The Salt platform

The Salt Security API Protection Platform secures the APIs at the heart of all your modern applications. The platform collects API traffic across your entire application landscape and makes use of AI/ML and a big data engine to discover all your APIs and their exposed data, stop attacks, and eliminate vulnerabilities at their source.

Salt in action

Salt deploys in minutes, with no agents, no code changes, and no configuration. We get a copy of your API traffic from any application environment and send that traffic to the Salt platform for analysis.

Since we’re not inline, we have no performance impact on your apps. To protect your APIs and block attackers, we leverage the inline devices you’ve already deployed. And we send your dev and SecOps teams the alerts and remediation tickets they need to eliminate gaps in your APIs.

Simple deployment, frictionless operation – that’s the Salt approach.

Key capabilities of the Salt platform

See all your APIs

Discover all your APIs and exposed data

The Salt platform automatically inventories all your APIs, including shadow and zombie APIs, across all your application environments. Salt also highlights all instances where your APIs expose sensitive data. Continuous discovery ensures your APIs stay protected even as your environment evolves and changes as a result of agile methodologies and DevOps practices.

Stop API attackers

Stop API attackers

Pinpoint and stop threats to your APIs with Salt's patented AI technology that baselines legitimate behavior and identifies attackers in real time, during reconnaissance, to prevent them from advancing. The Salt platform correlates all activities back to a single entity, sends a single consolidated alert to avoid alert fatigue, and blocks the attacker -- not just transactions.

Improve API security posture

Improve API security posture

The Salt platform proactively identifies vulnerabilities in your APIs even before they serve production traffic. Plus, the platform uses attackers like pen testers, capturing their minor successes to provide insights for dev teams while stopping attackers before they reach their objective.

Tools like WAFs and API gateways don't have any context for what's happening across APIs and, in turn, cannot effectively detect or protect against exploitation. Salt pulls together all the activity of all users, so it can find and stop attackers in their tracks.

Curtis Simpson, CISO

Top use cases

Protect all your APIs, in all your app environments, with simple integrations from Salt.

No configuration needed. Ever.

Your applications and APIs are constantly evolving, creating opportunities for attackers to find vulnerabilities. You need context to stop attacks and keep your APIs protected.

Salt Security continuously understands your evolving application environment and identifies malicious activity automatically, without the need for configuration or customization. Our pre-built integrations make it easy to discover all your APIs, collect and analyze their traffic, and leverage your inline devices for enforcement.

How is the Salt architecture different?

Learn More

API Security Best Practices

Read the guide