Enables API Catalog to provide audit teams with complete and verifiable details of all API activity (malicious and non-malicious). This is especially useful where logging is found to be insufficient.
For APIs that are rarely used, Traceable can look at historical data and replay that for vulnerability scanning. Without the historical replay capability, only those APIs that are frequently exercised can be scanned.
In addition to all the legacy attacks, Traceable can detect and protect against long-lived complex attacks starting from the reconnaissance stage. These are slow and latent attacks whose impact culminates over a period of time.
Traceable detects and tracks all activity around sensitive data and data sets, including which users and APIs have accessed it, when, from what service, and if it has been exfiltrated. All this is possible to see over long periods of time for even slow leaks using the data captured in the Traceable Data Lake.
Forensics such as root cause analysis of attacks and other ad-hoc security analytics is made possible by using the data lake which provides advanced query capabilities over deep historical transaction data. This also includes the threat-hunting ability to detect advanced API fraud and API abuse use cases.