Enables API Catalog to provide audit teams with complete and verifiable details of all API activity (malicious and non-malicious). This is especially useful where logging is found to be insufficient.
For APIs that are rarely used, Traceable can look at historical data and replay that for vulnerability scanning. Without the historical replay capability, only those APIs that are frequently exercised can be scanned.
In addition to all the legacy attacks, Traceable can detect and protect against long-lived complex attacks starting from the reconnaissance stage. These are slow and latent attacks whose impact culminates over a period of time.
Traceable detects and tracks all activity around sensitive data and data sets, including which users and APIs have accessed it, when, from what service, and if it has been exfiltrated. All this is possible to see over long periods of time for even slow leaks using the data captured in the Traceable Data Lake.
Forensics such as root cause analysis of attacks and other ad-hoc security analytics is made possible by using the data lake which provides advanced query capabilities over deep historical transaction data. This also includes the threat-hunting ability to detect advanced API fraud and API abuse use cases.
For a comprehensive API security approach, you must have the full context for each API endpoint (awareness of data, identities, and risks associated with each API endpoint).
To build this full context you need to know the following:
The API Activity
What API calls are being made at the edge? Internally? What’s the sequence of calls?
The User Activity
What does user activity look like? What are their client details (like user agent, IP, geo)? and What data is the user accessing?
The Data Flow
Where is your data flowing? When does it leave your control? Which APIs are accessing it?
The API Execution
Which parameters get used? What do requests and responses look like? What content is in the headers and bodies?
Understanding full context requires capturing and learning the details of every API call, over time. We call this “360 API context”.
The core of the Traceable platform is the API Data Lake – which enables complete API security that is context-aware, data-aware, identity-aware, and risk-aware.
Traceable captures and correlates EVERY API transaction, malicious or not, over time, because this is the only way to get a true full contextual understanding of your APIs and the attacks against them.
Traceable enables this data collection in multiple ways depending on the customer requirements – mirroring traffic, on the edge, in-app agents, and serverless. And it does this without impacting your applications.
This extra-deep understanding of every API endpoint is the foundation for all the functionalities that Traceable provides. It’s always there in the background helping to make better decisions and do better analysis.
Some particular capabilities that are more accurate, more capable, or in some cases even possible are
Traceable’s comprehensive API Security Platform is powered by the API Data Lake. Based on the comprehensive 360 degrees insight about EVERY API in your ecosystem, Traceable provides four key customer values:
Security Posture management for your APIs
Automatic and Continuous API discovery that provides comprehensive visibility into all APIs, sensitive data flows, and risk posture – even as your environment changes.
Threat Protection for your APIs
Automatically detect and stop known and unknown API attacks, business logic abuse attacks, as well as API abuse, fraud, and sensitive data exfiltration.
Threat Management for your APIs
Explore the rich set of security and application flow analytics in the data lake that can be used by security analysts to hunt for hidden IOCs.
Secure Software Development Life Cycle for your APIs
Eliminate the risk of vulnerable APIs in pre-prod, perform rapid scans that maintain the speed of innovation, and automatically obtain remediation insights for developers to better secure their APIs.