Virtual Graffiti Australia Pty Ltd - Your Source for Technology, Security & Networking Solutions
Cequence Security

Cequence Unified API Protection

Eliminate API risk at every phase of your API protection lifecycle by improving discovery, detection and defense while reducing cost, minimizing non-compliance, fraud, business abuse and data losses.


Business value protected:

$9T

Daily API calls
secured::

6B

User accounts safeguarded:

2B

Proactively, predictively protect billions of API calls per day.

End-to-End API Protection

Attack Surface Discovery

Discover what your attackers see without any agents or software to deploy, and prioritize issues by severity of discovered risks.

API Inventory & Risk Assessment

Create a real-time inventory of your managed and unmanaged APIs. Uncover and remediate those that may be exposing sensitive data, not following specification definitions, or failing to use authentication best practices.

API Compliance Assessment & Remediation

Ensure adherence to security and governance best practices and standards by providing compliance assessment and remediation.

Attack Detection

Hundreds of predefined behavioral fingerprints, rules, and machine learning models (leveraging the largest threat intelligence database on the market) provide high-efficacy detection of automated attacks and exploits such as those defined by OWASP.

Prevention & Native Mitigations

Native, real-time attack responses eliminate the need to signal external security devices such as a WAF. Choose from multiple response options configurable on a per-policy or per-API or app basis.

API Security Testing

Leverage the most up to date attack surface views, plus use predefined API-specific tests based on OWASP threat definitions and advanced techniques to find and fix vulnerabilities during pre-production.

API Security and Unified API Protection FAQ

API security is the practice of protecting your application programming interfaces (API) from threats and vulnerability exploits that may lead to data loss, fraud, and business disruption. API security should entail three basic principles: API discovery, risk and threat detection and, remediation and mitigation of the risks and threats.

API security initiatives must begin with the discovery and inventory of all APIs managed, unmanaged, shadow, zombie, third-party, internal and external. Once the APIs are discovered and inventoried the next phase of API security can begin.

API risk and threat detection is the next phase of the API security journey. API risks are coding errors that could result in the exposure of a vulnerability. Runtime API analysis can uncover these risks. API threats are vulnerability exploits and business logic attacks. These types of attacks are difficult to detect, requiring an added level of analysis – either human, computer assisted or both.

API security entails risk remediation and threat mitigation uncovered in the detection phase. Remediation means notifying development of the risk detected and confirming the fix through continuous analysis and testing. Threat mitigation requires real-time responses without the need to signal a WAF or other tool.

Unified API Protection is the practice of protecting your application programming interfaces (API) from threats and vulnerability exploits throughout the API protection lifecycle: API discovery, inventory, risk analysis and compliance, security testing, threat detection, and threat mitigation. Unified API Protection goes beyond the using point products to address individual phases, such as compliance or testing, along with legacy security technologies to protect your APIs.

Unified API Protection begins with the discovery and inventory of all public-facing APIs along with their associated resources. Then using that inventory to continually track all APIs – managed, unmanaged, shadow, zombie, third-party, internal and external.

Unified API Protection continues with compliance, accomplished by analyzing APIs to enforce OpenAPI specification conformance, and adherence to government regulations like PCI. Compliance also entails continuous risk assessment to find coding errors quickly. Unified API Protection solutions include threat detection to find vulnerability exploits and business logic attacks.

Finally, Unified API Protection solutions also include threat mitigation and API security testing. Threat mitigation means using alerts, real-time blocking and even deception for attack response, without the need to signal third-party tools. API security testing uses API specific test cases to help security and development teams uncover and remediate errors before they become security incidents.

The types of API security solutions available can include API gateways, web application firewalls (WAF), API specific security tools and Unified API Protection. It’s important to understand how each of these tools addresses an organizations’ API security requirements, which typically entail API discovery, threat and risk detection followed by mitigation and remediation.

The first type of API security are API gateways, which are designed to aggregate and manage APIs. API gateways include basic security functions such as rate limiting and IP block lists. API gateways are unable to proactively discover APIs and do not perform threat detection, risk analysis, remediation or mitigation.

The third type of API security is an API specific toolset which focuses on helping development produce APIs with fewer errors. These tools fall short of addressing the complete set of API security requirements defined above.

The most complete type of API security is a Unified API Protection solution, complete with API discovery, threat and risk detection followed by mitigation and remediation. Unified API Protection goes beyond using point products to address individual phases, such as compliance or testing, along with legacy security technologies to protect your APIs.

Common API security risks are those defined by the Open Web Application Security Project (OWASP) API Security Top 10, business logic attacks, known informally as OWASP API 10+ and coding errors that are exploited by attackers.

Common API security defined by the OWASP API Security top 10 list include a threat definition and how to address them. Examples include sensitive data exposure, authentication errors, resource and rate limiting. A top 10 list means there are many others, so it’s important to use OWASP API Top 10 as a starting point.

A common API security risk often overlooked is business logic abuse, or attacks on perfectly coded APIs. Known informally as OWASP API 10+, this category encompasses the different ways perfectly coded APIs are attacked using techniques outside of the OWASP API Security Top 10. Examples include large scale shopping bots, enumeration attacks and account takeovers – all against properly coded APIs.

The last group of common API security risks are unknown vulnerability exploits caused by API coding errors. . This group of API security risks places significant emphasis on API testing as well as continuous threat detection and mitigation to protect the improperly coded API while a fix is rolled out.

Get an Attacker’s View into Your Organization

Datasheets:


Download the Cequence API Spartan (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


Download the Cequence API Security Testing (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


Download the Cequence API Spyder (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


Download the Cequence API Sentinel (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


Download the Cequence App Firewall (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.