{"id":278,"date":"2022-04-08T14:33:12","date_gmt":"2022-04-08T13:33:12","guid":{"rendered":"https:\/\/42crdev.prexihost.com\/?page_id=278"},"modified":"2024-02-29T09:40:53","modified_gmt":"2024-02-29T09:40:53","slug":"datasheets","status":"publish","type":"page","link":"https:\/\/staging2022.42crunch.com\/datasheets\/","title":{"rendered":"Datasheets"},"content":{"rendered":"\n\n\t\t
Datasheets on the 42Crunch API Security Platform, API security, API security testing, \u00a0runtime API threat protection, API Governance, API Inventory, API Design, API Development, OWASP API Security Top 10 and platform integrations.<\/p>\t\t\n\t\t
Automated API Security from Design to Production. No manual rules. No guesswork. No false positives.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Extend protection beyond the edge. Protect APIs north-south and east-west traffic with 42Crunch.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t Delivering a seamless DevSecOps environment for API security from design through to runtime.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Address API threats across the entire cloud application lifecycle.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Find and fix API vulnerabilities before they move to production with 42Crunch and GitHub.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n REST API Static Security Testing Extension for Pipelines makes OpenAPI editing a breeze.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Increase API Security for Azure API Management.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Improve API Security for Apigee Edge API Gateway.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Enhance API Security for Kong API Management.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Upgrade API Security for WSO2 API Management.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Upgrade API Security for Axway API Management.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\n\t\t The 2023 OWASP API Security Top 10 vulnerabilities list explained. Also includes use case examples and tips on how to protect your APIs from these threats.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n The 2019 OWASP API Security Top 10 vulnerabilities list explained. Also includes use case examples and tips on how to protect your APIs from these threats.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t A solid API design practice is the foundation of reusable, scalable, documented and secure APIs, indeed many companies have embraced an API Design-first approach to ensure this consistency is achieved.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\n\t\t\t\t\n Key to secure API development is to make it easy for development teams to deliver security throughout the SDLC, without ever having to leave their preferred development environment.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\n\t\t\t\t\n API security testing is aimed at identifying vulnerabilities in your APIs and ensuring your APIs are verified as secure before deployment. Our mantra is test early, test often, test everywhere.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n Despite taking steps to improve security at API design and development time, your APIs will inevitably still come under attack in production. A defense-in-depth approach is the foundation of risk reduction.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\n\t\t\t\t\n API Governance in relation to API security can be defined as the governance process that ensures APIs are designed, developed, tested, and protected in compliance with an organization’s security process.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\n\t\t\t\t\n If an organization does not have up-to-date API inventory under version control, it could be at risk for things like shadow or zombie APIs, unauthorized access to user data and Account Takeover through the API.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t Extend protection beyond the edge with the 42Crunch API Security Platform and ensure API protection.<\/p>\n\t\t\t\n\t\t\t\t\t\t\tDownload\n\t\t\t\t\t<\/a>\n\t\t\t\t\n\t\t\t\t\n\n\n\t\t42Crunch for Microservices\n\t<\/h2>\n\t
\n\t\t\t42Crunch\n\t\t\t\t\t\t\t\t\t\t\tIntegrations\n\t\t<\/h2>\n\t\t\t\t\n
\n\t\t42Crunch and Microsoft\n\t<\/h2>\n\t
\n\t\t42Crunch & Microsoft Defender for APIs\n\t<\/h2>\n
\n\t\t42Crunch & GitHub Integration\n\t<\/h2>\n\t
\n\t\t42Crunch for Azure Pipelines\n\t<\/h2>\n\t
\n\t\t42Crunch for Azure APIM Integration\n\t<\/h2>\n\t
\n\t\t42Crunch & Apigee Integration\n\t<\/h2>\n\t
\n\t\t42Crunch & Kong Integration\n\t<\/h2>\n\t
\n\t\t42Crunch & WSO2 Integration\n\t<\/h2>\n\t
\n\t\t42Crunch & Axway Integration\n\t<\/h2>\n\t
\n\t\t\tOWASP API Security\n\t\t\t\t\t\t\t\t\t\t\tTop 10\n\t\t<\/h2>\n\t\t\t\t\n
\n\t\tOWASP API Security Top 10 2023 Cheat Sheet\n\t<\/h2>\n\t
\n\t\tOWASP API Security Top 10 2019 Cheat Sheet\n\t<\/h2>\n\t
\n\t\t\tThe 6 Pillars of\n\t\t\t\t\t\t\t\t\t\t\tAPI Security\n\t\t<\/h2>\n\t\t\t\t\n
\n\t\tAPI Design\n\t<\/h2>\n\t
\n\t\tAPI Development\n\t<\/h2>\n\t
\n\t\tAPI Security Testing\n\t<\/h2>\n\t
\n\t\tAPI Threat Protection\n\t<\/h2>\n\t
\n\t\tAPI Governance\n\t<\/h2>\n\t
\n\t\tAPI Inventory\n\t<\/h2>\n\t
\n\t\t\tAdditional\n\t\t\t\t\t\t\t\t\t\t\tInformation\n\t\t<\/h2>\n\t\t\t\t\n
\n\t\t42Crunch vs. Web Application Firewalls\n\t<\/h2>\n\t
\n\t\tReady to Learn More?\n\t<\/h2>\n\t