Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Company

Salt Security Joins AWS ISV Accelerate Program

Gilad Barzilay
Jul 12, 2022

We here at Salt Security are excited to have reached a significant milestone in our partnership with AWS — Salt has been accepted into the AWS ISV Accelerate Program. Joining this select program extends and strengthens our long-standing partnership with AWS and increases our access to compelling AWS resources. AWS ISV Accelerate provides co-sell opportunities for AWS partners offering solutions for AWS, speeding sales cycles by connecting independent software vendors (ISVs) like Salt with different AWS organizations, such as APN, Marketplace and Sales.

Salt Security has always had a strong commitment to work with the tools and workflows that already exist within our customers’ environments. AWS represents a big part of that. Many of our customers use the Salt Security API Protection Platform to protect their APIs in AWS, including Armis, Xolv, bp Launchpad, TripActions, and others.

By supporting the systems and providers you already have in place, Salt Security helps you start protecting your APIs right now — without adding complexity or friction to your systems. Our solution fits seamlessly into your existing cloud environment, so you get the immediate benefit of real-time protection across your critical services and data.

According to Jason Weitzman, senior application security engineer at Xolv Technology Solutions:

“Deploying the Salt platform took almost no effort — it integrated quickly with our existing Cloudflare, AWS, Jira and other systems. It also started identifying errors and delivering insights on how to craft better APIs within minutes.”

AWS customers secure their API traffic with Salt by leveraging Amazon VPC Traffic Mirroring. AWS integrates with Salt to “mirror” a copy of API traffic to the Salt platform from AWS virtual private clouds (VPCs), the Amazon API Gateway, and the AWS web application firewall (WAF). We block attackers by integrating with these tools that already exist in AWS.

With ISV Accelerate, Salt and AWS commit to work together to create a better customer experience with additional integrations for our joint customers, ensuring a secured cloud journey.

With our cloud-scale, big data platform that leverages AI and ML, AWS customers get a baseline of API behaviors to quickly spot anomalies and potential security threats. Through continuous analysis of API traffic in runtime, Salt provides real-time discovery of APIs, protects against threats and delivers remediation insights to strengthen APIs in development.

Salt Security pioneered the industry’s first patented solution to prevent the next generation of API attacks, using machine learning and AI to automatically and continuously identify and protect APIs. If you’d like to learn how we can help you to secure your organization’s critical APIs, we invite you to a personalized demo of the award-winning Salt Security API Protection Platform.

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

July 16, 2024

Eric Schwake
Head of Product Marketing

Industry

The Biggest Factors Influencing API Security Today

Several key factors are driving the current state of API security, including the rise of AI, the ongoing digital transformation, a booming app economy, and the challenges posed by shadow IT and regulatory compliance.

Read more

July 9, 2024

Eric Schwake
Head of Product Marketing

Product

Salt Security Empowers API Governance with New Posture Policies Hub

Salt Security's Posture Policies Hub is a powerful new tool designed to help organizations simplify and streamline API posture governance.

Read more

June 21, 2024

Amanda Fitzsimmons
Head of Legal

Industry

Don't Get Salted: Why API Inventory is Key to PCI DSS 4.0 Compliance (and How Salt Security Can Help You Achieve It)

A secure API ecosystem starts with a clear understanding of what APIs you have and how they interact with your data.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back