back in August of 2002 with the introduction of its XA35 XML accelerator. Along with that, DataPower announced its first XA35 customer -- Hemscott, a European financial information company based in the UK. DataPower sees great opportunities in the UK and mainland Europe for both its XA35 XML accelerator and XS40 XML security gateway. It goes without saying that

XML is a global standard and cuts across all boundaries for its implementations. If a company is using or plans to use XML then chances are DataPower can help that company's performance, security and management issues around XML.

What developments does DataPower envisage in 2003?

2003 will be a giant step forward for the use of XML and developing XML Web services, both inside and outside corporation's traditional perimeter. As XML-aware networking continues to mature and companies like DataPower develop products that can solve XML's inherent performance, security and management problems, then companies are going to rapidly accelerate their use of XML for mission-critical applications and begin to truly realize XML's benefits and promise.

Spotlight

How to keep your contactless payments secure

Posted on 19 September 2014.  |  Fraudsters can pickpocket a victimís financial data using low-cost electronics that can fit into a rucksack. Here are the top security threats you should be aware of if youíre using a RF-based card, along with our top safety tips to keep your payments secure.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Sep 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //