Akamai Technologies has announced the availability of API Security, a product that stops application programming interface (API) attacks and detects business logic abuse inside APIs. In addition, Akamai’s API Security discovers, audits and monitors API activity using behavioral analytics to rapidly respond to threats and abuse.

Akamai’s stand-alone API Security solution is a result of Akamai’s acquisition of Neosec, announced in April of this year. It works with any API gateway, WAAP or cloud implementation. Akamai customers can also take advantage of edge connector, an integration that saves the time, energy, and cost of product integration with the click of a button.

The API Security product provides complete visibility into API activity, uses behavioral analytics to detect complex threats and improves detections by analyzing historical data uniquely stored in a data lake. The offering delivers API discovery, visibility and risk auditing combined with detection and response capabilities that enable full investigation and threat hunting. With API Security’s differentiating Shadow Hunt threat hunting managed service, machine learning signals are delivered to human analysts for investigation. Users can see their APIs, which means they can ensure protection by recording API activity, detecting any possible breaches and keeping customer data safe.

API Security complements Akamai’s existing App & API Protector (AAP) solution. Together, they deliver the most comprehensive global protection, combining enterprise-wide visibility, behavioral analysis of API activity and prevention of attacks and abuse. This joint strategy enables:

  • Broader discovery to see APIs on and off the Akamai content delivery network
  • Layered detections that are both signature-based and behavioral.
  • Customized responses to block threats in-line or remediate issues.
  • All of these protections benefit from easy deployment in one control center. Plus, they “check the box” on both OWASP Top 10 vulnerability lists and ensure access to API threat hunting expertise.

You may also like