Select region

Secure & connected digital transformation

Supporting your company with Security & API management,
creating the right foundation for your digital transformation

Holger Brøns Jensen
Holger Brøns Jensen
CEO, Partner
Do you have questions?

Main Benefits

  • API Gateway including multiple options of authentication plug-ins
  • Integrates with any server
  • Heavyweight functionality, lightweight implementation
  • On-site support and consulting in Nordic countries

Download Ceptor Intro

Download Paper

Why Ceptor?

Because you get heavyweight functionality with lightweight implementation - Ceptor API Management combines the robust capabilities of enterprise solutions with the agility and scalability demanded by orgs who want to move fast.

Because you get professional support on site, not through a site - Our dedicated Ceptor API Management team can be at your office on a day’s notice. We considered using chatbots, but we don’t believe in intermediaries.

Because you get to combine API Management with the best-in-class security capabilities - Start with an API gateway and include the authentication plug-ins your company needs.

API Gateway

Ceptor API Gateway is a component that exposes and protects your APIs and manages your clients’ and partners’ access to them.

Ceptor Gateway is a standards-based Reverse Proxy Server that is fully asynchronous, highly scalable and supports the latest communication protocols available. Ceptor Gateway is deployed in front of your applications, protecting them from unauthorized access and takes care of load balancing and failover, stickiness, request throttling, authentication and authorization and response compression.

Access Management

Ceptor supports virtually any kind of authentication. Multiple pluggable authentication methods can coexist, and the application can choose which ones to use. Choose your preferred plugin for one system, multiple systems or for all of your business.

Selected plug-ins with Ceptor includes:

  • Single-sign On / SAML  Web SSO
  • OpenID Connect
  • NemID
  • OAuth & OAuth 2.0
  • Kerberos

Ceptor clients include