{"id":1439,"date":"2005-07-12T00:00:00","date_gmt":"2005-07-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/12\/oracle-integrates-web-services-security-products\/"},"modified":"2021-12-30T11:39:23","modified_gmt":"2021-12-30T11:39:23","slug":"oracle-integrates-web-services-security-products","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/12\/oracle-integrates-web-services-security-products\/","title":{"rendered":"Oracle integrates Web services, security products"},"content":{"rendered":"<p>Oracle plans to combine two of its Web services products to make it easier for developers to set security policies for applications built using its Oracle BPEL Process Manager software, a company executive said Tuesday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because Oracle plans to combine the BPEL (Business Process Execution Language) tool with its Oracle Web Services Manager product, software developers will no longer have to spend as much time explicitly writing out security policies while using the BPEL Process Manager, said Prakash Ramamurthy, vice president of server technologies with Oracle.<\/p>\n<p>Instead of purchasing a separate Web services orchestration engine and security tool, customers will now be able to purchase a combined product, Ramamurthy said.<\/p>\n<p>Developed by the Oasis Consortium, it expected to play an increasingly important role in online commerce.<\/p>\n<p>Ramamurthy did not say when the combined product would be available or what it would cost.<\/p>\n<p>http:\/\/www.networkworld.com\/news\/2005\/071305-oracle-web-services.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1439","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1439"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1439\/revisions"}],"predecessor-version":[{"id":3926,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1439\/revisions\/3926"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}