Of the many APIs we published this week, nine were highlighted on the blog by our team of writers. In this post, we’ll shine a spotlight on those nine, which included the Positionly API. Positionly is a web analytics platform designed to help website owners see where their site traffic is coming from. The Positionly API gives developers access to SEO tracking tools, productivity of methods, reports, updates and etc. To learn more about how the API can be integrated into sites and applications, visit the Positionly site as well as the Positionly API blog post.
Developers know the importance of internet security and being able to offer their users high standard password information protection. PassDefense is an application that offers developers a solution that enables them to authenticate and secure user data. The PassDefense API provides access to it's data, making it possible to create and authenticate users, send and retrieve data and more.
CrowdStrike Falcon Intelligence
||The Falcon Intelligence API provides real time information about new adversary groups, indicators, and news. 2 plans are available: standard delivers new threat information, and premium focuses on...||Security||06.08.2016|
CrowdStrike Falcon Streaming
||The Falcon Streaming API provides a constant source of information for real time threat detection and prevention. This platform offers unknown threat identification by using signature matching,...||Security||06.08.2016|
||The StudentConnect API allows websites to validate the personal profiles of students that sign up for products that are restricted to, or targeted at, students enrolled in academic institutions. The...||Marketing||06.08.2016|
||The Foneverify API integrates verification and security services into mobile applications. Available in JSON format with App Key. Parameters include CustomerID, VerificationID, TimeOut, and code.||Telephony||06.06.2016|
Microsoft Cognitive Services Speaker Recognition
||The Microsoft Cognitive Services Speaker Recognition API identifies individual users, and authenticates by using voice. It can be used to add a layer of security to third party applications with a...||Recognition||05.27.2016|