Google's fast and scaleable API gateway, Google Cloud Endpoints, is now generally available. Cloud Endpoints is built upon the same services that Google uses to power internal APIs. Cloud Endpoints ensures APIs used within apps on the Google Cloud Platform are monitored and secure
Recent Security ArticlesView all
PasswordPing recently announced the launch of its password and credential breach notification service. The service alerts organizations of passwords and credential/password combinations that have been exposed. The service includes API entry points to the service for integration with login screens.
Bugsee recently emerged from stealth mode with its bug reporting and crash analytics tool. Bugsee's primary advantage over most mobile app bug tools is the continuous video capture of user actions. Bugsee syncs video data with log and network data for optimal and quick crash and bug recovery.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||The Infobip APIs allow for integration tools that aim to utilize Infobip products and services in a single place. Infobib has five different APIs; HTTP SMS API, Voice API, OMNI Channel API, Factor...||Messaging||11.09.2011|
All Security APIs (527)View all
||Okta is a fully standards-compliant OAuth 2.0 authorization server and a certified OpenID Provider. The OAuth 2.0 APIs provide API security via scoped access tokens, and OpenID Connect provides user...||Security||02.10.2017|
||This API provides a way for secrets to manage any sensitive data which a container needs at runtime but you don’t want to store in the image or in source control, such as: Usernames and passwords,...||Security||02.08.2017|
||KIDOZ offers a family friendly content discovery and monetization platform. KIDOZ features customized units for a better application experience, COPPA compliant content, and recommendations. The...||Entertainment||02.02.2017|
||The CleanTalk Anti-Spam API can be connected to a website in order to access a cloud-based spam protection service. Developers need only to create a class to check messages for spam, and to parse...||Spam||01.30.2017|
||The ChatPirate API integrates chats into business applications in REST architecture with JSON formats and basic authentication. ChatPirate provides customization, analytics, and security features in...||Chat||01.12.2017|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|