MuleSoft MCP Support: Writing Secure MCP Clients

We previously discussed creating secure MCP servers using the MCP Connector. Now, let’s shift our focus to using Mule as an MCP client. What is the MCP Client? MCP is gaining incredible traction in the market. https://mcpservers.org/ has a large, growing list of MCP servers already implemented and ready to use. Enter the MCP Client: […]

MuleSoft MCP Support: Model Context Protocol Server Security

MuleSoft’s new Model Context Protocol (MCP) Connector enables Mule as an MCP server. We’ve previously discussed what MCP is and how to build your first MCP server. With this knowledge, we now need to think about MCP server security and why it’s necessary. Why is MCP server security important? Access to critical resources inherently introduces […]

MuleSoft MCP Support: Get Started With Model Context Protocol

MuleSoft’s Anypoint Platform now supports Model Context Protocol (MCP), enabling organizations to seamlessly connect AI agents to enterprise systems and data, accelerating their journey to AI readiness. Understanding Model Context Protocol (MCP) Model Context Protocol (MCP) is an open protocol that enables seamless integration between LLM applications and external data sources and tools.  MCP is […]

How to Get Started With Anypoint Managed Flex Gateway

In June 2022, MuleSoft launched Anypoint Flex Gateway, an ultrafast API Gateway to protect and manage any API. Flex Gateway is an envoy-based gateway and supports multiple deployment options like Kubernetes-based target environments, IBM Power, Heroku, and on-premise.  This self-managed and distributed API Gateway coupled with MuleSoft’s centralized control plane, Anypoint API Manager, provides a […]

Ensuring Security and Data Privacy in MuleSoft Intelligent Document Processing 

At MuleSoft, we recognize the critical importance of safeguarding your data. MuleSoft Intelligent Document Processing is meticulously crafted with robust security measures to ensure the protection of your sensitive customer information. We prioritize your data’s security by minimizing our interaction with it and creating a secure environment where you can confidently manage and manipulate sensitive […]