fbpx

Register to Watch


As the majority of sensitive data now flows through API’s in organizations, data leakage needs to be prevented by monitoring behavioral anomalies anchored around sensitive data sets.

We cover how building baselines of sensitive data usage by the standard user population vis a vis suspicious users, API call flow, inter API time intervals, and device fingerprinting, etc., can help prevent sensitive data exfiltration via APIs.

See examples of how a range of API Abuse patterns have been detected using this approach.

Speaker

Sudeep Padiyar
Director, Product Management
Traceable