Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Taking a look at today's API management services and strategies
Definition

API management platform

Contributor(s): Matthew Haughn

An API management platform is a tool that acts as a proxy for customer requests to protect the back end of an online service from being brought down from too many queries. API programmers use API management platforms to ensure customers don't intentionally or unintentionally take down services by sending too many queries to the back-end server.

An API management platform limits the number of queries for each customer per second or per day. The platform does this by relaying requests between customers, consuming applications or partners and the API. This stops users from making more requests than the API can handle and creating what is effectively a DoS (denial of services) attack, whether intentional or not. A user will at most be able to bring down the API management platform, leaving the API still standing.

Generally API management platforms include analytics and usage reporting, API key and authorization management, live updated documentation, developer community management and billing and payment management. Popular API management platforms include Mashery, Apigee, 3 Scale and Layer 7.

This was last updated in June 2018

Continue Reading About API management platform

Dig Deeper on Software development

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Why only those API Managements were included? What ab. AgamaAPI or other smaller from Europe?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

SearchStorage

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close