How Traceable AI Works

Deploy Traceable in 10 minutes or less.

Traceable AI deploys using traffic mirroring, into API gateways and load balancers, into Kubernetes, meshes, or into other microservices environments through Kubernetes sidecars or in-app agents.

Why distributed tracing?

Distributed tracing is an observability technique where lightweight agent modules collect code-level diagnostic data from within production applications as code executes. Combined with mirrored network traffic, it spans multiple microservices and is an extremely powerful yet low overhead method to collect runtime application data related to application security. This technique greatly increases the accuracy and depth of threat detection and protection.

Why make it open source?

We’ve made our distributed tracing technology open source through the HyperTrace project because we believe everyone deserves complete observability into their applications.

Traceable works with your stack 

agentless and in-app

 

Java
GO
NGINX
Kong
AMBASADOR
Istio
Kuma
Kubernetes
GKE
EKS
AKS
ECS
envoy
EC2
Docker
Amazon Linux
Jobvite
HELM
ZIPKIN
JAEGER
OpenTelemetry

Testimonials

“Traceable helps us see how the apps and APIs are actually used in production and what vulnerabilities might exist so that they can be fixed proactively.”

Greg Phillips, Houwzer
Greg Phillips,
CTO, Houwzer

read story

“Traceable is future-proofing organizations’ API security strategies by detecting anomalous API traffic from edge to data, and creating actionable intelligence to respond to threats in cloud-native environments.”

Lakshmi Hanspal, CISO, Box & Investor at SVCI

SVCI

“Traceable’s approach fundamentally differs from others in that it understands the application’s intent and its correct usage behavior. No other product does this.”

Jonathan Jaffe, CISO, Lemonade & Investor at SVCI

SVCI

“Traceable solves one of the biggest problems security teams face, which is distinguishing between valid and malicious use of an application’s APIs.”

Gerhard Eschelbeck, Previously CISO at Google & Advisor at Traceable

Why machine learning?

Only machine learning can keep up with the evolving threats of modern attacks. Traceable uses multiple machine learning techniques like deep learning, clustering, classification, unsupervised learning and more for a complete view of your APIs and cloud-native apps.

What powers the AI?

Machine learning is only as good as the data you feed into it. We use multiple forms of distributed tracing (out-of-band and inline options) to inform our AI so it’s always on guard to detect and block anomalous threats from API attacks, business logic attacks, and even unknown attacks.

Easy to get started

1. Sign up

Register using your Google login or your email address. Enterprise customers can also use well-known IAM providers such as Okta.

2. Configure Traceable AI to collect API traffic

Traceable AI guides you in configuring data collection (agentless or with in-app agents). Configuration is designed to be fast, easy, and low friction to get you securing your APIs quickly.

3. Discover, protect, and analyze

Congratulations! You have all the required configurations set up to experience the benefits of tracing and machine learning for securing your APIs.

Other resources

Keep up
with constant change. Get the inside trace.

Application architectures and the security landscape is constantly changing. How do you keep up to date? What are the latest thoughts on protecting your applications?

(R)evolution in
Application Security

The application renaissance has begun. Delivering new application features and functions every two weeks is now table stakes. Learn how to re-think security for the future.

Personalized
Traceable Demo.

Want to see Traceable in action and learn how you can dramatically improve your application security posture in minutes?

Ready for more?