{"id":16927,"date":"2023-08-23T16:33:08","date_gmt":"2023-08-23T15:33:08","guid":{"rendered":"https:\/\/staging2022.42crunch.com\/?p=16927"},"modified":"2023-09-06T21:42:18","modified_gmt":"2023-09-06T20:42:18","slug":"why-most-api-security-solutions-have-not-delivered-on-the-hype","status":"publish","type":"post","link":"https:\/\/staging2022.42crunch.com\/why-most-api-security-solutions-have-not-delivered-on-the-hype\/","title":{"rendered":"Why most API Security solutions have not delivered on the hype"},"content":{"rendered":"

Discovering your APIs does not secure your APIs<\/h3>\n

Over the past few months, we\u2019ve heard countless variations of the following from customers and prospects – \u201cWe brought a vendor in last year that told us they could discover all of our rogue APIs, tell us where our sensitive data was flowing, and find where and how our APIs are being attacked. We’re now 10 months in and we’ve deployed across only 10% of our APIs, we’re being inundated with false positives, and we feel no closer to addressing the core issue – that we have vulnerable APIs<\/em>.\u201d<\/p>\n

Looking for the Easy Button<\/h4>\n

As a product category, API Security solutions could be classified as residing in the early phases of Geoffrey Moore\u2019s technology adoption lifecycle<\/a>. Many early adopters have chosen to tackle the problem with traffic analysis tools that use AI\/ML to discover known and unknown APIs and identify suspected attacks.<\/p>\n

It\u2019s easy to see why these solutions have garnered interest as CISOs come under pressure to do something in light of the ever increasing volume of API breaches that make headlines every week. The idea of deploying something at the perimeter to detect where the weak spots are seems like a reasonable place to start – especially since pushing packets to another security device on the network is quick and easy. Furthermore, most security teams may be hoping that this will become another one of those \u201cset it and forget it\u201d types of tools that, once tuned, will require minimal overhead.<\/p>\n

While there\u2019s no doubting the value of runtime monitoring tools when it comes to an API protection program, it seems that many early adopters of this approach have struggled to make meaningful progress.<\/p>\n

Fixing the API Security Problem<\/h4>\n

Based on our discussions with many of these enterprises we have identified three common themes emerging:<\/p>\n