LXR Cloud

Cloud Solutions for API Management, Security & Deployment

LXR Cloud provides cost-effective alternatives for API Gateway and API Management solutions.

Open-Source versions of Nginx & Kong & are packaged with LXR tools for OAuth/JWT, DevPortal, and resuable deployment patterns.

LXR iSign
OAuth/JWT Management & Authentication

Data Security

Instantly add scoped authentication, authorisation, and user management to secure your web or mobile apps

LXR iSign is a complete system for companies not implementing a full API Gateway, but who still need to add secure authentication, authorisation, and user management to apps and APi’s.

Learn More

LXR Patterns
ReUsable Infrastructure Patterns

Data Security

Improve Security & Save Deployment Costs with ReUsable Infrastructure Patterns for API Deployment

LXR Patterns are a set of pre-defined security mediation and infrastructure patterns. Used for common digital integration scenarios such as OpenBanking, PSD2, Industry 4.0, Acord etc.

Learn More

LXR iScan
Scan for Sensitive Data on IBM i

Data Security

LXR iScan helps secure the data that powers your business by uncovering exactly where it is, before anyone else does

LXR iScan is a data-pattern discovery tool for IBMi databases and IFS folders. LXR iScan scans storage media for credit card numbers or other sensitive data covered by regulatory compliance audits.

Learn More
Based on Bootstrap 3.2

LXR iSign
OAuth/JWT Management & Authentication

Instantly add scoped authentication, authorisation, and user management to secure your web or mobile apps

LXR iSign is a complete system for companies not implementing a full API Gateway, but who still need to add ultra-secure authentication, authorisation, and user management to their web, mobile apps, and APi’s.

Use LXR iSign in any combination of private cloud, public cloud, SaaS or API based implementations.

Highly flexible with fine and course grained authorisation and validation, LXR implements open standards such as OAuth2.0 and uses MD5 RIPEMD160 or SHA2 512 encryption.

LXR iSign integrates seamlessly with LXR iCore to allow for the complete cycle of development, deployment and securing of IBMi API's


LXR Digital Security Patterns

LXR Patterns are a set of pre-defined security mediation and infrastructure patterns. Used for common digital integration scenarios such as OpenBanking, PSD2, Industry 4.0, Acord etc.

Use these security patterns for rapid, and repeatable REST and SOAP-based API deployments of secure API’s and their related services.

Reusable patterns ensure more secure & consistent deployments for Single-Sign-On, OpenBaking JWT authorisation and other types of authenticated services such as:

  • Microsoft Active Directory / LDAP Delegation Implementation
  • SPNEGO, KERBEROS
  • ICRX Tokens
  • SSL/TLS
  • RACF Passkey Tokens and more
Extensive documentation

LXR iScan - Search & Secure PCI (Sensitive) Data

IBM's QRadar and Guardium Security and Privacy tools are combined with ThoughtMakers XRAY, for an end-to-end data security solution.

The combined solution helps classify and secure data across multiple industries, both proactively and real-time.

Key Features

  • Provides near real-time visibility for threat detection
  • Enables more effective threat management
  • Delivers security intelligence in cloud environments.
  • Detailed data access and user activity reports for compliance.
  • Transparent, rapid implementation
  • Centralized key and policy management
  • Compliance-ready capabilities-such as the Health Insurance Portability and Accountability Act (HIPAA) and PCI Data Security Standard (PCI DSS).
  • Research unstructured data patterns in all data forms and places
  • Reduces and prioritizes alerts

Secure The Data That Powers Your Business

ThoughtMakers XRay software is a data-pattern discovery tool. XRay scans storage media for specific data patterns, for data relating to credit card numbers or other sensitive data for POPI PCI-DSS type audits. XRay integrates with Guardium/QRadar to log activities and offer real time alerts on security issues.

Our solution helps clients support a full range of use cases – compliance initiatives, privacy initiatives, big data security projects, and projects to outthink insiders all the way through comprehensive data protection.

Analyze your data risk:

  • Discover and classify sensitive data – and uncover compliance risks – automatically
  • Know who is accessing data, spot anomalies, and stop data loss with data activity monitoring across files, databases, Hadoop distributions, NoSQL platforms, and more
  • Analyze data usage patterns to rapidly uncover and remediate risks with advanced, automated analytics and machine learning such as outlier detection
  • A Threat Diagnostic Center scans and analyzes audited data to detect symptoms that may indicate a database attack underway – from the inside or from the outside – such as detecting SQL injections and malicious stored procedures
  • A dynamic Data Protection Dashboard centralizes key indicators of data and data repository risk mitigation and compliance progress for key stakeholders, so they can see the data security heartbeat of the organization and act appropriately.

Protect your critical data:

  • Shield the business from liability with automated data compliance and extensive audit capabilities for data at rest and data in motion
  • Protect critical data through encryption, masking, redaction, and dynamic blocking and alerting
  • Alert or block elicit internal & external data and file access with real-time response, including identifying abnormal or suspicious behavior..

Seamlessly adapt your data security to changes in your environment

  • Support traditional and new data technologies - such as Hadoop, noSQL and Cloud
  • Support your entire data protection journey – from compliance to end-to-end data protection with the same infrastructure and approach
  • Reduce costs and improve results using a single data protection infrastructure for your entire environment