Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Securing HealthTech APIs for Xolv

Michelle McLean
Nov 30, 2021

We shared today the news that Xolv has deployed Salt to protect the APIs at the heart of its healthcare applications. I always love interviewing our customers – I had extra fun talking with the team at Xolv, though, because it was my second time working with them (Xolv was a customer of my previous company, which provided security for containers and Kubernetes).

It’s no surprise a HealthTech company would lean into application security. And in many ways, the Xolv journey echoes that of so many of our customers.

“We’re building more applications all the time, they all run on APIs, and we had no idea how many APIs we have or how well they’re written,” explained Jason Weitzman, senior security engineer at Xolv.

Jason and his team looked at six different options for API security and quickly narrowed the list to three they wanted to evaluate. One simply couldn’t get up and running, and another required API documentation to apply security controls.

“That’s a non-starter for us. A huge driver for us to deploy API security is that we don’t know all our APIs in the first place, so any solution that depends on our inventory simply won’t work,” noted Jason.

Jason’s journey was like a lot of our customers’ in another important way – explaining to upper management why another security solution was needed in the first place.

“The hard part was getting them to understand the difference between this [Salt] and our WAF. We explained that Salt is the brains for our WAF – our WAF doesn't understand APIs, but Salt does. We had zero coverage on API security using just our WAF,” said Jason.

Jason’s not alone in this struggle to explain why WAFs can’t protect against API attacks. A lot of people haven’t had the chance yet to dig into how attacks change when bad actors target APIs specifically. Most classic application attacks rely on looking for a known vulnerability to exploit, like a SQL injection or cross-site scripting. Traditional defenses then rely on rules or signatures that block these known patterns.

API attacks are totally different. Since every API is unique, every API attack is unique, and bad actors have to poke and probe and try lots of different manipulations to find a business logic flaw in an API that they can exploit. To defend against this style attack, security tooling needs context over time so that it can correlate reconnaissance activity back to a single bad actor and block that attacker.

Get the free customizable API Security Best Practices Checklist.

No WAF, no matter how feature rich, has the ability to understand context over time. WAFs allow or deny transactions one at a time. They cannot correlate what a given user did a minute ago, an hour ago, a day ago, much less weeks or months ago. But that’s how API attacks unfold, over many days and weeks, with lots of different manipulations.

The Salt architecture is fundamentally different, built on cloud-scale big data that hosts a baseline of all normal user and API activity. Salt then applies ML and AI to build context over time and correlate the activity that defines a bad actor’s reconnaissance efforts.

For Xolv, the immediate win came in having a complete inventory of APIs.

“I can go to the Salt dashboard and instantly see any new APIs, see if they expose sensitive data, and provide all that information on demand. If we’re asked for that info, by upper management or an auditor, we have it at our fingertips, and it’s dynamically updated all the time,” said Jason.

Xolv also appreciates the continuous runtime protection as well as the ability to identify where Xolv’s developers can amend their APIs to improve security.

“Salt provides detailed insights that we auto route to our dev teams, with details such as input validations that are missing or other constraints that should be applied. We get those insights before anyone can exploit those gaps in our APIs, and our team learns how to craft better APIs.”

The best part is, Jason has worked the Salt insights into Xolv’s existing stack and workflows.

“Everything integrates into our existing systems – our WAF, our AWS tools, and our Jira system for ticketing, so our team doesn’t need to go to the Salt dashboard to benefit from its insights.”

Jason doesn’t run a big team at Xolv – as tech forward and security focused as they are, they need platforms that are easy to deploy and run without much time investment. The case study makes clear how Xolv continues to be at the forefront of application security - it's been fun for me to chart the company's progress  these past several years, and I can’t wait to see where the team goes next in this API security journey.

If you’d like to get a sneak peek at how your own API security journey could unfold with Salt, request a custom demo – we’ll get you full API discovery, attack prevention, and posture insights, all made easy, just like we’ve done for Jason and Xolv.


Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

June 21, 2024

Amanda Fitzsimmons
Head of Legal


Don't Get Salted: Why API Inventory is Key to PCI DSS 4.0 Compliance (and How Salt Security Can Help You Achieve It)

A secure API ecosystem starts with a clear understanding of what APIs you have and how they interact with your data.

Read more

June 18, 2024

Salt Labs
Research Team

Salt Labs

Increasing API Traffic, Proliferating Attack Activity and Lack of Maturity: Key Findings from Salt Security’s 2024 State of API Security Report

The latest Salt Security State of API Security Report is out now, and we’re thrilled to give a little sneak peek of its contents.

Read more

June 12, 2024

Elad Hoffer
Head of Product R/T Protection


Salt Security Leading the Way in AI-Driven API Security for Next-Generation Threat Protection and Attacker Insights

Learn how the recent introduction of advanced LLM-driven attacker insights further solidifies Salt's position as a leader in API security solutions.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Learn everything you need to know to keep your APIs secure

Get the guide