API Security
  
API Security
F5 Distributed Cloud API Security 
 
Automatically discover endpoints mapped to your applications, allow or deny list unwanted connections, and monitor for anomalous behavior. 
 
API endpoint identification, mapping, and protection 
 
APIs change frequently. Easily identify all API endpoints mapped to your applications and monitor anomalous activities or shadow APIs including blocking of suspicious requests and endpoints. Generate API schema and Swagger files to minimize manual tracking of API endpoints. Reduce time spent configuring and deploying API security policies. 
 
Enable a positive security model 
 
Integrate with your CI/CD pipeline to capture API changes. Upload an existing API schema for enforcement of appropriate API behavior. No wasted time spent configuring and deploying APIs—the service will know exactly what endpoints, methods, and payloads are valid, tightening security against abuse. 
 
 
 
Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. Identify shadow APIs and block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of API communications for modern applications. 
 
Public cloud 
 
Manage and protect application workloads hosted across clouds including AWS, Azure, GCP, etc.  
 
On-premises 
 
Manage and protect applications at the data center and edge sites. 
 
F5 Global PoPs 
 
Manage and protect application workloads from any of the points of presence (PoPs) on the F5 global network. 
 
Core Capabilities 
 
Detect and block attacks listed in the OWASP API Top 10 in real time by using automatic detection at the development and production layer. 
  • Import API schema
  • Automatic API discovery
  • Lifecycle security
  • ML-based traffic monitoring
  • Visualize API usage
  • Automated policy generation 
If you have any questions about F5 solutions, please, write us at: f5@bakotech.com