APPROOV INTEGRATION IN A JAVA SPRING STATELESS API

Thu 09 May 2019 By Paulo Renato

Category: Integration, Mobile App Authentication, API

This walk-through will show how simple it is to integrate Approov in a stateless API server using Java and the Spring framework.

We will see the requirements, dependencies and a step by step walk-through of the code necessary to implement Approov in a Java Spring stateless API.
Read More

APPROOV INTEGRATION IN A NODEJS EXPRESS API

Tue 05 February 2019 By Paulo Renato

Category: Integration, Mobile App Authentication

 

This walk-though will show us how simple it is to integrate Approov in a current API server using NodeJS and the Express framework.

We will see the requirements, dependencies and a step by step walk-through of the code necessary to implement Approov in a NodeJS Express API.
Read More

APPROOV INTEGRATION IN A PYTHON FLASK API

Mon 04 February 2019 By Paulo Renato

Category: Integration, Mobile App Authentication

This walk-though will show us how simple it is to integrate Approov in a current API server using Python and the Flask framework.

We will see the requirements, dependencies and a step by step walk-through over the code necessary to implement Approov in a Python Flask API.

Before we tackle the integration of Approov we need first to know how Approov validation is processed in the server and how to setup the environment to follow this walk-through.

Note that this article assumes a basic understanding of the Approov mechanics. If you need an overview of that, please read first the Approov in Detail page.

 

Read More

42CRUNCH AND CRITICALBLUE ANNOUNCE PARTNERSHIP

Fri 23 November 2018 By David Stewart

Category: News, Integration, Business, Mobile App Authentication


Joint solution to ensure APIs are built correctly and used legitimately.  

Read More

USING APPROOV IN YOUR CORDOVA APP THE EASY WAY

Fri 15 June 2018 By Johannes Schneiders

Category: Integration, Cordova

 

Read More

HOW WE INTEGRATED APPROOV WITH CORDOVA

Fri 15 June 2018 By Johannes Schneiders

Category: Integration, Cordova

Read More

A TOUR OF API UNDERPROTECTION

Tue 03 April 2018 By Skip Hovsmith

Category: API Keys, Integration, TLS

AN OWASP APPSEC CALIFORNIA 2018 TALK

The fifth annual OWASP AppSec California was held in late January 2018 on the beach in Santa Monica. AppSec California is organized and run by an all-volunteer staff, and they put on a great conference — highly recommended. Besides excellent content and a chance to interact with many interesting colleagues, who wouldn’t want to hang out on the beach for a few days?

Read More

WHAT CAN YOU ACHIEVE IN YOUR 1 MONTH FREE TRIAL OF APPROOV?

Wed 07 February 2018 By Jae Hossell

Category: Integration, Mobile App Authentication

Approov is first and foremost an API protection solution for bot mitigation, however, while performing this task it also gives insight into the types and state of devices that are communicating with the protected services. For example, do you want to know the proportion of connections coming from unauthorised software: bots, scripts, or repackaged apps? Do you want to know if your communications are being intercepted, if the mobile device is rooted, if your app is running in an emulator, or if there is a debugger or framework attached? These types of questions can be answered with an Approov integration and you can even start getting at these nuggets before the end of your free trial.

Read More

"WHAT IF I WANT TO CANCEL?"

Thu 01 February 2018 By Jae Hossell

Category: Integration, Business

Once you've started using Approov, we find it unlikely that you will want to cancel. However, it is a legitimate concern for potential users and, as we have a quick and simple cancellation process, I am happy to address it here. First up, consider the following scenario at the point of cancellation:

Read More

PRACTICAL API SECURITY WALKTHROUGH — PART 4

Thu 18 January 2018 By Simon Rigg

Category: Integration, TLS, Mobile App Authentication, Repackaged Apps, A Series - ShipFast

Welcome back! This is the fourth and final part of a mini series which uses a fictional product, “ShipFast”, to walk you through the process of defending against various exploits in a mobile application to gain access to data on a remote server allowing real users of the system to gain an unfair business advantage at the expense of the company.

Read More

Page 1 of 3