This API api security solution to use AI
![]() |
Richard Harris in API Thursday, February 1, 2018 |
A new API security solution for API network communication by Elastic Beam teams up with Axway to protect their users from cybersecurity threats using Artificial Intelligence.
APIs are an essential element for modernizing IT infrastructures and represent a new attack surface that is increasingly targeted by hackers to take over accounts, steal critical consumer and business data, delete important information, commit fraud and conduct other harmful activity, including DDoS attacks on APIs. To protect organizations against those threats, infrastructures need to not only leverage the security of the API gateway, but also need to dynamically identify and block hackers. Elastic Beam uses an advanced AI engine to sort out API sessions and traffic to identify what is abnormal or suspicious for automated termination.
By combining the Elastic Beam solution with Axway AMPLIFY API Management, which enables organizations to manage the entire API lifecycle by providing an integrated solution to create, control, secure and consume APIs, customers can secure their digital assets against emerging cyber threats while providing complete visibility over their environments.
“We are witnessing an influx of API attacks globally and most go undetected as organizations are still wrestling with this new set of threats. In fact, many household brands have had to apologize for well-publicized attacks that used their APIs to steal private consumer information,” said Bernard Harguindeguy, CEO, Elastic Beam. “Elastic Beam is pleased that we can work with an established API management industry leader like Axway to protect against a broad range of API cybersecurity attacks that global organizations are constantly fighting.”
Elastic Beam extends Axway’s API security capabilities by offering:
- Instant attack detection and blocking. Elastic Beam provides deep API traffic inspection, backed by a scalable and powerful artificial intelligence engine capable of determining API behavior and identifying threats. Elastic Beam also provides a deception environment that inserts decoy APIs within real ones to instantly trap hackers and block access.
- Complete visibility into new API attacks via dashboards and reports. Using AI, Elastic Beam accelerates the gathering of evidence after an attack, tracks compliance and gives organizations full visibility into all activity. This complements Axway’s monitoring and analytics capabilities for visibility into new API threats.
- Blocking cyberattacks in multi-cloud environments. The solution supports deployments on-premise, and in private and public cloud, and propagates attack information across the customer’s clouds to prevent attacks from reconnecting.
“We are excited about our partnership with Elastic Beam and proud that our customers are now able to benefit from a comprehensive security solutions for API environments. Axway implements access control, and then rate limiting or quota for authorized consumers, Elastic Beam complements by identifying atypical behavior based on the usage pattern of APIs. This allows us to detect attacks even with valid credentials,” said Suraj Kumar, VP Solution Management, Axway. “Axway is focused on providing best in class API security at the Edge of the enterprise. Partnering with Elastic Beam enables Axway to deliver an innovative AI security module that detects new API threats. We wanted to enable existing customers to easily activate this module on sensitive traffic quickly and then do a progressive rollout.”
475 Tax Deductions for Businesses and Self-Employed Individuals
Are you paying more taxes than you have to as a developer or freelancer? The IRS is certainly not going to tell you about a deduction you failed to take, and your accountant is not likely to take the time to ask you about every deduction you’re entitled to. As former IRS Commissioner Mark Everson admitted, “If you don’t claim it, you don’t get it.
A hands-on guide to mastering mobile forensics for iOS and Android
Get hands-on experience in performing simple to complex mobile forensics techniques Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums A practical guide to leveraging the power of mobile forensics on popular mobile platforms with lots of tips, tricks, and caveats.
The Latest Nerd Ranch Guide (3rd Edition) to Android Programming
Write and run code every step of the way, using Android Studio to create apps that integrate with other apps, download and display pictures from the web, play sounds, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development.