Apstrata is a Backend-as-a-Service.
Mobile and HTML5 developers can use Apstrata to create sophisticated applications without needing to deploy or manage back-end server infrastructure. Using Apstrata frees the developer to concentrate on user experience, business logic & what makes the application more competitive, while we make sure that all back-end services are running reliably, cost-effectively and scaling as your application grows.
Our web-services are usable directly by a web or mobile client application. We handle everything from user identity management, messaging, push notifications, database, content & rich-media management, full text search, social network & third party APIs integration to providing a powerful java-script container to implement your server-side business logic.
We are platform and development tool agnostic. Developers moving to Apstrata can continue using their favorite development, deployment and source code control tools.
Apstrata divides the APIs into four main features:
- Identity Management: User & group management and authentication services (read more)
- Persistence: Database and media management services (read more)
- Orchestration: Server side scripting service (read more)
- Messaging: Email and other messaging services (read more)
The advantages of apstrata are:
Instant provisioning of accounts: Create as many apstrata accounts as you need, every single feature is available in a secure environment instantaneously. This is great advantage for companies such as agencies who are looking to replicate an application to multiple customers.
High-availability: The developer doesn't have to worry about making everything work, we do.
Simple REST web-services: Easy to learn REST compliant web-services that can be invoked from cross domain web, mobile, desktop and embedded applications.
Apstrata APIs are accessible through a highly secure multi-layer approach:
Transport: Through 128bit HTTPS encryption
Request: Through a signing mechanism, only requests signed with appropriate credentials are allowed to reach the requested services.
Application: All APIs provide granular ACL level security to manage access to data and resources.