- 28 Jun 2024
- 1 Minute to read
- Print
- PDF
API Protection
- Updated on 28 Jun 2024
- 1 Minute to read
- Print
- PDF
Traceable's API Protection is divided into Protection, API Abuse, and Audit. API protection is the next step after Traceable has discovered APIs in your ecosystem, and you have observed their behavior using API Catalog.
The Protection section provides you with detailed information on Threat actors, the APIs that are under threat, threat activities, and the events that are generated. You can start your API Protection journey by viewing all the Threat actors in your API infrastructure in the chosen time duration. The threat actors are further segregated into active, monitored, suspended, and so on. Once you have viewed the threat actors in your system, you can view the APIs that are under threat or being probed by these threat actors. The APIs under threat section provides detailed information such as the number of attackers, the number of active attackers, and so on. The activities carried out by threat actors lead to generation of various Security Events. Traceable displays all such security events. The Threat activity section provides summary as well as an in-depth view of all the identified threat activities for the chosen time duration. You can filter these threat activities based on various filters, such as threat activity, threat actor, and so on.
The API Abuse section provides you detailed information on Data Protection and Fraud Prevention. Traceable provides a summary as well as detailed information about data exfiltration, along with the user information associated with data exfiltration attempts. The Protection Settings section provides you options to configure the various Detection and Custom policy, and the parameters for Threat scoring.