Last week, HP officially launched commercial plans for Haven OnDemand, a machine learning platform that offers developers a suite of APIs they can use to "turn virtually any data into an asset anytime and anywhere." The platform entered beta in 2014 and offers more than offers more than 60 APIs.
IBM continues to push the boundaries of human-machine interaction with its Watson, machine-learning platform. A new set up APIs allow third party software and hardware to leverage the platform. Tone Analyzer, Emotion Analysis, Visual Recognition, and Expressive TTS arrive as the new Watson APIs.
The API economy now spans thousands of API-providing companies across hundreds of categories. Within each category there are multiple offerings, all competing for the affections and money of third-party developers--any one of which could unleash the next API-consuming Zillow, Instagram or Uber.
CrowdStrike Falcon Intelligence
||The Falcon Intelligence API provides real time information about new adversary groups, indicators, and news. 2 plans are available: standard delivers new threat information, and premium focuses on...||Security||06.08.2016|
CrowdStrike Falcon Streaming
||The Falcon Streaming API provides a constant source of information for real time threat detection and prevention. This platform offers unknown threat identification by using signature matching,...||Security||06.08.2016|
CrowdStrike Falcon Management
||The Falcon Management API provides updating, editing, and deleting capabilities for IOCs (Indicator of Compromise) within CrowdStrike's real time detection platform. This platform offers unknown...||Security||06.08.2016|
CrowdStrike Falcon Respond
||The Falcon Respond API provides support for before and after a system has been compromised, detection management, and remediation execution. This platform offers unknown threat identification by...||Security||06.07.2016|
CrowdStrike Threat Graph
||The Threat Graph API provides security insight about the endpoints of a third party application, and features threat type identification, crowdsourced protection, and real-time security records. This...||Security||06.07.2016|