Noname Security has announced enhancements to its API security platform. They are designed to help organizations protect their API ecosystem, secure their applications and increase cyber resiliency.

The latest major release of Noname delivers new capabilities across the entire platform – spanning discovery, position management, runtime protection, pre-production testing and deployment.

Noname Security’s detection and health management solutions detect and provide information about every API in an organization’s ecosystem, revealing vulnerabilities, protecting sensitive data, and proactively monitoring for changes, including to OpenAPI and other specifications.

The new capabilities allow customers to:

– Gain full visibility and detailed API protection information with custom discovery, flexible tagging, and assignment of data types – including PII, PCI, PHI, and user categories – to group APIs by application, business unit, and more.

– Understand APIs in rich context with visualizations of business logic, physical network infrastructure, and API traffic.

– Protect containerized applications with enhanced discovery and detection for Kubernetes (k8s).

– Prioritize resources and eliminate “dead spots” with extensive infrastructure inventories for AWS and Azure that allow organizations to discover unprotected APIs, map connections between APIs and infrastructure resources, pinpoint resources that could increase attack surface, and resolve potential issues with full context.

Noname Security Runtime Protection detects and blocks API attacks with real-time traffic analysis, external monitoring, remediation options, and workflow integration to increase SOC efficiency. New capabilities allow customers to:

– Instantly identify business logic-based attacks with updates to the industry’s most advanced anomaly detection engine using artificial intelligence and machine learning (AI/ML), including unsupervised online learning.

– Reduce mean time to resolution (MTTR) with more context to problem records, including detailed troubleshooting guidance and tools for deeper investigation.

– Full compliance with Security Operations Center (SOC) processes with automation, custom workflows, and integrations with existing systems such as ITSM, SIEM, SOAR, etc.

Tags: , , , , , , , , , , , , , , , , , , , , ,
Editor @ DevStyleR