Traceable monitors how your API endpoints are communicating and how your application services are behaving. We use our machine intelligence to send ONLY valid alerts - whether its highly anomalous user behavior or an anomalous flood of incoming API calls from a foreign IP address.
With a series of sophisticated algorithms, Traceable establishes a baseline of normal API behavior, app services, and data. With high accuracy, if there is an event or behavior that is sufficiently malicious based on our ML models – Traceable generates a valid security alert in real-time giving your security team and the SOC the ability to take action on any threat event happening at runtime.
Since Traceable is deployed at your API edge – i.e. within an API gateway, a proxy, or service mesh – we give you the ability to detect and block a variety of API and web-based attacks. You can tell Traceable to detect all remote code execution attacks, DDoS attempts, or any API object authorization bypass.
More than just detecting, you can run Traceable in blocking mode that will prohibit any of these attacks or events across your environment. You can block threats based on threat actor, IP range, geolocation, or attack type like cross-site scripting, parameter anomalies, or recent CVEs like Log4js or Log4shell.