What is structured data (XML, SOAP, AMF, JSON)?

Structured data is data that is in a specific format and conforms to a predetermined schema. Unlike unstructured data, which has no set structure, structured data is organized and can be more easily processed by machines. This data is often used in communication between different systems, such as web browsers and web servers, mobile apps and servers, or between different servers.

A commonly used format for structured data is XML (Extensible Markup Language), which uses a hierarchical structure to organize and label data. SOAP (Simple Object Access Protocol) is an example of a communication protocol based on XML and used for exchanging structured data between different applications, especially in web services.

Another widely used format is JSON (JavaScript Object Notation), which provides a compact and easy-to-read syntax for exchanging structured data. JSON is often used in web-based applications and APIs because it is natively supported by JavaScript and can be easily processed by other programming languages.

Structured data plays an important role in security, especially in Web Application Firewall (WAF), as it allows traffic to be inspected for suspicious content and ensures that data follows the expected structure. This is critical to detect and neutralize attacks on web services. Validating structured data can help identify potential security vulnerabilities and prevent malicious data from entering a system.

Airlock Secure Access Hub provides structured data monitoring and validation capabilities to ensure the security of web services and applications. Find out more about the functionality of the Airlock Web Application Firewall at the following link: Airlock Secure Access Hub - Filtering.

Information for you

-Our whitepapers-

Study Application and API Security 2022

In a recent study in cooperation with CIO, CSO and COMPUTERWOCHE, Ergon Airlock looked at application and API security in the container environment.

Request study

Zero Trust is a journey

The digital transformation of the world continues to progress, and it is profoundly affecting private life and job profiles in a manner that was hard to imagine just a few years ago.

This whitepaper covers the effects of continuous digitization and its implications.

Request free of charge

Toward DevSecOps

In this whitepaper, you will learn the most important insights into how you can successfully and efficiently implement DevSecOps, which security components are required for this, and what benefits a microgateway architecture brings.

Request free of charge

Airlock 2FA - Strong Authentication. Easy.

The two-factor authentication in the area of IT security offers double the security.

Find out more about strong authentication and the possibilities that Airlock offers in our whitepaper.

Request free of charge

Further whitepapers

We provide whitepapers on these and other topics free of charge:

  • successful IAM projects
  • Compliance
  • Data protection (GDPR)
  • Introduction of PSD2
  • PCI DSS requirements
Request free of charge