How Kloudless Benefits Security Software Through the Use of Unified API CRUD Routes David Hallinan Published: March 23, 2020 *This article is part of the Kloudless Guide to Cloud Security, A comprehensive guide to all things Cloud Security in 2020 for security software of all verticals.Kloudless was built to support security software by providing features that power their businesses. Connectivity with over 100 API integrations allows software companies to use Kloudless to support and monitor all of the cloud services that their users keep data stored within. While connectivity is a major priority in protecting and monitoring this data, modern security solutions need to be able to take action once they have identified a threat or located a file they need to procure. Kloudless supports all sorts of security software, such as E-Discovery and Cloud Access Security Brokers (CASB), by offering Unified CRUD routes to collect, and then possibly remediate, the files or threats relevant to their business use-case.Unified CRUD for CASBCRUD, which stands for Create, Read, Update, and Delete, refers to routes inside of an API that corresponds to each respective verb. RESTful APIs are built with a set of each of these verbs for every object in the database. For example, in an application where users upload photos, both the User and Photo objects will have their own set of these routes to find, create, update or delete these instances from the database. Based on a system of unique identifiers, RESTful APIs are by far the most common architecture of application programming interfaces these days.Security software that needs to detect and remediate threats, like a CASB, relies on the ability to use these routes in order to properly monitor and take action against threats. In a typical scenario, a single API will offer dozens to hundreds of routes to fully interact with all of the objects in their database. A single integration requires developers to write code for accessing each of these routes, resulting in up to thousands of lines of code and hundreds of hours of development time.Kloudless offers security software a fast and easy alternative to this massive workload by providing Unified routes for every connector they offer along a single category (e.g: cloud storage, cloud calendar, cloud CRM, etc.). This means that each and every offering within Kloudless’ cloud storage integration offerings is accessed through a single set of RESTful routes. Whether looking to delete a file from Box, Google Drive, or Dropbox, a developer at a security software company can write a single block of code to point to any cloud service a user has authenticated with, vastly cutting down on the implementation time of this functionality.This allows a CASB to take action to remediate threats in a fraction of the amount of code it would take if they build their integrations in house, allowing developers to focus on their core product instead of endless API routing logic. Unified CRUD for E-DiscoveryJoe Mulenex, Director of Solution Consulting for Exterro, defines E-Discovery as “the search for facts or truth about given litigation, performed in the arena of electronically stored obligations.” Essentially, it is the procedure of preserving, collecting, reviewing, and exchanging information electronically for the purpose of using it as evidence in legal cases. This data may come in the form of emails or documents or maybe in the form of more modern electronic formats, such as social media or instant messaging logs. In the modern legal process, these types of documents and data represent the majority of correspondence relevant to an investigation. As a result, E-Discovery software is tasked with assisting legal proceedings or litigation by searching through millions of documents. This process is governed by a framework called the Electronic Discovery Reference Model (EDRM), although recent leaps in technology have consolidated the steps of EDRM into single software systems, such as Exterro.These single software systems for E-Discovery are responsible for every step of the process, from information governance to data preservation, data collection, and document review. The most time consuming of these processes is the data collection itself, which consists of combing through virtually every form of electronic data. This data might be “active,” meaning the documents are stored locally or through a network drive. However, considerably more of the data that must be collected by E-Discovery software is stored on cloud servers. As a result, E-Discovery technology solutions need to have a wide-range of API integrations with the most popular cloud services. By connecting with Kloudless, E-Discovery software can implement the ability to search through files and documents on every major cloud storage provider like Google Drive, Box, Dropbox, and more through a single Unified READ route. Discover an Easier WayIntegrations are pivotal to the modern security software solution, be it to collect vast amounts of documents like in the case of an E-Discovery application, or to find and then remediate threats like with a CASB. Kloudless provides a one-stop-shop for quickly integrating with every major cloud service available today. Beyond simply integrations, Kloudless also offers a fast approach to collecting and taking action on relevant documents and files through the use of their Unified CRUD routes which massively cut down on the engineering time needed to properly implement this functionality. To learn more about Kloudless’ Unified CRUD routes, please head over to check out our documentation, or contact firstname.lastname@example.org to set up a demo.*This article is part of the Kloudless Guide to Cloud Security, A comprehensive guide to all things Cloud Security in 2020 for security software of all verticals.