Cyber Security Product Migration and Interoperability


SOLUTION SUMMARY

API AutoFlow Cybersecurity Product Migration and Interoperability

Cyber Security Product Migration & Interoperability

DEEP VISIBILITY AND REMEDIATION

  • Transform data from external sources for consumption into a security analytics engine.
  • Provide deep visibility into API communications (service frontend for Kubernetes, Service, Mesh, Functions)
  • Remediate malicious activity and vulnerable hosts programmatically 

 

DATA TRANSFORMATION

Transform data from external sources for consumption into a security analytics engine.

  • Collect and transform log and event data by field, keyword, and format into the Security engine data format
  • AutoFlow can collect logs when deployed inline and remotely via API interaction (Splunk, Elastic)
  • Forward select logs to the security analytics engine

 

API LAYER, INTEROPERABILITY

Provide deep visibility into API communications (service frontend for Kubernetes, Service, Mesh, Functions)

  • Make visible shadow APIs
  • Report on Shadow API use
  • Log API interactions
  • Make visible your API attack footprint
  • API Discovery
  • Log API communications 

 

REMEDIATION OF MALICIOUS ACTIVITIES

Remediate malicious activity and vulnerable hosts programmatically

  • Create SOAR workflows to accelerate incident response
  • Security engine signals to AutoFlow API to delete malicious sessions or apply custom session routing actions (e.g. direct malicious hosts to non-production services)
  • AutoFlow can apply input validation and keyword-matching rules to detect malicious activity

 

ABOUT THE CUSTOMER

For security reasons, API AutoFlow customers generally do not disclose their names as API AutoFlow is deployed in their core infrastructure.

Interested in Learning More about Interactor?