Register for our Dec 19th Webinar: Beyond the Perimeter: Achieving Comprehensive API Security

Detect and Prevent API Attacks & Data Breaches.

Only Salt uses cloud-scale big data and patented artificial intelligence (AI) to analyze and correlate the activity of millions of users in parallel to identify and stop API attacks early.

Carrefour
Cathay Bank
Kingston Technology
Stryker
Vermeer
Hyundai
Armis
Telefonica Brasil
Jemena
Mail Boxes Etc.
Coralogix
Augmedix

See all API traffic and maintain a baseline.

The Salt platform maintains state across 100s of attributes of typical behavior for each entity or API, including attributes such as consistency of parameter input, frequency of access, volume of response, volume of sensitive data, data types, and response codes. It will adjust the baseline as your APIs change, avoiding false positives while keeping you protected in a rapidly changing environment.

01Spotting Bad Actors

The Salt platform correlates all user activities, so malicious behavior is identified early.

  • Advanced Threat Detection. Salt Security uses AI and ML algorithms to analyze API traffic patterns and identify anomalies that may indicate an attack. This includes detecting sophisticated attacks like account takeover, data exfiltration, and business logic abuse
  • Real-Time Attack Prevention. Salt Security can block API attacks in real time by integrating with existing enforcement points like API gateways and WAFs. This prevents attackers from exploiting vulnerabilities and causing damage.
  • Reduced Alert Fatigue: Salt Security correlates events and reduces false positives, providing security teams with high-fidelity alerts that focus on critical threats. This allows them to respond to attacks more effectively and efficiently.

02Your WAF Cannot Protect your APIs

Salt identifies and stops the attacks that web application firewalls (WAFs) and API gateways miss.

  • Limited understanding of API context. WAFs primarily analyze HTTP traffic and look for patterns of known attacks. However, APIs often have complex business logic and data structures that WAFs may not fully understand, leading to false negatives where legitimate API requests are blocked or malicious traffic goes undetected.
  • Difficulty in detecting business logic attacks. Many API attacks exploit vulnerabilities in the business logic of an application, such as excessive data exposure, broken authentication, or authorization flaws. These attacks are often difficult for traditional WAFs to identify because they don't involve typical attack signatures.
  • Inability to protect against API-specific attacks. There are specific attack vectors unique to APIs, such as broken object-level authorization (BOLA) or mass assignment vulnerabilities. Traditional WAFs are not designed to address these API-specific attacks, leaving a gap in security.

03Pinpoint Attackers

Salt captures the full attack timeline, displaying it in our dashboard and sending the information to your SIEM for incident response teams to analyze.

  • Correlate all activity of a given entity.  Pinpoint an attacker trying to steal your data and block them or send an alert to your security teams.
  • Recognize unusual usage patterns. Salt’s advanced AI AI engine utilizes contextual information to infer user intent. This involves identifying patterns that deviate from expected behavior and assessing the potential risks associated with those deviations.
  • Contextual Analysis. Salt analyzes API traffic in context, considering factors such as the user's identity, location, device, and past behavior. This helps to distinguish between legitimate users and attackers who may be trying to impersonate legitimate users.

04Protection Against the OWASP API Top 10 & More

  • OWASP API Top 10. Salt continuously monitors API traffic to detect and prevent API attacks. This includes both known and unknown attacks, as well as attacks that are targeted at specific vulnerabilities in the OWASP API Top 10.
  • Detect OAuth-Specific Attacks. Salt identifies various OAuth attack techniques such as authorization code theft, token leakage, and replay attacks. By understanding the normal behavior of OAuth flows, Salt can detect anomalies and flag potential threats.
  • Proactive Vulnerability Detection. Salt can proactively discover vulnerabilities within the OAuth implementation before they are exploited. This allows organizations to fix issues and strengthen their OAuth security posture.

What our Customers are Saying.

“Salt has been a game-changer for our API security. We now have the visibility and control to protect our data, stay compliant, and build trust with our customers.”

—Peter Rios, Infrastructure and Information Security Manager, CISM, Kingston

Not sure how to best secure your APIs?

Take this 2 minute quiz to understand where to start and get access to the most relevant material for you.

Take the quiz

What API security technology are you using?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

What is your industry?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Do you have an API governance program in place?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

What stage of the process are you in?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Back

Next

Want to see the Salt platform in action?

Learn how Salt Security's leading API security platform can provide complete Posture Governance and API Behavioral Threat Protection.

Get the latest API security research and see how you compare

Get the report
Back