Discover and map APIs, block unwanted connections, and prevent data leakage
Automatically discovery endpoints mapped to your applications, allow- or denylist unwanted connections, and monitor for anomalous behavior.
Modern applications are constantly evolving, with increased dependencies on APIs. These API endpoints increase an application’s attack surface area and introduce new risks and vulnerabilities that current security tools struggle to mitigate.
The volume of APIs is rapidly increasing, with new vulnerabilities emerging that risk exposing sensitive data. Security teams are struggling to manage and identify exponential numbers of endpoints and connections across their infrastructure.
Developers often deploy public APIs, bypassing internally mandated security processes and procedures.
Orgs with CI/CD pipelines deploy new code and APIs swiftly, perhaps overlooking security requirements.
Developers often unintentionally expose sensitive datasets that may be leaked accidentally.
Permissions need to be set to prevent one user from accessing another user’s data.
Rapid deployment via SaaS, with simple API discovery, plus import and export capabilities that lead to operational savings.
Points of presence (PoPs) with API security deliver high-speed, scale, and API security for apps regardless of location including on-premises, across clouds, or at the customer edge.
Deploy, manage, and observe API security including comprehensive app protection with WAF, DDoS Mitigation, and Bot Defense, along with networking metrics through a single, centralized user interface. |
Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. Block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of modern applications.
Detect and block Open Web Application Security Project (OWASP) API Top 10 attacks in real time by using automatic detection at the development and production layer.
Automatically create and enforce a positive security model with your own OpenAPI specifications.
Detect and map all APIs across your applications, including forgotten and shadow APIs, for a complete view into an apps ecosystem with export capabilities.
Integrate security into the API lifecycle process via CI/CD tools or leading API management vendors.
Continuous machine learning monitors all traffic, allowing API security to maintain baselines, and predict and block suspicious activity overtime.
Easily identify usage patterns of APIs, and correlate good and bad actor activity to optimize APIs for a better client experience.
Automatically generate policies based on App-to-App and API-to-API patterns.
APIs change frequently. Easily identify all API endpoints mapped to your applications and monitor anomalous activities or shadow APIs including blocking of suspicious requests and endpoints. Generate API schema and Swagger files to minimize manual tracking of API endpoints. Reduce time spent configuring and deploying API security policies.
Integrate with your CI/CD pipeline to capture API changes. Upload an existing API schema for enforcement of appropriate API behavior. No wasted time spent configuring and deploying APIs—the service will know exactly what endpoints, methods, and payloads are valid, tightening security against abuse.
Distributed Cloud Services can be delivered to apps running on any platform, on any public/private cloud. Connect and secure apps running in VMs, containers, bare metal, or serverless.
Supports multiple service discovery protocols simultaneously. Consul, Kubernetes, and DNS work out of the box. Istio or Linkerd service mesh can integrate with a Distributed Cloud Services ingress/egress gateway.
F5’s native Terraform provider, vesctl CLI tool, and public APIs deliver to the automation needs of app teams. Support for tools like Opsgenie or Slack for alerting, and Splunk or Datadog for SIEM, simplify life for DevOps and SecOps teams.
F5 Distributed Cloud API Security delivers application and API security anywhere—with flexibility in architecture, routing, and policy enforcement across public/private clouds, on-premises data centers, and edge sites with centralized visibility and management via a SaaS-based console.
Manage and protect application workloads hosted across clouds including AWS, Azure, GCP, etc.
Manage and protect application workloads from any of the points of presence (PoPs) on the F5 global network.
Manage and protect applications at the data center and edge sites.
Article
F5 Distributed Cloud WAAP - Introducing the Distributed Cloud API Security