Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying MuleSoft Platform Architect's Guide
  • Table Of Contents Toc
  • Feedback & Rating feedback
MuleSoft Platform Architect's Guide

MuleSoft Platform Architect's Guide

By : Jitendra Bafna, Jim Andrews
5 (8)
close
close
MuleSoft Platform Architect's Guide

MuleSoft Platform Architect's Guide

5 (8)
By: Jitendra Bafna, Jim Andrews

Overview of this book

We’re living in the era of digital transformation, where organizations rely on APIs to enable innovation within the business and IT teams are asked to continue doing more with less. Written by Jim Andrews, a Mulesoft Evangelist, and Jitendra Bafna, a Senior Solution Architect with expertise in setting up Mulesoft, this book will help you deliver a robust, secure, and flexible enterprise API platform, supporting any required business outcome. You’ll start by exploring Anypoint Platform’s architecture and its capabilities for modern integration before learning how to align business outcomes with functional requirements and how non-functional requirements shape the architecture. You'll also find out how to leverage Catalyst and Accelerators for efficient development. You'll get to grips with hassle-free API deployment and hosting in CloudHub 1.0/2.0, Runtime Fabric Manager, and hybrid environments and familiarize yourself with advanced operating and monitoring techniques with API Manager and Anypoint Monitoring. The final chapters will equip you with best practices for tackling complex topics and preparing for the MuleSoft Certified Platform Architect exam. By the end of this book, you’ll understand Anypoint Platform’s capabilities and be able to architect solutions that deliver the desired business outcomes.
Table of Contents (21 chapters)
close
close

Data security in motion or in transit

Data in transit or motion means transferring data from one location to another location over a network. This includes transferring information over HTTP, via emails, or collaboration platforms. Given that it is exposed while traveling across the internet or a private corporate network, this data is typically less secure than inactive data. Data in transit is, therefore, a highly vulnerable point of attack.

The following approaches can be used to protect data in transit or motion:

  • Data encryption: The most popular technique to safeguard data while it is in transit is data encryption. In addition to shielding your data from hackers, end-to-end encryption makes sure that even if it is intercepted, the recipient would be unable to decrypt it without the encryption key.
  • Virtual private network (VPN): A VPN is another popular technique to secure data as it’s sent. By using a VPN, you can establish a secure tunnel between the servers...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY