With the Traceable plugin for NGINX, customers can easily implement a highly scalable modern application and API security solution, replacing existing WAF and RASP deployments. NGINX customers that implement Traceable see a significant upgrade to their application and API security, deploying in less than 5 minutes.
Together, Traceable and NGINX have partnered to create an integration that delivers Traceable’s Application and API security across NGINX deployments. Powered by distributed tracing, Traceable is able to deeply understand applications built on micro services architectures, enabling end-to-end security from user to data. Traceable can understand the inner working of the application, how it changes, and normal baseline behavior that allow it to surface anomalies that can be alerted on or immediately blocked – ensuring your application is secure and resilient.
Traceable monitors stateless API traffic to reconstruct the full API DNA including the name, parent service, headers, parameters and payloads to provide full visibility and change management for external and internal APIs.
Per endpoint risk scores and threat indexes help prioritize focus. Risk scores are continuously calculated based on the likelihood and possible impact of an attack. Threat indexes show the current level of threat activity.
Pinpoint transactions where sensitive data is exposed. Identify API endpoints that handle sensitive data. See meta-data details of all data used by all endpoints. Identify external (north-south) facing APIs. Identify APIs endpoints without authentication.
Ensure API protection, prevent the exploitation of API vulnerabilities that can lead to sensitive data loss. Protect against BOLA, Mass Assignment and other business logic vulnerabilities.
Traceable analyzes web traffic as it passes through your application, blocking cyber-attacks before they can get your sensitive data. Protect against web application attacks such as SQL injections, Cross-site Scripting (XSS) and XML External Entities (XXE).
Extract critical security insights from all transactions captured in a data-lake. Powered by machine learning, Traceable can surface potential threats and ensure you're ahead of your attackers.
Visualize security events as kill chains as executed by cybercriminals, helping to streamline threat analysis, forensics, and remediation.
Decrease analysis time by reviewing aggregated security events without having to parse through hundreds of log files across microservices.
Drill down into system behavior and identify the errors, users, URL, possible security events and relevant parameters needed to address the risk.