As seen on DevOps Digest
Neosec formed a strategic partnership with Kong Inc. to integrate its API security platform with Kong Gateway to provide a complete enterprise-class solution for managing and securing APIs and microservices.
Kong provides an API gateway, built for hybrid, multi-cloud environments optimized for microservices and distributed architectures. Neosec enables Kong customers to easily gain enterprise API security capabilities to protect their critical business processes. Neosec continuously discovers all APIs, and using API behavioral analytics, detects abuse and automatically orchestrates conditional responses on specific consumer entities into the Kong API gateway. The technology integration is the first API security solution with closed loop feedback into an API gateway.
"As more enterprises embrace digital transformation initiatives and expose APIs, core aspects of business processes are increasingly put at risk. In this modern environment, API security cannot only create alerts for a security team to evaluate, but it must also work with existing API technologies in creating automated responses," said Giora Engel, CEO, Neosec. "Our strategic partnership with Kong enables the platforms to natively work together using their existing Kong Gateway Enterprise deployment without requiring any changes to the production pipeline."
With this integration, Kong Gateway provides an excellent way to manage the complexities of deploying and using APIs, while the Neosec platform augments the security posture with API discovery, risk assessment, and AI-powered behavioral analysis, detection and response. As a result of security incidents, the Neosec integration automatically creates security policies in Kong Gateway and enables automated responses. Kong Gateway includes API authentication, authorization, logging, traffic control, caching and administration. Neosec ingests access logs from popular technologies like CDNs, Web app firewalls and API gateways. The Neosec platform enables API discovery and automatically flags meaningful anomalous behaviors within them. The combined solution enables enterprises to embrace the power of digital business while minimizing the risks without any changes to the production pipeline.