Organizations use API protection tools to prevent malicious attacks or misuse of application program interfaces (API). APIs are commonly used as a key to programming web-based interactions enabling access to sensitive software functions and data, thus becoming a primary target for attackers. The API Protection Tools enables breach detection and prevention by identifying anomalous behaviors and breaks at the application’s business logic level. IT departments and developers use API protection tools to identify vulnerabilities for any Personally Identifiable Information(PII) and sensitive data leaks. Predefined policies and rules in the tool provide real-time mitigation from the API attacks