Imperva API Security Released
March 07, 2022

Imperva announced the availability of Imperva API Security with continuous API discovery and data classification.

The product is deployed easily in any environment to provide visibility and protection of data across legacy and cloud-native applications. As a service offering, it can be seamlessly enabled by Imperva Cloud Web Application Firewall (WAF) customers or quickly deployed as a standalone to gain visibility into all API traffic.

Imperva API Security provides protection for Application Programming Interfaces (APIs) in developer environments that often lack adequate security controls and are vulnerable to malicious or inadvertent exposure. According to Gartner®, “By 2024, API abuses and related data breaches will nearly double”, predicts Mark O’Neil and Shameen Pillai, in the May 2021 report, “The 10 Things Software Engineering Leaders Need to Know About APIs[1]”.

The volume of APIs are multiplying as organizations accelerate digital transformation and adopt modern application development approaches. The proportion of web traffic flowing from APIs has grown 30% in 2022, compared to the same period last year, according to an analysis of cloud WAF traffic by Imperva Research Labs. As the volume of API traffic increases, it becomes a greater threat to an organization’s sensitive data. Motivated attackers will increasingly target APIs as the pathway to the underlying infrastructure and database. Imperva API Security enables rapid, secure development by providing continuous visibility and protection for all APIs. The product mitigates the risk of data breaches and data leakage by uncovering shadow APIs, and suggests remediation for software developers and security administrators.

Key Benefits of Imperva API Security:

- Identify and classify data flowing through any API: Protecting APIs should be a direct extension of an organization’s strategy for securing sensitive data. Imperva API Security automatically discovers each API’s full schema while identifying and classifying the data that flows through it.

- Continuous discovery of APIs and schema changes: With a simple activation, REST APIs are quickly detected to enable creation of a positive security model. API inventories are automatically updated, helping the security team keep pace with developers who frequently modify APIs in production.

- Flexible deployment model: Imperva API Security works across legacy, hybrid, and cloud-native environments including: Kubernetes, legacy monolithic apps, standalone microservices, web proxies, or API gateways that integrate with other existing infrastructure. The flexible deployment model provides protection for both public-facing and backend APIs in a single solution without slowing down development teams.

- Enable API governance: Gain visibility beyond the API endpoint and into each API’s underlying payload. This context will help business leaders in highly regulated industries enforce a governance model and stop a potential data breach.

“Organizations need a new approach for protecting APIs as attacks multiply and increase in sophistication,” says Karl Triebes, SVP, Product Management & General Manager, Application Security, Imperva. “Simply knowing how many APIs you have in your environment isn’t enough. With the focus on protecting the underlying data, Imperva API Security is designed to help security and development teams work cooperatively without altering code or slowing down the development lifecycle.”

Imperva API Security is a product uniquely designed to benefit both the security and development teams. As a core component of the market-leading Imperva Web Application & API Protection platform, customers can protect critical applications and infrastructure from online fraud, DDoS attacks, and API abuses.

“Managing the security of APIs is one of the key business risks organizations face today as they accelerate the pace of software development,” says Christopher Rodriguez, Research Director, Cybersecurity Products at IDC. “Protecting APIs should be seen as a critical dimension of a strong data security strategy. API security tools should provide the ability to discover and classify every API in and out of production. Organizations must act quickly as APIs will be the source of more data breaches in the coming years.”

Share this

Industry News

May 15, 2024

Gearset announced its new CI/CD solution, Long Term Projects in Pipelines.

May 15, 2024

Rafay Systems has extended the capabilities of its enterprise PaaS for modern infrastructure to support graphics processing unit- (GPU-) based workloads.

May 15, 2024

NodeScript, a free, low-code developer environment for workflow automation and API integration, is released by UBIO.

May 14, 2024

IBM announced IBM Test Accelerator for Z, a solution designed to revolutionize testing on IBM Z, a tool that expedites the shift-left approach, fostering smooth collaboration between z/OS developers and testers.

May 14, 2024

StreamNative launched Ursa, a Kafka-compatible data streaming engine built on top of lakehouse storage.

May 14, 2024

GitKraken acquired code health innovator, CodeSee.

May 13, 2024

ServiceNow introduced a new no‑code development studio and new automation capabilities to accelerate and scale digital transformation across the enterprise.

May 13, 2024

Security Innovation has added new skills assessments to its Base Camp training platform for software security training.

May 13, 2024

CAST introduced CAST Highlight Extensions Marketplace — an integrated marketplace for the software intelligence product where users can effortlessly browse and download a diverse range of extensions and plugins.

May 09, 2024

Red Hat and Elastic announced an expanded collaboration to deliver next-generation search experiences supporting retrieval augmented generation (RAG) patterns using Elasticsearch as a preferred vector database solution integrated on Red Hat OpenShift AI.

May 09, 2024

Traceable AI announced an Early Access Program for its new Generative AI API Security capabilities.

May 09, 2024

StackHawk announced a new integration with Microsoft Defender for Cloud to help organizations build software more securely.

May 08, 2024

MacStadium announced that it has obtained Cloud Security Alliance (CSA) Security, Trust & Assurance Registry (STAR) Level 1, meaning that MacStadium has publicly documented its compliance with CSA’s Cloud Controls Matrix (CCM), and that it joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

May 08, 2024

The Cloud Native Computing Foundation® (CNCF®) released the two-day schedule for CloudNativeSecurityCon North America 2024 happening in Seattle, Washington from June 26-27, 2024.

May 08, 2024

Sumo Logic announced new AI and security analytics capabilities that allow security and development teams to align around a single source of truth and collect and act on data insights more quickly.