Register for 09/13 webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Watch the webinar: NIST CSF 2.0, API Security, and CISO Imperatives
Register for 09/13 webinar: NIST CSF 2.0, API Security, and CISO Imperatives
WEBINAR

August 26, 2021

Workshop: API threats simulation with open-source tools 2021

Do you still think that WAFs and API gateways are effective in protecting exposed APIs against emerging threats? During this workshop, we’ll demonstrate a variety of the attacks that can easily bypass modern WAFs and hit exposed workloads. So how should you evaluate the effectiveness of your security toolchain and test if they can mitigate API-specific threats?

Join our workshop to learn:

  • What is the difference in attacks against REST, SOAP, graphQL, gRPC APIs today?
  • How to simulate API-specific attacks with open source tools?
  • How to evaluate an existing security toolchain in protecting your APIs?

Lear more:

Thanks for the download. 
Thank you for registering for our webinar, you will receive a confirmation email shortly. We look forward to seeing you soon!
Thanks for filling out the form!
The webinar link will open in the new tab. If its not, please follow
this link

Our Speakers

Ivan Novikov
CEO at Wallarm

Our Speakers

Ivan Novikov
CEO at Wallarm

Trusted by the world’s most innovative companies:

15 min

To unboard and view secutity results
“I needed cloud security tooling that could get me visibility fast. Wallarm answers all my visibility needs within minutes — across multiple clouds.”
Miro Logo

500K

per year in const savings
“With Wallarm, we've been able to scale API protection to the scale we need and manage with our infrastructure as a code approach.”
Rappi Logo

100%

visibility into multi-cloud environments
“With Wallarm, we've been able to scale API protection to the scale we need and manage with our infrastructure as a code approach.”
Dropbox Logo
Panasonic Logo
Victoria's Secret Logo
Miro Logo
Gannet Logo
Dropbox Logo
Rappi Logo
Wargaming Logo
Semrush Logo
Tipalti Logo
UZ Leuven Logo