Advanced API Security with Neosec and Kong for Your Business

API Detection and Response Solution for F5

Together, Neosec and F5 deliver a combined solution that is a first of its kind in discovering and protecting APIs. It brings together the Neosec ability to continuously discover APIs and its behavioral analytics approach to security with the ability to manage and automatically remediate and respond to threats in the F5 BIG-IP.

Digital transformation is driving the exponential increase in API rollouts, enabling organizations to remain relevant and accelerate their business with new revenue streams. But APIs are now a growing and significant attack surface that requires a different type of protection. APIs expose core business functionality by nature, their implementation is distributed and often not uniform, and CI/CD pipelines ensure they are in constant flux.

API Security Challenges Solved

icon-001

Maintain an API Inventory

You cannot protect what you don’t know about. Undiscovered, undocumented, or shadow APIs deployed by distributed teams are a problem for every organization.

icon-002

Understand Your API Risk Posture

After discovering your API estate, knowing which ones pose the most risk is critical. Understanding which APIs transmit sensitive data is vital during any risk audit.

icon-003

Protect Against OWASP API Top 10 Vulnerabilities

Adequately protecting your APIs from vulnerabilities is difficult in ever changing agile organizations and traditional security techniques like signature matching are insufficient.

icon-004

Detect Attacks from Authenticated Users

Business logic abuse, misuse of legitimate access, and account takeover often go undetected as traditional tools lack the context required for detecting API attacks.

icon-005

See Behavior with Business Context

Without the correct tools, seeing all your API usage data over time and understanding the business context of abusive behavior is impossible.

icon-006

Investigate and Hunt API Activity

Attempting to investigate API-related incidents, find indicators of compromise, or troubleshoot a user’s problem requires retained data and the correct tools.

api-device-img

Load Balancer and WAF with API Security

The joint solution between F5 and Neosec integrates the F5 BIG-IP platform that includes modules like load balancer and firewall with an enterprise class security platform that discovers all your APIs (not just those managed by F5), and protects your APIs from business abuse and data theft.

A Technology Partnership for Your API Management Journey

Neosec and Kong’s partnership partnership delivers a combined solution that is a first of its kind in protecting APIs. It brings together the Neosec ability to continuously discover APIs and its behavioral analytics approach to security with the ability to manage and automatically remediate and respond to threats in the Kong API Gateway.

API Security Features

kong
neosec

Authentication

check-green-icon

 

Authorization

check-green-icon

 

Rate Limits

check-green-icon

 

API Discovery

 

check-green-icon

API Risk Audit

 

check-green-icon

Detect API Threats Using Behavioral Analytics

 

check-green-icon

Investigate API Alerts

 

check-green-icon

API Threat Hunting

 

check-green-icon

Managed Threat Hunting

 

check-green-icon

Kong + Neosec: A Technology Partnership for Your API Management Journey

Neosec is integrated into the Kong gateway with a simple installation using the standard TCP log plugin. The power of the integration is the ability to perform response automation actions in your Kong API gateway based on alerts created by Neosec. In a few clicks, you can create a response policy to automatically block or rate limit an alerted “consumer” entity for a period based on defined conditions. The integration also allows the creation of prevention rules for your Kong API gateway leveraging the rich AI/ML model outputs available for every user and business entity via the Neosec API.

icon-magnific

Discovery & Risk Audit

Discover your entire API estate without adding another sensor. Visibility into your API inventory is easy and takes minutes. Easily perform an audit to know which APIs are risky or vulnerable. context required for detecting API attacks.

icon-002-1

Investigations & Threat Hunting

Powerful investigation capabilities allow you to understand risky behavior. Easily investigate alerts and hunt for threats hiding in your API traffic.

icon-003-1

Behavioral Analytics & Context

The Neosec brain is an analytics engine that examines all your API usage data over time. Prevent abuse with context-aware security and see all activity on a timeline.

icon-004-1

Response & Prevention

Create customized conditional response playbooks that improve your security and DevOps processes and work with your existing technologies like F5.

Kong + Neosec framework

Learn More About Neosec + Kong