Deploying Wallarm
with Kong
The combination of Kong and Wallarm enables superior API management and security with a DevOps-friendly deployment and management delivery:
- Manage your API Security layer with the same way you do your API Gateway
- Results in vastly improved API protection and reduced organizational risk

Better Together
While Kong API Gateway provides the foundational pieces to build and manage APIs in a secure manner, modern enterprises need to layer more advanced API protections to defend against growing API-specific threats. Kong and Wallarm work together to provide full spectrum API security.
Kong API Gateway –
API Security Fundamentals
%201.png)
Application and User Authentication (basic auth, API Key, OAuth/OIDC, LDAP, etc.)
Access Control (ACLs, JWT scopes, etc.)
Encryption Tunnels with digital certificate exchange (mTLS)
Cross-Origin Resource Sharing (CORS)
Rate Limiting & Caching
Wallarm API Security – Advanced API Protection
OWASP API Security Top-10 risks (Injections, BOLA, etc.)
Automated API Discovery and Inventory (new / changed endpoints, PII data, etc.)
API Abuse and Misuse Protection
API Risk Scoring
API Security Testing / Misconfiguration Detection
Block Malicious traffic sources (Tor actors, geos)
Comprehensive Protection Against API Threats
Security and DevOps teams choose Wallarm to discover all cloud-native APIs and legacy web applications running in their environment, and to detect & respond to threats against them.

Regain control over your API attack surface with runtime visibility across your entire API portfolio.

Protect against well-known OWASP Top-10 web application security risks, OWASP API Security Top-10 risks, and other advanced threats, such as Injections, BOLA, and authentication failures.

Defend your APIs in seconds without relying on tedious manual configurations and outdated or inaccurate API specs.

Drastically reduce 0-day risks by applying virtual patches to critical issues on the fly.

Meet compliance requirements by tracking and protecting sensitive data, including PII, financial & health data, credentials and more.

Prevent account takeover (ATO) and other behavior-based attacks which can lead to large-scale breaches.

Automatically find and report JSON Web Token (JWT) weaknesses and attacks to deter unauthorized access.

Minimize API drift and prioritize security efforts (like pen tests or bug bounties) with alerts on new, changed or deprecated endpoints.
Native Integration for Better API Security
Wallarm API Security platform deploys directly into your Kong API Gateway, natively integrating the additional API security layer necessary to protect your API portfolio.

Wallarm integrates natively into your Kong API Gateway instances, including both Kong Enterprise and Kong Community (open source) editions. Deployment options include:

Kong Gateway with K8s Ingress Controller with Wallarm

Kong with Wallarm sidecar

Kong with Wallarm proxy balancer
And Wallarm API Security integrates into your Kong API Gateway regardless of deployment scenario: cloud (including AWS, GCP, Azure, etc.), multi-cloud, private data centers, Kubernetes environments, and more.
Advanced API Security for Reduced Risk
Wallarm provides real-time detection and mitigation –– no reliance on other tools or complicated workflows. And the unique Wallarm approach results in maximum performance and near-zero latency.
Workflow Simplification
Wallarm integrates easily into your existing workflow, reducing learning curve and duplicative effort – and improving time-to-protection.

























- AWS, GCP, Azure, IBM Cloud
- Private, Hybrid and Multi-Cloud
- Kubernetes / Service Mesh
- Zero-Trust
- OWASP Top-10 Threats
- API-specific Threats
- Credential Stuffing
- L7 DDoS and Bots
Trusted by Security & DevOps Teams Globally
Fortune 500 and many other of the world’s largest tech companies rely on Wallarm to protect their APIs and web applications.
Additional Resources
Want more? Here is some further information about integrating Wallarm into Kong.

Kong and Wallarm together provide superior API management and security.

Step-by-step guide to installing Wallarm API Security platform with Kong.

Read this blog post from Revenera about their experience deploying Wallarm with Kong.

Learn more about integrating Wallarm into Kong.
Wallarm helps you develop fast and stay secure.