Published: 28 August 2019
Summary
Despite growing awareness of API security, breaches continue to occur. API management and web application firewall vendors, as well as new startups, are addressing the problem. But application leaders independently must design and execute an effective API security strategy to protect their APIs.
Included in Full Research
- Discover Your APIs Before Attackers Discover Them
- Use a Combination of API Management and Web Application Firewalls to Protect APIs, in Conjunction With Identity Infrastructure
- Adopt a Continuous Approach to API Security
- Use a Distributed Enforcement Model to Protect APIs Across Your Entire Architecture, Not Just at the Perimeter