Register for our Dec 19th Webinar: Beyond the Perimeter: Achieving Comprehensive API Security

Blog Post

Company

Salt Security Joins AWS ISV Accelerate Program

Gilad Barzilay
Jul 12, 2022

We here at Salt Security are excited to have reached a significant milestone in our partnership with AWS — Salt has been accepted into the AWS ISV Accelerate Program. Joining this select program extends and strengthens our long-standing partnership with AWS and increases our access to compelling AWS resources. AWS ISV Accelerate provides co-sell opportunities for AWS partners offering solutions for AWS, speeding sales cycles by connecting independent software vendors (ISVs) like Salt with different AWS organizations, such as APN, Marketplace and Sales.

Salt Security has always had a strong commitment to work with the tools and workflows that already exist within our customers’ environments. AWS represents a big part of that. Many of our customers use the Salt Security API Protection Platform to protect their APIs in AWS, including Armis, Xolv, bp Launchpad, TripActions, and others.

By supporting the systems and providers you already have in place, Salt Security helps you start protecting your APIs right now — without adding complexity or friction to your systems. Our solution fits seamlessly into your existing cloud environment, so you get the immediate benefit of real-time protection across your critical services and data.

According to Jason Weitzman, senior application security engineer at Xolv Technology Solutions:

“Deploying the Salt platform took almost no effort — it integrated quickly with our existing Cloudflare, AWS, Jira and other systems. It also started identifying errors and delivering insights on how to craft better APIs within minutes.”

AWS customers secure their API traffic with Salt by leveraging Amazon VPC Traffic Mirroring. AWS integrates with Salt to “mirror” a copy of API traffic to the Salt platform from AWS virtual private clouds (VPCs), the Amazon API Gateway, and the AWS web application firewall (WAF). We block attackers by integrating with these tools that already exist in AWS.

With ISV Accelerate, Salt and AWS commit to work together to create a better customer experience with additional integrations for our joint customers, ensuring a secured cloud journey.

With our cloud-scale, big data platform that leverages AI and ML, AWS customers get a baseline of API behaviors to quickly spot anomalies and potential security threats. Through continuous analysis of API traffic in runtime, Salt provides real-time discovery of APIs, protects against threats and delivers remediation insights to strengthen APIs in development.

Salt Security pioneered the industry’s first patented solution to prevent the next generation of API attacks, using machine learning and AI to automatically and continuously identify and protect APIs. If you’d like to learn how we can help you to secure your organization’s critical APIs, we invite you to a personalized demo of the award-winning Salt Security API Protection Platform.

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

November 27, 2024

Eric Schwake
Head of Product Marketing

Industry

Beyond Traditional Security: Addressing the API Security Gap

To safeguard your business from API-specific threats, you need a dedicated solution that offers comprehensive visibility, in-depth contextual analysis, automated governance, robust data protection, and AI-driven threat prevention.

Read more

November 21, 2024

Eric Schwake
Head of Product Marketing

Industry

API (In)security: The Hidden Risk of Black Friday

Learn how, for online retailers, Black Friday represents both a lucrative opportunity and a significant cybersecurity challenge.

Read more

November 5, 2024

Eric Schwake
Head of Product Marketing

Industry

API Security: The Non-Negotiable for Modern Transportation

Airlines and transportation companies heavily rely on APIs to handle sensitive data, from customer information to payment details and flight schedules. While crucial for efficient operations, these APIs are also prime cyberattack targets.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back