Wallarm Demo: Shadow API Detection

Find APIs Hiding in the Shadows

What’s hiding in the shadows?  It’s a well understood reality that unmanaged IT assets tend to be unmonitored IT assets, and that both introduce risk. Whether it’s a forgotten about application, or ...
Salt Security APIs, organizations, Open APIs API CIS COVID-19 cybersecurity

Enterprises Fear Continued API Sprawl, Security Weaknesses

There’s no doubt that APIs enable developers to better customize their applications. Yet the continued growth and success of APIs as the glue that holds together digital transformation is proving to increase ...
Security Boulevard
Unified API Protection

API Protection and Cloud-native Application Protection Platforms (CNAPP)

Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems ...
Unified API Protection

API Protection and Cloud-native Application Protection Platforms (CNAPP)

Security Solutions for APIs and Cloud Applications Organizations have gained many benefits by developing applications in the cloud that include flexibility, agility, scalability, and speed – but it’s also created security problems ...
UAP dashboard - retail API security

Credential Stuffing Attack Prevention Saves $1.6M

In another example of pandemic influenced actions, the largest Canadian pizza chain was targeted by a credential stuffing attack that was successfully mitigated resulting in a $1.6M savings. Most people would not ...
API Sentinel 2 minute Demo Video

Unified API Protection for Telcos and Mobile Carriers – Time to Value

Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...
API Sentinel 2 minute Demo Video

Unified API Protection for Telcos and Mobile Carriers – Time to Value

Largest Mobile Carrier Identified 4,600 APIs in Days, not Weeks, or Months The security team at the nation’s largest mobile carrier had a problem trying to obtain a consistent and complete inventory ...
Mergers and Acquisitions in API Security and Bot Management

Mergers and Acquisitions in API Security and Bot Management

Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) ...
Mergers and Acquisitions in API Security and Bot Management

Mergers and Acquisitions in API Security and Bot Management

Continued Consolidation in API Security and Bot Management – A Need for Unified API Protection As we have seen of late, in attempts to offer end-to-end application protection, web application firewall (WAF) ...
Taking charge of the API security lifecycle

Taking charge of the API security lifecycle

This article was originally published on Cyber Protection Magazine To ensure the seamless experience today’s customers expect, modern enterprises have become proficient API machines to create the seamless experience customers expect. APIs ...