Drop-in API security for your NGINX deployments
With the Traceable plugin for NGINX, customers can easily implement a highly scalable modern application and API security solution, replacing existing WAF and RASP deployments. NGINX customers that implement Traceable see a significant upgrade to their application and API security, deploying in less than 5 minutes.
Together, Traceable and NGINX have partnered to create an integration that delivers Traceable’s Application and API security across NGINX deployments. Powered by distributed tracing, Traceable is able to deeply understand applications built on micro services architectures, enabling end-to-end security from user to data. Traceable can understand the inner working of the application, how it changes, and normal baseline behavior that allow it to surface anomalies that can be alerted on or immediately blocked – ensuring your application is secure and resilient.
Read documentation for Traceable NGINX agent
Watch NGINX & Traceable joint webinar
Key Benefits
API Discovery
Traceable monitors stateless API traffic to reconstruct the full API DNA including the name, parent service, headers, parameters and payloads to provide full visibility and change management for external and internal APIs.
API Intelligence & Risk Monitoring
Per endpoint risk scores and threat indexes help prioritize focus. Risk scores are continuously calculated based on the likelihood and possible impact of an attack. Threat indexes show the current level of threat activity.
Prevent Sensitive Data Exposure
OWASP API TOP 10 - API Protection
OWASP TOP 10 - Web Protection
Traceable analyzes web traffic as it passes through your application, blocking cyber-attacks before they can get your sensitive data. Protect against web application attacks such as SQL injections, Cross-site Scripting (XSS) and XML External Entities (XXE).
Security Analytics
Resolve Threats Faster
Visualize security events as kill chains as executed by cybercriminals, helping to streamline threat analysis, forensics, and remediation.
Triage Attacks Faster
Perform Deep Forensics
Drill down into system behavior and identify the errors, users, URL, possible security events and relevant parameters needed to address the risk.