SHARE
Facebook X Pinterest WhatsApp

IBM Powers Up SOA Machines

IBM has taken some of its hardware and software technology and applied it to three appliances designed to secure and improve the performance of service-oriented architectures (SOA) (define). The devices are adapted versions of the machines created by DataPower, which IBM purchased last fall to dip a leg into the lucrative pool for XML (define)processing. […]

May 23, 2006
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

IBM has taken some of its hardware and software technology and applied it to three appliances designed to secure and improve the performance of service-oriented architectures (SOA) (define).

The devices are adapted versions of the machines created by DataPower, which IBM purchased last fall to dip a leg into the lucrative pool for XML (define)processing.

Such products are needed to help securely facilitate the digestion of application-to-application communication and XML transmission because corporations are leaning more heavily on Web services (define)to execute sales transactions and purchase orders.

For example, more businesses are conducting Web transactions using RFID technology and wireless devices.

These methods require machines to secure, manage and authenticate the validity of data from multiple sources at a time when new hacking, identity theft crimes, viruses or other security vulnerabilities are piling up.

Jim Ricotta, vice president and general manager of IBM SOA appliances, said the appliances will help IBM play well in what the company expects to be a billion-dollar market for products that improve Web services and SOA security and delivery.

The IBM WebSphere DataPower XML Security Gateway XS40 validates, encrypts, signs and authenticates XML script and Web Services-Security standard to enable the safe exchange of Web services.

The XS30 also provides a firewall to help network admins fend off denial of service attacks, and provides policy-based access to make sure only certain people are privy to certain information.

This article was first published on InternetNews.com. To read the full article, click here.

  SEE ALL
ARTICLES
 
CB

Clint Boulton is a senior technology writer covering IT leadership, the CIO role, and digital transformation.

Recommended for you...

10 Top Storage Certifications for Data Professionals In 2024
Anina Ot
Mar 27, 2024
What is Data Compression & How Does it Work?
Kashyap Vyas
Sep 19, 2023
What Is a Data Pipeline? Examples & Types
Anina Ot
Sep 18, 2023
Top 10 Data Center Certifications
Kashyap Vyas
Aug 22, 2023
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.