F5 distributed cloud API security
Automatically discover endpoints mapped to your applications, allow or deny list unwanted connections, and monitor for anomalous behavior.
Discover and map APIs, block unwanted traffic and connections, and prevent data leakage
Improve API Visibility and Protection
APIs change frequently. With F5, easily and continuously identify all API endpoints mapped to your applications and monitor anomalous activities or shadow APIs including blocking of suspicious requests and endpoints. Our solution helps you generate OpenAPI spec files to minimize manual tracking of API endpoints while reducing time spent configuring and deploying API security policies.
Limit Data Loss
Better understand and monitor data being exposed by your APIs. Streamline the discovery, tagging and reporting on data including common PII, compliance related data types (e.g. PCI-DSS, HIPAA, GDPR etc) and customer patterns – with capabilities to limit, mask or block APIs from exposing this data.
Reduce exposure of API vulnerabilities in production
Seamlessly integrate into API code repositories to begin discovering and monitoring your APIs earlier in the development lifecycle. Helping you get visibility and understanding of your APIs and any vulnerabilities before they are released into production ensures that your APIs meet your security and/or compliance standards, APIs that don’t meet your standards can be protected while code fixes are implemented – limiting the number of unchecked vulnerabilities pushed into production.
Achieve full API lifecycle security
Integrate security into the CI/CD process through a comprehensive approach to protecting your APIs from design, build and test, and throughout production. Our solution ensures your APIs are secured at every stage, identifying and addressing potential vulnerabilities earlier before release and continuously monitoring and protecting against threats and misuse once released.
Product overview
Discover, govern, and protect your APIs with Distributed Cloud API Security
Distributed Cloud API Security provides discovery and deep insights from use of AI/ML. Identify shadow APIs and block API attacks in real time and eliminate vulnerabilities at their source. The SaaS-based portal enables users to manage and go deep for threat analytics, forensics, and troubleshooting of API communications for modern applications.
Core capabilities
Delivers a broad approach to API security with a combination of governance, monitoring, and enforcement functionality to help organizations detect and block Open Web Application Security Project (OWASP) API Top 10 attacks.
Automatic API discovery
Detect and map all APIs directly from code repositories, through traffic analysis and external domain crawling including forgotten, unmanaged and shadow APIs, for a complete view into an apps ecosystem including automatic generation of OpenAPIspec (OAS) files.
Import API schema
Automatically create and enforce a positive security model with learned or existing OpenAPI specifications.
Sensitive data detection and protection
Identify and report on sensitive data being exposed including common PII, and data types relevant to critical compliance frameworks (e.g. PCI-DSS, HIPAA, GDPR etc.) – with capabilities to limit, mask or block.
ML-based traffic monitoring + AI assistant
Monitor all traffic through continuous machine learning, allowing organizations to maintain behavioral baselines, while flagging and blocking suspicious activity over time. Augmented with an AI assistant, leveraging the power of natural language queries to streamline analysis of and access to API security events, with context and actionable recommendations.
Authentication discovery and risk scoring
Identify and baseline the authentication state of all APIs within an environment, allowing for automatic discovery with views into authentication status, details, and risk score.
API protection and enforcement
Limit, control and block API endpoints and suspicious or malicious activity through a combination of in-line app and API security capabilities with WAF, including granular L7 policy engine.