Thinking from IntraLinks Integration Technology One Size Does Not Fit All: A Closer Look at Enterprise Application Integration Technology To fully enable true, enterprise-wide collaboration, businesses require seamless connection of numerous and diverse systems, information and processes. The critical systems that run an enterprise must also integrate with those of their customers, suppliers and trading partners to enable quick adaptation while maintaining and even improving the quality of existing services. By using a flexible integration approach to link these systems, organizations can help their employees be more productive, make the enterprise more accessible to customers and enable secure and prompt information sharing with suppliers and partners. This white paper discusses the driving forces that have made enterprise application integration so critical, reviews available integration approaches and outlines areas of consideration when selecting the best methodology for individual enterprise requirements. This paper will also review IntraLinks’ flexible integration solutions for uniting dissimilar enterprise systems. 1 866 INTRALINKS New York + 1 212 342 7684 London + 44 (0) 20 7549 5200 Hong Kong + 852 3101 7022 www.intralinks.com Thinking from IntraLinks “As organizations increasingly view information-related capabilities as mission-critical parts of the IT landscape, they are moving toward an ‘information infrastructure’ that provides data consistency and interoperability across enterprise applications.” — Eric Thoo et. al. Hype Cycle for Data Management, 2008, Gartner, July 9, 2008 Why Integration Matters Today organizations struggle to become more agile in a market place that is more competitive, faster and has fewer geographical and time zone boundaries than a decade ago. Access to consistent, timely and integrated business intelligence is vital for companies to understand and support this rapidly changing environment. To keep pace with the speed of business, enterprises must enable all applications to communicate with each other — regardless of programming languages, system platforms, programming models, protocols or data formats. This can be an arduous task as most modern businesses support numerous applications, both purchased and built. A 2008 study indicates that companies support anywhere from six to more than 100 applications depending on the size and type of business. With the appropriate integration method, an enterprise can easily unite its disparate systems in order to share large amounts of information inside and outside the organization, automate and manage endto-end business processes and workflow and foster cross-organizational collaboration and community development. Three key drivers for supporting enterprise-wide integration are improved information agility, IT responsiveness and cost and risk reduction. Information Agility Being able to more quickly adapt to industry changes and outmaneuver competitors has tremendous strategic significance. Leveraging the business logic from multiple applications can be a fast and highly efficient way to foster business agility and deliver new business capabilities. Through application integration, heterogeneous data sources across the enterprise can be united for faster access to critical information. An organization can in turn identify and respond more quickly to internal and external events. In addition, integrating critical systems that run a business with those of customers, suppliers and trading partners improves service quality and maintains a competitive advantage. IT Responsiveness The ability to react to changing business objectives hinges upon an IT infrastructure that can respond in kind. Too often an IT department can be perceived as a bottleneck, hampering desired responsiveness by requiring too much time or too many resources to fulfill new or changing business requirements. The integration of existing applications and business processes provides IT organizations with new capabilities for meeting business requirements and adding strategic value. Cost and Risk Reduction In the current economic climate, IT and business decision makers are searching for ways to make their enterprise more efficient without huge investments. The pursuit of this efficiency naturally leads to tough questions about application consolidation and many decision makers are asking what to do about packaged and legacy systems. Is it better to replace them and start from scratch? Or can we get more value and efficiency from what is already in place? With the right integration approach, reusing existing applications and enterprise systems can help speed process deployment and create a nimble, efficient and successful business. Integration can also eliminate the manual steps that users employ to move information between disconnected systems and thereby ensure that all compliance and security standards are met by well-defined processes that can run on regular intervals. Integrated services can be reused across the enterprise — individually or in combination with one another — to hasten development at a lower cost and with less risk to the organization. 2 Integration Technology Deciding on an Integration Approach Most companies have an environment of disparate legacy systems, applications, processes, and data sources, which typically interact by a maze of interconnections that are poorly documented and expensive to maintain. Additional problems arise from market consolidation in the digital age, where mergers and acquisitions of companies can increase the complexity of system integration exponentially. The segmentation of information systems was exacerbated with the introduction of commercial offthe-shelf applications such as enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM) and portals. Early on, these systems were designed as selfcontained “black-boxes” with little or no means for accessing internal data or processes. Although many of these applications now provide better access to their underlying data and business logic, integrating them with other systems in the enterprise is still a challenge. Furthermore, and especially in today’s economic environment, businesses are turning to cloudbased SaaS solutions to reduce capital expenses, to speed time to value and to minimize the use of essential internal resources on non-core activities. With this increasing use of cloud-based services, there is also greater need for integration with both on-premise solutions and other SaaS services. A critical challenge for organizations is deciding what type of integration approach to utilize. An enterprise has several choices for integration including: • Building a custom-code solution utilizing internal resources • Building a custom-code solution with system integrators, based on a vendor’s Application Programming Interfaces (APIs) • Purchasing pre-packaged integrations from vendors Building an In-House Custom Solution When a specific function is needed between applications, custom code can be the most expedient option to meet a tight deadline. It is typically designed and implemented solely for the purpose of directly integrating two specific systems. The approach can be tailored to the exact business need of the organization but does require significant investment in internal resources or contracted developers to build and maintain the integration. Building a Custom Solution with APIs Organizations often rely on others to perform functions they may not be able or permitted to do themselves, such as packaging and shipping finished products. To do this correctly, complex instructions and request processes are needed. Similarly, virtually all software has to request other software to perform tasks. To accomplish this, the asking program uses a set of standardized requests or APIs, which have been defined for the program being called upon. In essence, a program’s APIs define the proper method for a developer to request services from that program. Developers can make requests by including calls within the code of their applications. By providing a means for requesting program services, APIs are said to grant access to or open an application. Purchasing Out-of-the-Box Integrations Traditionally, any application wanting to use other systems’ services would need to do so via the provided APIs. However, with many off-the-shelf packages this was not possible, or with some legacy applications it was extremely difficult. To help in these situations, integration firms began developing a series of pre-packaged integrations to provide an interface for specific applications or groups of applications in a non-invasive fashion. By providing a simple, easy-to-use integration tool that would hide all the network complexities from application programmers, these integration packages made it easier and faster to write external 3 Benefits of Integration •Increased employee productivity •More efficient sharing of information with suppliers and partners •Faster response to customer requirements •Making the enterprise more accessible to customers •More effective integration, automation and management of end-to-end processes •Eliminate manual steps to ensure that project timelines are not missed due to user errors or training needs •Reduced maintenance time and costs •Sharing data intelligently between dissimilar applications across an enterprise Thinking from IntraLinks functions into application programs. Packaged connectors were also designed to integrate business systems with popular Enterprise Resource Planning (ERP) and Customer Relationship Management (CRM) products to help speed time to market and reduce costs. And because these packages were made available on multiple platforms, they also simplified cross-platform communications. Deciding to Build Versus Buy While the custom code approach appears easy, it can end up being a complex endeavor. As custom code is typically rigid and inflexible, companies often suffer the pains of debugging and maintaining their integration code as their business environments became more dynamic and expand. Although initially a custom solution may have been more cost effective, over the long term such an approach often requires ongoing maintenance from programmers with specialized skills; resources many IT organizations lack. API-based integration does give complete control over system behavior, but this involves highly specialized programming skills which are often quite different on each platform. The APIs are often complex at best and plenty of exception handling and recovery logic is required in the code if there is to be any degree of success. Such integrations can be exceedingly expensive to build and sometimes take so long to implement that the business benefits often come far too late to justify the effort. Pre-packaged integration solutions can help to rapidly streamline business processes, regardless of whether they cross functional boundaries within an enterprise or extend to systems along its value chain. Using these connectors can help improve operational efficiency, increase responsiveness to competitive pressures and save time and money. Unfortunately, pre-packaged solutions are not available for every application an organization may rely on. New Technology Considerations While SaaS and Cloud-based computing initiatives bring real advantage to today’s organizations, they do add complexity to the integration effort. Although major vendors have pledged to maintain open standards to enable data portability (to avoid vendor lock in), there is a risk that data will not move easily between vendors. Some enterprises may opt to utilize pre-integrated suites from one vendor, which rely on a “core” to provide integration for products from the vendor and its partners. This causes a distinct disadvantage by locking customers into a particular environment and limiting the ability to utilize innovative new technologies. The use of middleware, such as application integration platforms, as well as systems that leverage web services are approaches that have gained popularity in recent years. With either approach there are challenges with security, data models, business processes and workflow. Application Integration Platforms The goal of an application integration platform is to create an environment in which an enterprise can: • Ensure that information in multiple systems is kept consistent • Ensure that integrated applications are using the same datasets and can share information • Integrate all types of applications (independent from platform, programming language or resource) so they are bound together in workflows and processes • Account for security considerations so that, for example, data is shared only with the appropriate resources Best-of-breed integration solutions offer more than just the transformation of data between two different formats. Workflow, which encompasses the end-to-end series of steps needed to automate a business process, is mandatory to ensure the complete automation of complex business processes. Secure and reliable communication, content-based routing, business logic rules handling, data transformation, cleansing and validation are all examples of real-world requirements to address otherwise manual tasks. Web Services Web services are most often “web APIs” that can be accessed over a network such as the Internet and are executed on a remote system hosting the requested services. Two of the most common web service methodologies being utilized are Extensible Markup Language (XML) messages that abide by the Simple Object Access Protocol (SOAP) standard and Representational State Transfer (REST) which is a style of software architecture for distributed hypermedia systems such as the World Wide Web. 4 Integration Technology The SOAP standard is typically used for exchanging structured data. REST web services are recently capturing more recognition as they are often better integrated with HTTP and web browsers than SOAP-based services. A RESTful architecture consists of client systems which initiate requests to servers, and servers which then process the requests and return suitable responses. The scalability of component interactions, simplification of interfaces, autonomous deployment of components, and the utilization of components for reducing latency, enforcing security and including legacy systems are the primary goals of REST-style architecture. REST web services are recently capturing more recognition as they are often better integrated with HTTP and web browsers than SOAP-based services. RESTful architecture consists of client systems which initiate requests to servers, and servers which then process the requests and return suitable responses. The scalability of component interactions, simplification of interfaces, autonomous deployment of components, and the utilization of components for reducing latency, enforcing security and including legacy systems are the primary goals of REST-style architecture. Integration Security Enterprise integration raises concerns about security. The introduction of new technology within an organization presents new risks not present in older legacy systems, which have a defined set of users accessing information in a controlled office space. In the context of distributed and integrated systems, applications alone can no longer be in charge of security, and security models cannot be hard-coded into applications. This complexity dictates additional requirements be met in order to have a secure, integrated environment. • Privacy, confidentiality and compliance: A requirement that private or confidential information will not be disclosed to unauthorized individuals. • Data, system and application integrity: Data integrity is a requirement that information and programs are changed only in a specified and authorized manner. System integrity and application integrity are requirements that a system or application performs its intended functions in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation. • System availability: An assurance that a system works promptly and service is not denied to the authorized users. • User authorization: A security concept where access to resources is allowed to only those who are permitted to use them. This is termed as access control and is usually determined by finding out if a person is a member of a particular privileged group. • User authentication: The process of establishing or confirming the identity of a user. This usually involves a username and password combination, but can also include other methods of demonstrating identity such as a smart card or use of biometrics techniques such as fingerprint reading or retina scanning. Identity Management It is not uncommon for employees to have dozens of IDs and passwords to remember in order to accomplish their daily tasks. This can lead to a phenomenon called password fatigue which may encourage people to adopt habits that reduce the security of their protected information. For example, users might use the same password for several different systems, deliberately choose easy to remember passwords that are vulnerable to cracking, or rely on written records of their passwords. As a result, Single Sign-On (SSO) technologies have grown in popularity. With SSO, a user logs in once and gains access to all systems without being prompted to log in again at each. But today’s businesses rely upon SaaS applications such as CRM systems, supply chain management systems, payroll and expense reporting tools and human resource management systems that live outside their firewall and that often have separate identity management requirements. Internal SSO solutions were not designed to be used in a cloud-based computing environment with one organization managing user’s identities and another managing the systems and applications. IT attempts to extend internal SSO systems to external systems have led to the development of Internet SSO (ISSO), which is single sign-on that works across the Internet. ISSO allows users with Web browsers to securely and easily access multiple Web applications while only logging in once, even though the applications are most likely managed by different organizations. ISSO depends upon federated identity management standards such as the XML - based Security Assertion Markup Language (SAML). A SAML implementation can support ISSO connections with many different systems both inside and outside the corporate firewall. One Size Does Not Fit All Today’s decision makers are demanding that their enterprise run faster and more efficiently, while also avoiding huge investments. They look to IT to provide strategic value through new applications with flexibility and in record time. In the world of application integration, though, there is no “one size fits all” solution. In choosing an integration strategy, enterprises must be acutely aware of the repercussions of the path chosen, as a poor choice could result in the continual depletion of valuable IT resources and exponential costs to the enterprise. 5 Thinking from IntraLinks IntraLinks Integration Strategy IntraLinks understands that different organizations have different needs and as such offers a number of complementary integration technologies. These varied integration offerings give IntraLinks customers the opportunity to choose the best fit for each of their integration requirements. IntraLinks integration capabilities enable enterprises to: • Easily create and deploy customized business applications • Connect and directly integrate IntraLinks with existing enterprise solutions • Manage workflow and information exchange between systems With IntraLinks Integration, enterprises can reduce the effort and cost required to implement new capabilities and accelerate the rate at which business benefits are realized. • IntraLinks APIs offer a simple way to exchange requests and data between the IntraLinks platform and the enterprise business systems. Developed using a RESTful architecture, IntraLinks APIs are web services ready and used extensively by IntraLinks development teams to create applications. Developers will benefit from a broad set of functionality and a comprehensive API map to manage and control content, users, sessions and system administration within their own custom applications. • IntraLinks Adapters quickly and seamlessly connect virtually any set of information assets. These comprehensive adapters enable data integration requirements to be addressed, while eliminating the need for hand coding and shielding developers from the underlying complexities that often exist in both the out-of-the-box solutions and proprietary systems. The IntraLinks adapters use a client-side .NET application that utilizes XML - based file messaging to enable communications between IntraLinks and external systems. The IntraLinks portfolio of adapters includes pre-packaged functionality for contact management, file management and basic system configuration. • IntraLinks Connectors are pre-built components that quickly connect and integrate IntraLinks with the APIs of other enterprise software systems. Supporting both cross-industry and industry-specific connectivity, the connectors help maximize any investment made in leading packaged applications by extending their access beyond the enterprise firewall to external customers and partners. IntraLinks connectors enable quick and easy maximization of existing software investments. Packaged services include file transfer, permissioning, reporting and workflow. APIs Adapters Connectors Description RESTful API set for custom integration Configurable tool enabled integration via standard input / output (XML) Out-of-the-box integration capabilities for specific enterprise software systems Offerings API and Documentation, Test Environment Upload, Download, Contact and Exchange Management IntraLinks Connector for SharePoint Ideal Customer Clients with development expertise to build their own application Clients with some technical expertise to match XML formats for functional integration Clients with integration needs for specific applications and with relatively little technical expertise Additionally, IntraLinks supports a SAML - based federated identity management system. The IntraLinks ISSO framework increases security by reducing the number of user IDs/passwords needed for external systems, simplifies usability and streamlines user access to IntraLinks with seamless access from an internal portal or Windows login. Some specific benefits include: • Reducing password fatigue from different user ID & password combinations • Reducing time spent re-entering passwords for the same identity • Reducing IT costs due to lower number of IT help desk calls about passwords • Security on all levels of entry/exit/access to systems without the inconvenience of re-prompting users • Centralized reporting for compliance adherence IntraLinks Integration solutions can help enterprises address their application and process integration challenges, while supporting the business strategy and enabling a more competitive market position. These solutions enable quick and easy creation of integrated processes that exchange information between applications such as ERP and CRM programs, while automating and managing end-to-end processes more effectively. The result is a significant decrease in maintenance time and costs. IntraLinks Integration solutions support a full range of integration scenarios by enabling both the external access of enterprise data, as well as the notification of events occurring within applications. 6 Integration Technology Conclusion For most companies, today’s competitive and rapidly changing business environment mandates the ability to automate and manage business processes and workflow, connect content management systems and enable cross-organizational collaboration with customers, suppliers and partners. The success of this depends largely on the ability of the IT infrastructure to leverage existing applications and infuse business processes with new capabilities. The best methodology is to integrate diverse business systems and enable all applications to communicate with each other regardless of programming languages, platforms, protocols or data formats. Although there are numerous approaches to integrate systems, there can be no “one size fits all” answer. As such, companies must source a variable integration solution, such as IntraLinks Integration, that will meet their varied requirements and seamlessly unite systems across the enterprise and externally. 7 About IntraLinks For more than a decade, IntraLinks’ enterprise-wide solutions have been facilitating the secure, compliant and auditable exchange of critical information, collaboration and workflow management inside and outside the enterprise. For simplifying business processes such as board of director communications, post-merger integration, acquisition management, corporate finance and legal matter management, the IntraLinks platform can help improve operational efficiency and reduce time and costs while adding increased security and control to processes. More than 750,000 users across 90,000 organizations around the world rely on IntraLinks, including 50 of the 50 top global banks, 10 of the top 10 life sciences companies, 25 of the top 25 law firms, and 14 of the 15 largest private equity firms. To learn how IntraLinks can transform your business, visit www.intralinks.com or contact us at: Tel: 866 INTRALINKS (USA) Tel: + 44 (0) 20 7549 5200 (EMEA) Tel: + 852 3101 7022 (APAC) [email protected] Terms of Use Although IntraLinks has made every effort to provide accurate information in this document, IntraLinks makes no representations as to, and does not warrant, the accuracy and/or completeness of the information herein or its suitability for any particular purpose. The reader assumes all risk and responsibility for his or her reliance on, or use of, any of the material contained in this document. ALL INFORMATION IS PRESENTED “AS-IS,” AND INTRALINKS DISCLAIMS ALL EXPRESS OR IMPLIED WARRANTIES AND CONDITIONS WITH REGARD TO THE INFORMATION, INCLUDING THE IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NONINFRINGEMENT. IN NO EVENT SHALL INTRALINKS BE LIABLE FOR ANY DAMAGES WHATSOEVER, INCLUDING BUT NOT LIMITED TO DIRECT, INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES, INCLUDING WITHOUT LIMITATION LOST REVENUES OR LOST PROFITS, THAT MAY RESULT FROM THE USE OF THIS DOCUMENT. 1 866 INTRALINKS New York + 1 212 342 7684 London + 44 (0) 20 7549 5200 Hong Kong + 852 3101 7022 www.intralinks.com © 2010 IntraLinks, Inc. All rights reserved. IntraLinks and the IntraLinks logo are registered trademarks of IntraLinks, Inc. in the United States and/or other countries.
© Copyright 2026 Paperzz