API Security Tool Comparison Guide
API Security Tool Comparison Guide
Overview
APIs operate differently than plain web applications and present a far more complex surface area
to secure. A primary reason is that they are not just the communication path carrying the business
logic, but are often times themselves the business logic. This makes them far harder to secure, and
far more dangerous if they are exploited. This increased complexity leads us to require far more
sophistication in how we protect them. Hence, there are many capabilities to consider. We’ve broken
them down into categories that align with the areas of API security that should be considered.
API Security encompasses a wide set of needs that often fall across different roles, teams, and
products. Organizing the API security requirements into value-based categories helps to keep the
conversation focused on what value each category provides its users.
API Discovery
Discover API Endpoints in the system - Discovery of all API endpoints in your application
landscape. Enables users to be aware of their full exposure and all potential areas of
risk.
Understand queries, parameters, and attributes of the API - Capture details about
queries, parameters, and attributes of all the API endpoints. Enables users to fully
understand API structure and areas of risk. Enables deeper and more thorough
detection of malicious payloads.
Interpret REST, SOAP, gRPC, and GraphQL protocols - Interpret REST, SOAP, gRPC, and
GraphQL protocols. Enables the ability to detect anomalies and malicious behavior
using the most highly used API protocols.
Discovery of 3rd party API use and configuration - Discovery of 3rd party API use and
configuration. Enables secure connections to and from 3rd party APIs. Important because
3rd party APIs are inherently riskier due to lack of ownership and less visibility.
Identify API changes and versions - Identify changes in API definition, configuration, and
versions. Alerts users to important changes which might affect the security of the API.
Discover & visualization of API dependencies - Provides a live view of API requests, and
data flow between services across your entire application environment.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Discovery of sensitive data in the APIs - Discovery of sensitive data in the APIs like credit
card numbers, billing information, etc
Discovery of sensitive data flows - The ability to show what API endpoints sensitive data is
going through, from the data perspective.
Flagging shadow, zombie, and orphaned endpoints - Alerting on the discovery of APIs
that live outside the normal IT governance management and security processes, APIs
that were previously valid and approved but eventually abandoned or replaced
Ability to create collections and apply policies to them - The ability to create collections
and apply policies to them. Collections can consist of APIs, services, applications, etc.
Enables more efficient policy setting and abstracted views for better understanding.
Ability to manually flag high-risk factors in API endpoints - A per endpoint calculated
risk score.It should be based on the likelihood of a breach and impact of a breach.
Enables prioritization of mitigations and should roll up to services and applications.
Automated risk scoring for API Endpoints - Ability to calculate risk score, without any
manual interventions. It should be based on likelihood of a breach and the impact
of a breach. Enables prioritization of mitigations and should roll-up to services and
applications
Automatically generate and download OpenAPI spec from runtime - Ability to generate
an OpenAPI Specification compliant representation of all APIs seen in runtime, and
download the spec for documentation and future use.
Per API endpoint vulnerability identification - Scan, detect, and display, for each endpoint,
all vulnerabilities that are found in each API endpoint being used at runtime. Helps with risk
assessment.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Runtime Protection
Correlate threat actor (user) activity despite evasion tactics - Ability to continuously
track and correlate threat actor (user) activity across multiple transactions over time
despite changes to IPs, sessions, and tokens.
Automatically track the threat level of each user - Automated tracking of each user
threat level based on their activity over time. This is the measure that turns users into
threat actors. Can be used to determine user blocking.
Pre-attack threat actor Identification - Idenify threat actors by their malicious, anomalous
activity which is often reconnaissance and prelude to an attack. Requires accurate user
activity storylining.
Detect and block OWASP Top 10 events - A holistic API security solution should be able
to detect and block the top vulnerabilities identified in the OWASP Top 10 (web), which
focuses on web-based vulnerabilities.
Detect and block OWASP API Top 10 events, including session-based - An effective API
security solution must be able to detect and block the top API-based vulnerabilities
identified in the OWASP API Top 10.
Detect and block newly identified CVEs - Able to detect and block recently-discovered
CVE’s to ensure quick protection from new threats. Should have at least configurable
detection to add new CVEs. Better if auto-loading at least daily.
Identify and block abnormal API behavior (user behavior) - Ability to distinguish normal
user behavior and abnormal behavior based on API consumption. And block malicious
API consumption attempts.
Identify and block abnormal API usage rates - Ability to distinguish between normal API
usage rates and abnormal usage rates and block abnormal ones.
Detect and block credential stuffing & Brute forcing (ATO attempts) - Detect and block
any automated attacks attempting to achieve an account take over (ATO) by flooding the
interface with sequences of credential guesses.
Detect and block bad bots use of the APIs - The ability to block known identified bad
bots from using the APIs of protected applications. This is distinct from detecting and
blocking general bad bot-like behavior.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Runtime Protection
Detect and block bad bots use of the APIs - The ability to block known identified bad
bots from using the APIs of protected applications. This is distinct from detecting and
blocking general bad bot-like behavior.
Detect and block application-layer denial of service (DoS) attacks - DoS and DDoS
attacks are typically volumetric attacks at the network layer, but application-layer
DoS attacks operate at the API layer, looking to disrupt proper API responses to valid
requests.
Enforce blocking in-line - Supports API security blocking directly through its own
agents or other in-line software that is part of the single platform (i.e. not 3rd party
integrations). Enables immediate blocking of attacks on detection, ensures blocking
happens as expected, and reduces the complexity of configuration and maintenance.
Enforce blocking via integrations - Supports API security blocking through integrations
with external control points, such as API Gateways, WAF, proxies, etc. Enables out-of-
band detection to inform blocking rules.
Identify APIs and services from which data is being exfiltrated - Tracks and displays API
endpoints and services that data is being exfiltrated from. Should give information to
aid in prioritization and stopping of the exfiltrations.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Flag API endpoint configurations not matching industry best practices - Compare API
endpoint configurations with industry best practices to highlight APIs which do not
follow. Eg. Sensitive data shouldn’t be passed in API URL, APIs should use encryption,
secure coding practices for API dev.
Flag API endpoint configurations not matching company policies - Compare API
endpoint configurations with company policies to highlight APIs which do not follow.
Eg. internal API calls should stay within their given geo, all authentication must happen
through Okta, etc.
White box security testing - Specific type of testing that use preserved credentials to test
use cases that require proper authentication and provides much more information on the
inner workings of their environment than it is required for a typical gray box testing..
Integration with external defect tracking - Ability to create a ticket for known
vulnerabilities and track it in your system by integration with the API Security tool.
Provide API security tests for running in CI/CD pipelines - Provide the ability to run API
security tests from pre-production CI/CD pipelines. Enables shift left testing of APIs.
Can be integrated into CI/CD pipeline to effect pipeline behavior - API Security posture
aspects (eg. risk scores, test results, usage details) can be integrated into a CI/CD pipeline
to help drive pipeline behavior.
Provide remediation guidance for developers and operations - With every vulnerability
that is found, include remediation guidance to aid developers and/or operations folks
who will be asked to fix the found issues. Because most developers are not security
experts.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Analyze the body/payloads of requests and responses - The ability to see the body/
payload content of transactions is necessary to fully track and understand attacks and/
or malicious behavior.
Identify geo-location of API calls to help with API risk assessments - Identify and assess
problematic patterns originating from known questionable geographical areas. Helps
inform API risk assessments, either manually or automatically.
API Performance metrics, call and error patterns - Visibility of the API performance
metrics, call and error patterns. Insights on the availability and performance of API, API
endpoints, and the validity of their data exchanges.
Correlate and end-to-end connect all application API transactions - Track and
correlate how API calls across the application runtime are related to each other.
Includes external and internal calls, and how they connect together. This end-to-end
transaction visiblity enables the most complete user tracking across entire sessions and
hence full incident analysis capabilities.
Deep API transaction context for API incident response and threat hunting - Collects
header and bodies of request/responses, as well as API transaction sequences of all
transactions, good and bad, to enable incident response, forensics, and threat hunting.
Share data with SIEM, SOAR, and ITSM systems - Ability to share data with SIEM, SOAR,
and ITSM systems to contribute to gaining greater overall security insights across all
security disciplines being managed.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
AI/ML based security and anomaly analysis - Because of the number and complexity
of APIs and their business logic, and the amount of data that they produce, AI/ML is
required to effectively search for malicious patterns as well as to detect new ones.
Platform backend offered as SaaS offering - The platform backend is made available
as a SaaS offering where the vendor runs and manages the back-end solution, but the
customer can still install data collectors in their datacenter or cloud.
Overall Scores
The overall percentage scores are based on the number of API Security
capabilities each solution met according to our analysis, divided by the
number of API Security capabilities (53).
The sections below provide a deeper dive into each of the above 3 solutions
based on the API Security capabilities.
APIAPI
AI Security
Security Solution
Platform Overview
Comparison Guide 2.0
Salt Security is an API security company based in Palo Alto, California. Salt Security provides an
API protection platform to prevent attacks, using machine learning and AI. Deployed in minutes, the
platform learns the granular behavior of a company’s APIs and requires minimal configuration or
customization to identify and block API attackers.
API Discovery
Discover all API Endpoints in the system
Auto grouping of discovered APIs into service/application collections
Understand queries, parameters and attributes of the API
Interpret REST, SOAP, gRPC, and GraphQL protocols
Runtime Protection
Correlate threat actor (user) activity despite evasion tactics
Automatically track the threat level of each user
Runtime Protection
Detect and block application-layer denial of service (DoS) attacks
Enforce protection in heterogeneous environments
Enforce blocking in-line
Enforce blocking cia integrations
Ideally, every vendor should have API dependency mapping and related visualizations as part of
their API discovery capabilities. This capability should shed light on the data flow between services
across application environments and provide a live view of all API requests. API dependency
visualization provides actionable visibility for developers and security operation teams in Root
Cause Analysis (RCA) and faster remediation.
Auto Grouping
Automatic grouping of APIs based on application type, sensitive data, services, business group,
functional characteristics, etc. Auto grouping of APIs helps in improving the operational efficiency
of security teams. It also helps in ease of policy enforcements to achieve faster governance and
compliance objectives.
When we talk about an API what we are really talking about is the collection of endpoints that
comprise the API. A single API can have tens or even hunreds of API endpoints, each one presenting
a potential attack surface. And each endpoint will have its own characteristics which factor into how
risky it is for it to cause a breach. Given this, consider how incredibly valuable it is to not just have an
inventory of all your APIs, but also some way to prioritize them according to how much risk they pose
to your application security. An overall API security posture rating for the whole set of APIs which
rolls up a score based the total number of vulnerabilities will not be granular enough to focus team
efforts. To quickly identify the top risky API endpoints from the potentially hundreds or thousands
that will likely be in your inventory it’s important to have a per endpoint risk score.
Additionally, the factors that should be included in the risk score analysis will constantly be changing
across the set of API endpoints. This means that the risk score really needs to be automatically and
continuously calculated to give up to date assessments. When looking at API endpoint risk scoring
solutions, make sure that the scores can be calculated automatically, as manual risk tracking will
quickly become stale.
API Security Solution
Comparison Guide 2.0
Runtime Protection
Business Logic attacks like BOLA attacks can cause several breaches like data exfiltration, full
account takeover, etc. The Open Web Application Security Project (OWASP) API Top 10 list and
OWAS Web Top 10 list provides guidance on the most critical API and web application vulnerabilities
that organizations should try to recognize and remediate. Four of the top five OWASP API Top ten
vulnerabilities are related to business logic flaws, and it underscores the fact that business logic
vulnerabilities are your top API security risk.
Bad bots, designed to execute malicious attacks on APIs to cause a wide range of data theft and
fraud, are another API security threat on the rise. These bad bots should be detected and blocked at
all times.
Perimeter solutions may detect and block the most common API threats, but they are not effective
against sophisticated API attacks that include different IP addresses, tokens, session IDs, and time
periods. Behavioral analytics-based solutions examine API usage, track API consumers, identify
normal and abnormal behaviors, and provide actionable business context.
Consider a solution’s coverage of the OWASP API Top 10 list, OWASP Web Top 10 list, bad bot
management, and behavioral analytics capabilities. These critical elements help the operations and
security operations teams provide comprehensive API runtime protection.
Data Exfiltration
As illustrated under the “run time protection” section, there are many ways that APIs can be abused
to exfiltrate your sensitive data. Visibility into from which API endpoints and services data are being
exfiltrated enables decisive quick action to stop the exfiltrations. Being able to see exactly which
sensitive data is being stolen, through which services and API endpoints, by which users, and from
what geographies, can aid in prioritization and efficiency in remediation or mitigation. Consider the
importance of having these insights available when protecting your data from exfiltration.
API Security Solution
Comparison Guide 2.0
In-Line Blocking
API Security solutions should be flexible in how they can be deployed and how they can protect
applications. Being able to get started with an out-of-band only solution is a great option to start
getting an inventory of all your APIs, and to enable deeper visibility, all with minimal setup overhead
and risk to your application. However, out-of-band becomes a problem when you want to start
blocking bad traffic. If the solution is out-of-band then it needs to block through integrations with
external control points, such as API Gateways, WAFs, proxies, etc. Blocking through this mechanism
has a few limitations to be aware of.
• The solution can not block the first time that it sees an attack come through. It must first
see it, signal the integrated control point, and then assume that the block happened as
expected unless a back channel is set up for confirmation.
• Blocking through external control points means increased configuration (with the
control points), increased coordination (with the control point owners), and increased
maintenance to keep the blocking working.
• Because the detection and blocking steps will be spread across different systems, the
method of out-of-band blocking through control points leads to disjointed visibility and
audit trails.
Another solution that is good to have as an option is in-line blocking. An API security solution that
offers in-line blocking supports blocking directly through its own agents or other in-line software
that is part of the single platform (i.e. not 3rd party integrations). This method enables immediate
blocking of attacks on detection, ensures blocking happens as expected, and reduces complexity of
configuration and maintenance.
Noname Security offers an agentless API security platform intended to help enterprises see and
secure their APIs. The company focuses on data collection of APIs and detecting vulnerabilities and
misconfigurations before they are exploited. The security platform is an out-of-band solution that
doesn’t require agents and offers deeper visibility and security than API gateways, load balancers,
and WAFs. NoName can initiate blocking of exploit traffic through its connections to third-party
control points such as the API gateways, proxies, and load balancers which it is configured to work
with.
API Discovery
Discover all API Endpoints in the system
Auto grouping of discovered APIs into service/application collections
Understand queries, parameters and attributes of the API
Interpret REST, SOAP, gRPC, and GraphQL protocols
Runtime Protection
Correlate threat actor (user) activity despite evasion tactics
Automatically track the threat level of each user
Runtime Protection
Identify and block abnormal API usage rates
Ideally, every vendor should have API dependency mapping and related visualizations as part of
their API discovery capabilities. This capability should shed light on the data flow between services
across application environments and provide a live view of all API requests. API dependency
visualization provides actionable visibility for developers and security operation teams in Root
Cause Analysis (RCA) and faster remediation.
When we talk about an API what we are really talking about is the collection of endpoints that
comprise the API. A single API can have tens or even hundreds of API endpoints, each one presenting
a potential attack surface. And each endpoint will have its own characteristics which factor into how
risky it is for it to cause a breach. Given this, consider how incredibly valuable it is to not just have an
inventory of all your APIs, but also some way to prioritize them according to how much risk they pose
to your application security. An overall API security posture rating for the whole set of APIs which
rolls up a score based the total number of vulnerabilities will not be granular enough to focus team
efforts. To quickly identify the top risky API endpoints from the potentially hundreds or thousands
that will likely be in your inventory it’s important to have a per endpoint risk score.
Additionally, the factors that should be included in the risk score analysis will constantly be changing
across the set of API endpoints. This means that the risk score really needs to be automatically and
continuously calculated to give up to date assessments. When looking at API endpoint risk scoring
solutions, make sure that the scores can be calculated automatically, as manual risk tracking will
quickly become stale.
Runtime Protection
Business Logic attacks like BOLA attacks can cause several breaches like data exfiltration, full
account takeover, etc. The Open Web Application Security Project (OWASP) API Top 10 list and
OWAS Web Top 10 list provides guidance on the most critical API and web application vulnerabilities
that organizations should try to recognize and remediate. Four of the top five OWASP API Top ten
vulnerabilities are related to business logic flaws, and it underscores the fact that business logic
vulnerabilities are your top API security risk.
Bad bots, designed to execute malicious attacks on APIs to cause a wide range of data theft and
fraud, are another API security threat on the rise. These bad bots should be detected and blocked at
all times.
Perimeter solutions may detect and block the most common API threats, but they are not effective
against sophisticated API attacks that include different IP addresses, tokens, session IDs, and time
periods. Behavioral analytics-based solutions examine API usage, track API consumers, identify
normal and abnormal behaviors, and provide actionable business context.
Consider a solution’s coverage of the OWASP API Top 10 list, OWASP Web Top 10 list, bad bot
management, and behavioral analytics capabilities. These critical elements help the operations and
security operations teams provide comprehensive API runtime protection.
Data Exfiltration
As illustrated under the “run time protection” section, there are many ways that APIs can be abused
to exfiltrate your sensitive data. Visibility into from which API endpoints and services data are being
exfiltrated enables decisive quick action to stop the exfiltrations. Being able to see exactly which
sensitive data is being stolen, through which services and API endpoints, by which users, and from
what geographies, can aid in prioritization and efficiency in remediation or mitigation. Consider the
importance of having these insights available when protecting your data from exfiltration.
In-Line Blocking
API Security solutions should be flexible in how they can be deployed and how they can protect
applications. Being able to get started with an out-of-band only solution is a great option to start
getting an inventory of all your APIs, and to enable deeper visibility, all with minimal setup overhead
and risk to your application. However, out-of-band becomes a problem when you want to start
blocking bad traffic. If the solution is out-of-band then it needs to block through integrations with
external control points, such as API Gateways, WAFs, proxies, etc. Blocking through this mechanism
has a few limitations to be aware of.
• The solution can not block the first time that it sees an attack come through. It must first
see it, signal the integrated control point, and then assume that the block happened as
expected unless a back channel is set up for confirmation.audit trails.
API Security Solution
Comparison Guide 2.0
• Blocking through external control points means increased configuration (with the
control points), increased coordination (with the control point owners), and increased
maintenance to keep the blocking working.
• Because the detection and blocking steps will be spread across different systems, the
method of out-of-band blocking through control points leads to disjointed visibility and
audit trails.
Another solution that is good to have as an option is in-line blocking. An API security solution that
offers in-line blocking supports blocking directly through its own agents or other in-line software
that is part of the single platform (i.e. not 3rd party integrations). This method enables immediate
blocking of attacks on detection, ensures blocking happens as expected, and reduces complexity of
configuration and maintenance.
API Security Solution
Comparison Guide 2.0
Traceable AI - 96%
Traceable identifies all of your APIs, evaluates your API risk posture, stops API attacks that lead to
incidents such as data exfiltration, and provides analytics for threat hunting and forensic research.
With Traceable, you can confidently discover, manage and secure all of your APIs, quickly deploy,
and easily scale to meet the ongoing needs of your organization.
Traceable can deploy agentless out-of-band through various forms of traffic mirroring, agentless
edge through plugins on edge infrastructure such as API gateways, load balancers, proxies, and
meshes, and even in-app through language agents to be closer to the code for enhanced API call
level troubleshooting and analytics.
API Discovery
Discover all API Endpoints in the system
Auto grouping of discovered APIs into service/application collections
Understand queries, parameters and attributes of the API
Interpret REST, SOAP, gRPC, and GraphQL protocols
Runtime Protection
Correlate threat actor (user) activity despite evasion tactics
Automatically track the threat level of each user
Traceable AI (continued)
Runtime Protection
Identify and block abnormal API behavior (user behavior)
Identify and block abnormal API usage rates
Runtime Protection
When it comes to effective API security protection Traceable has you covered with a broad range of
capabilities that are required to stay secure.
For runtime protection Traceable offers the ability to detect and block attacks on both known and
unknown API vulnerabilities, such as the OWASP API Top 10 vulnerabilities, the OWASP Web Top 10
vulnerabilities, other business logic abuse attacks, and zero days. Traceable also protects your APIs
by detecting and blocking bad bots, API abuse, and API fraud. Finally, identifying live and histrical
data exfiltration enables you to stop remediate or mitigate.
Traceable enables you to stay on top of detecting and protecting by combining big data from
distributed tracing with machine learning to bring you only the most pertinent information. For
example, the Threat actors screen highlights the user of your applications who have exhibited
the most malicious behavior. The APIs Under Threat gives you a live view of APIs currently being
attacked, and the Threat Activity dashboard gives you a summary your overall API security posture,
with the ability to get to the details in one click.
API Security Solution
Comparison Guide 2.0
Data Exfiltration
Take a look at the Data Protection view to see all the details about data that is being exfiltrated
from your applications. You can see a historical view to find trends, and a live view, to know where
you need to take action right away. Take a look at the provided data about the data types and
classifications, which services and API endpoints they got exfiltrated through, and which users stole
the data, as well as what else they got. Once you’ve identified the user you want to stop, go to the
threat actors’ screen and block them from all actions across all your apps.
Any API security solution should be focused on the complete API development lifecycle, not just how
secure the APIs are in production at runtime. It’s important to prevent vulnerabilities by testing for
API security before getting to production, as a part of the development and QA cycles. So, consider
the value of the ability to support API security testing kicked off from the CI/CD pipeline, the ability
to compare the configuration of API endpoints with industry best practices, to run white box testing,
and the ability to stop the build pipeline based on API testing results.
API Discovery
Discover all API Endpoints in the system
Auto grouping of discovered APIs into service/application collections
Understand queries, parameters and attributes of the API
Interpret REST, SOAP, gRPC, and GraphQL protocols
Runtime Protection
Correlate threat actor (user) activity despite evasion tactics
Automatically track the threat level of each user
Runtime Protection
Enforce blocking cia integrations
For this new version of the guide, we increased the depth of the
capabilities analysis, and focused in on a few top vendors in the
API Security space. Over time we will do the analysis of others
and add them to this guide. In the meantime, you can see the
original assessments in the appendix.
About us
Traceable is the industry’s leading API security platform that
identifies APIs, evaluates API risk posture, stops API attacks,
and provides deep analytics for threat hunting and forensic
research. With visual depictions of API paths at the core of its
technology, its platform applies the power of distributed tracing
and machine learning models for API security across the entire
development lifecycle.
www.traceable.ai
• API Disovery
• Usage Analysis
• DDoS Protection
User Behavior Attacks - Detect and mitigate fraud and abuse of APIs
• Bot Mitigation
• Fraud Detection
Data Flow Analytics - Leverage data to enable threat hunting and analytics
• Inline / Agent-based
• Out-of-Band / Agentless
The API security tool landscape consists of many different entries, from traditional firewall/edge-based
protection solutions to solutions that leverage modern techniques like distributed tracing and observability to
see inside of API traffic to detect potential anomalies and attacks.
API Security Tool Requirements
API Discovery and Risk Detecting and Blocking Attacks
Management
OWASP Top 10 Attacks - Legacy
API Discovery Detection and blocking of the OWASP Top
10 vulnerabilities, which provide guidance
Ensures that you always have an up-to-
to developers and security professionals
date inventory of your organization’s APIs.
on the most critical vulnerabilities that are
Continuously discovers and inventories
commonly found in web applications.
all APIs, including shadow APIs of an
organization. Provides change notification OWASP API Top 10 Attacks
when API has been added, modified, or
deprecated. Detection and blocking of the OWASP API
Top 10 vulnerabilities. Protects against
API Risk Monitoring BOLA, mass assignment, and business logic
flaws.
Continuously updated endpoint risk
scoring based on the likelihood and DDoS Protection
impact of a cyberattack. Example risk-
score criteria are: external vs internal API, DDoS (distributed denial of service)
unauthenticated, has a global user-base, protection foils malicious traffic coming
and handles sensitive data. from multiple network points before
reaching their destination, minimizing
API Change Detection the impact of the attack while ensuring
legitimate traffic flow.
The ability to detect and flag changes in
API specifications, configuration, and/or
parameter details so that unexpected and
potentially insecure changes (malicious or Detecting and Blocking Attacks
not) can be caught and validated before
problems arise.
Usage Analysis User Identification & Behavior Analytics
Helps to track and understand usage Uses advanced user identification and
patterns of APIs, monitor performance of analytics technologies, including machine
APIs, diagnose issues between APIs and learning and deep learning, to discover
applications. abnormal and risky behavior by users,
machines, and other entities interacting
3rd-Party API Risk with your applications.
Discover 3rd party APIs that integrate Bot Mitigation
with your application that might pose an
unknown risk to your organization. Bot mitigation is the process of minimizing
risk to applications, websites, APIs, etc.
from malicious bot traffic. Bot mitigation
solutions use different techniques to
identify, manage and block bad bots while
allowing legitimate bots to operate.
18
Fraud Detection Deployment Options
Fraud detection protects customer
and enterprise information, assets,
accounts, and transactions through Inline / Agent-based
the real-time, near-real-time, or batch
analysis of activities by users and other A deployment option that uses an in-app
defined entities (such as kiosks). It uses agent which sits in line with the application.
background server-based processes that In-app agents are typically libraries that
examine users’ and other defined entities’ can be linked in at runtime without code
access and behavior patterns and typically alteration. Typically inline/agent-based
compares this information to a profile of deployments can provide deeper system-
what’s expected. level insights for better overall visibility and
control points for more direct application
protection.
Out-of-Band/Agentless
Data Flow Analytics
An out-of-band agentless deployment
means that functionality is achieved
Sensitive Data Flow without requiring any application code
changes and that there is no agent in the
Prevent sensitive data exposure. Identify path of the application communications.
API endpoints that handle sensitive data. This is typically achieved either through
See meta-data details of all data used traffic mirroring or from log and metrics
collection from infrastructure devices. Out-
by all endpoints. Identify external facing
of-band/agentless typically do not provide
and internal APIs handling sensitive as deep a set of application data as agent-
data. Identify APIs endpoints without based data collection.
authentication.
19
Signal Sciences - 32%
Considerations
Just Web Protection
The problem with OpenAPI parameter files right from the start was that they were difficult
to update and maintain, pulling the developer away from the serious work of developing new
software features. If a developer doesn’t update that API parameter file, it can leave the door wide
open for a cybercriminal to target and exploit your API application.
5
Sensitive Data Tracking
Maintaining an API catalog that highlights sensitive data, like PII, PCI, etc exposure is a
critical step in mitigating data breaches. Consider evaluating how Signal Sciences will detect
and prevent unauthorized sensitive data from flowing through your APIs.
Historical data about attempted API attacks is a crucial need for security teams to improve
their security posture over time. You need a solution that is built on a security data lake
that enables EDR-like capabilities that enterprise security teams have been using for years.
Customers will be able to perform threat hunting, post-forensic analysis and track sensitive
data flows across their API-driven applications.
6
42Crunch - 21%
Considerations
Open API File-Based Protection
APIs expose business logic, and attackers often exploit your business logic to abuse your APIs.
Understanding API context and transaction/data flows are crucial to detecting and defending
against business logic attacks. Suggest exploring how 42Crunch can detect and block business
logic attacks.
Maintaining an API catalog that highlights sensitive data, like PII, PCI, etc exposure is a
critical step in mitigating data breaches. You need a solution that has the ability to pinpoint
your sensitive data and identify and visualize each API flow across your applications, allowing
you to identify insecure or vulnerable APIs that could lead to a devastating data breach.
Historical data about attempted API attacks is a crucial need for security teams to improve
their security posture over time. You need a solution that is built on a security data lake
that enables EDR-like capabilities that enterprise security teams have been using for years.
Customers will be able to perform threat hunting, post-forensic analysis and track sensitive
data flows across their API-driven applications.
11
Neosec - 68%
Considerations
Data Collection
Real-Time Enforcement
12
Cequence - 57%
Considerations
Understanding of Business Logic
Considerations
Real-Time Protection
14
Wib - 57%
Considerations
Real-Time Protection
Considerations
Complete API Catalog
Real-Time Protection
Traceable’s data lake enables EDR-like capabilities that enterprise security teams can
perform threat hunting, post-forensic analysis and track sensitive data flows across their API-
driven applications.
Traceable has the ability to pinpoint sensitive data and identify and visualize each API flow
across applications, allowing teams to identify insecure or vulnerable APIs that could lead to
a devastating data breach.
Learn more about how Traceable AI provides complete API Security coverage.
17
The API Security Market Overview
The sections below, provide a deeper dive into each of the above nine solutions based on the
fourteen API Security Requirements.
• Noname - 45%
• 42Crunch - 21%
• Neosec - 68%
• Cequence - 57%
• Wib - 57%
• Traceable AI - 96%
Note: The % score is based on the number of API Security requirements the tool meets divided by the number
of API Security requirements (14). Partial = ½ credit.