Categories: FAANG

Why advanced API security is critical to outsmarting new threats

As organizations continue to expand their digital footprint, new vulnerabilities are constantly emerging that can put them at risk. Among the most prominent new examples is attacks that exploit the growth of application programming interfaces (APIs), which work to connect applications and systems to facilitate the exchange of data. Along with the ease of interaction that APIs provide, however, comes potential new entry points for bad actors to gain access to organizations’ resources and data.

According to Gartner®[1], “The explosive growth of APIs is expanding the attack surface of organizations, giving malicious actors new breach and data-exfiltration opportunities.” API management and API gateways can play an important role in how you consistently create, secure and control access to your APIs. According to “The 2022 API Security Trends Report” by 451 Research and commissioned by Noname Security, this is proving to not be sufficient, and more advanced security is needed to protect APIs across their lifecycle.

Introducing Noname Advanced API Security for IBM

Against this backdrop, IBM has collaborated with Noname Security to help companies shore up their API lifecycle against malicious activity. Noname Security’s technology extends the capabilities of the IBM API Connect and IBM DataPower Gateway solutions to help cover the spectrum of API usage, including discovery, posture management and runtime protection. This new collaboration—Noname Advanced API Security for IBM—aims to further enhance the strength of solutions for monitoring and locking down APIs from evolving threats.

The partnership with Noname Security expands IBM’s API security capabilities for more comprehensive coverage of the API lifecycle

The collaboration arrives at a critical time for businesses. The use of APIs can be increasingly integral to companies’ digital transformation, facilitating better connections with their customers and enhancing the management and ownership of data. This has led to an explosion in the deployment of APIs, and a recent survey commissioned by Noname Security showed the average organization now has over 15,000 APIs in use, with a growth rate of 201% over the past year.

That’s a lot of APIs for organizations to monitor, and without proper insights into this digital connective tissue, cybercriminals can potentially gain access to sensitive data through methods like distributed denial of service (DDoS), injection attacks, authentication hijacking, and man-in-the-middle schemes.

Outsmarting threats

Noname Advanced API Security for IBM, now generally available, allows organizations to expand their API usage while keeping close tabs on potential threats. The solution is designed to do the following:

  • Automatically discover managed and unmanaged APIs.
  • Provide insights into their behavior.
  • Monitor for adherence to industry practices and policies.
  • Systematically detect potential malicious activity and use user-configurable policies to block attacks that may transpire.

The collaboration harnesses the power of artificial intelligence (AI) to help organizations quickly apply data classification and context-aware analysis to APIs in their estate. With this inventory, the technology can analyze and assess each API for misconfigurations, vulnerabilities and alignment to industry practices. It can even provide suggested remediation steps for APIs that appear susceptible to attackers.

Get started with Noname Advanced API Security for IBM

Standing strong against the never-ending evolution of cyberattacks requires bold innovation on the part of security solution providers. The IBM-Noname Security collaboration is just that—a union to help address one of the fastest-growing threats.

Learn more about Noname Advanced API Security for IBM

Sign up for a live demo to see it in action


[1] Source: Gartner, API Security Maturity Model, William Dupre, Gary Olliffe, November 30, 2022. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

The post Why advanced API security is critical to outsmarting new threats appeared first on IBM Blog.

AI Generated Robotic Content

Recent Posts

Had to keep it going

Continuing the music video u/optimisoprimeo posted: https://www.reddit.com/r/StableDiffusion/comments/1t64gni/so_far_this_is_my_favorite_usecase_for_ltx/ submitted by /u/hidden2u [link] [comments]

19 hours ago

What Matters in Practical Learned Image Compression

One of the major differentiators unlocked by learned codecs relative to their hard-coded traditional counterparts…

19 hours ago

Secure short-term GPU capacity for ML workloads with EC2 Capacity Blocks for ML and SageMaker training plans

As companies of various sizes adopt graphic processing units (GPU)-based machine learning (ML) training, fine-tuning…

19 hours ago

Gemini 3.1 Flash-Lite is now generally available on Gemini Enterprise Agent Platform

Today, we’re thrilled to announce that Gemini 3.1 Flash-Lite, our fastest and most cost-efficient Gemini…

19 hours ago

Musk v. Altman Evidence Shows What Microsoft Executives Thought of OpenAI

Leaders at the tech giant were skeptical of OpenAI—but wary of pushing it into the…

20 hours ago