Virtualization Technology News and Information
Article
RSS
Wallarm Releases New End-to-End Solution to Reduce Risk and Time-to-Remediate Leaked API Keys and Secrets

Wallarm announced the early release of the Wallarm API Leak Management solution, an enhanced API security technology designed to help organizations identify and remediate attacks exploiting leaked API keys and secrets, while providing on-going protection against hacks in the event of a leak.

In light of the recent surge in hacks involving leaked API Keys and other API secrets, Wallarm developed the API Leak Management solution to provide a comprehensive answer to this problem by automatically discovering leaked API keys and secrets, implementing controls to block their use, and protecting against any follow-on attacks. This prevents unauthorized access to sensitive data within enterprise companies while protecting their internal operations and end customers from unauthorized use of that data.

"API keys and secrets are an essential part of enterprise applications, but they are also a common target for attackers since they provide direct access to the data and infrastructure," said Ivan Novikov, CEO and co-founder of Wallarm. "Our API Leak Management solution allows enterprise customers to automatically detect and block the use of leaked API keys, providing an additional layer of security for their data to reduce organizational risk."

In recent months, enterprise companies like CircleCI, Slack, and LastPass have seen an escalation in attacks involving leaked API keys and other API secrets. While API key leakage incidents are not new, complicated tech stacks, longer and more complex supply chains, and overstretched engineering teams are resulting in more frequent - and more damaging - attacks.

With the average cost of an API leaking incident at $1.2 million per year, safeguarding API keys is both a security and financial imperative. Locating and revoking API keys in a timely manner is both time-consuming and resource-intensive, so Wallarm's proactive API leak management solution prioritizes automated detection, remediation, and control through a three-prong approach:

  1. Detect. Wallarm automatically scans public sources for leaked API secrets, which hackers can find and abuse in less than 1 minute.
  2. Remediate. Wallarm immediately blocks requests using compromised API secrets across the entire API portfolio, regardless of protocol.
  3. Control. Wallarm also continuously tracks and blocks any subsequent use of leaked API secrets.

A first in the API security space, the Wallarm API Leak Management solution is integrated with other Wallarm capabilities, including API Discovery, API Threat Prevention, and Cloud-Native WAAP. Customers get full-spectrum visibility, detection, and protection for their entire web application and API portfolio, regardless of protocol or environment, via the Wallarm API Security Platform. This reduces tool sprawl and cost while improving risk management and supporting innovation.

Published Thursday, January 19, 2023 1:01 PM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<January 2023>
SuMoTuWeThFrSa
25262728293031
1234567
891011121314
15161718192021
22232425262728
2930311234