Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Traceable by Harness: Your API Just Leaked… Everything

Truth in IT
05/05/2025
41
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. We are talking to all the latest and greatest cybersecurity vendors. We are now talking to Traceable up here about more application security paradigms and models and domains and what you're doing. Uh, so would you introduce yourself? Uh, first of all, thank you for having me, Mike. Uh, my name is Sudeep Reddy. I'm the senior director of product management at Traceable by Harness. And, uh, we are an AI ready appsec platform. All right, all right, we're gonna have to unpack that a little bit. Okay, so I understand what application security is. Uh, are we. Let's just take that. Are we are we talking about security? Uh, for application developers or people who are building applications? So we are a AI native DevSecOps platform. So what I mean by that is DevSecOps. So security is embedded in every phase of the SDLC all the way from design to runtime. So we offer security at every phase of the SDLC and we help developers ship secure code faster. So that's our mission. Okay. So yeah. So app app DevSecOps, right? Is like on the on their on their. So just as a side question, um, we're here obviously at a security conference. So the dev set part is important. Uh, do you find that it's challenging for a lot of companies to merge the application development people with the security people and get to a coherent, uh, plan moving forward? Definitely. Uh, traditionally, there has been a challenge to bring the engineering and security teams together. There was always this friction between security teams coming up with a lot of vulnerabilities, and engineering team doesn't have enough time to fix them. So with harness, which is a DevSecOps platform, there's one platform where security and engineering teams can collaborate more effectively. And it reduces that friction, where security is embedded very early in the life cycle and also in runtime. So it makes developers life easier to ship secure code faster. All right. Tell me a little bit. And we don't have a lot of time today, but just really quickly. What are we talking about when you're looking at application security? Give us some examples. Definitely. So when when you write your code you're trying to understand basically if there are any vulnerabilities in the code. So there's some static scanning that happens at that time. There's also supply chain security where you'd like to understand third party libraries that you're using in your software. And once your code goes through the build process then you look at artifact security. Then once your code is shipped in production, that's where runtime security comes in, where you want to secure your applications and APIs against a wide range of threats from bots and different attackers when your app is actually running live in production. I mean, I like I like the stories about how we're taking and looking at a life cycle approach and not making it different silos either by the time of development versus CI, CD versus deployment. But we're looking at that whole thing together. Code is just getting shipped faster and faster and faster on there. If you look around at the 25,000 people out of here on the show floor. If you wanted them to understand something about traceable, one of the key most message you'd want to get to them, what would you tell them all? Definitely. Uh, the the narrative is harness is an AI native DevSecOps platform that helps software developers ship secure code faster. And we make it easy for developers by embedding security in every phase of the SDLC. Yeah, and that's just you can just keep hammering that message, probably getting that home. Uh, if someone wants to, uh, get started on that, maybe dig a little deeper, uh, particularly from the security side, since it's a security show. Is there something specific you point them at? Definitely. You can visit our website. To learn more about our products and reach out to us for any questions. All right. Thank you so much Sudhir. Thank you. Mike. All right.
Traceable by Harness secures APIs by understanding application behavior and identifying anomalies in real time. As APIs multiply and attackers shift their focus, traditional tools fall short. Traceable uses machine learning to create a living blueprint of API traffic—so you know what’s normal, what’s risky, and what to block before damage is done.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • traceable
  • api
  • security
  • application
  • behavior
  • anomaly
  • detection
  • api
  • traffic
  • machine
  • learning
  • real-time
  • protection
  • zero
  • trust
  • apis
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Traceable by Harness: Your API Just Leaked… Everything

            Upcoming Webinar Calendar

            • 10/02/2025
              12:00 PM
              10/02/2025
              Essential Insights on SOC 2 for Startup Founders
              https://www.truthinit.com/index.php/channel/1524/essential-insights-on-soc-2-for-startup-founders/
            • 10/09/2025
              12:00 PM
              10/09/2025
              Secureframe: Helping You Underst Your First Step Towards CMMC Certification
              https://www.truthinit.com/index.php/channel/1532/cmmc-scoping-clarifying-the-initial-step-towards-cmmc-certification/
            • 10/15/2025
              01:00 PM
              10/15/2025
              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?
              https://www.truthinit.com/index.php/channel/1521/managing-human-risk-in-an-ai-driven-threat-landscape-are-your-defenses-evolving-fast-enough/
            • 10/16/2025
              11:00 AM
              10/16/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 10/16/2025
              12:30 PM
              10/16/2025
              Effective Implementation of ISO 27001 Standards for Startups
              https://www.truthinit.com/index.php/channel/1523/effective-implementation-of-iso-27001-standards-for-startups/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/23/2025
              12:00 PM
              10/23/2025
              CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success
              https://www.truthinit.com/index.php/channel/1535/cmmc-series-crafting-a-readiness-roadmap-for-streamlined-certification-success/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/06/2025
              12:00 PM
              11/06/2025
              CMMC Level 2 Assessment Insights: Expectations and Preparation Strategies
              https://www.truthinit.com/index.php/channel/1536/cmmc-level-2-assessment-insights-expectations-and-preparation-strategies/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/11/2025
              12:00 PM
              12/11/2025
              Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
              https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Spotlight Events

            • Oct
              15

              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

              10/15/202501:00 PM ET
              More events

              Upcoming Industry Events

              • Oct
                16

                Trend Micro Webinar: Risk in Real Time: Agentic SIEM

                10/16/202511:00 AM ET
                • Oct
                  28

                  Netskope: Data Security Reimagined: Regain Your Control and Confidence

                  10/28/202512:00 PM ET
                  More events

                  Upcoming 360 View Events

                  • Oct
                    23

                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                    10/23/202512:00 PM ET
                    • Nov
                      20

                      360View: Budget Optimization: Doing More with Less

                      11/20/202512:00 PM ET
                      • Dec
                        18

                        360View: 2026 IT Predictions & Emerging Trends

                        12/18/202512:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Sep
                          16

                          KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                          09/16/202501:00 PM ET
                          • Sep
                            11

                            Cyera: An Executive’s Guide to Secure AI Adoption

                            09/11/202501:00 PM ET
                            • Aug
                              13

                              Resilience by Design: Reducing Data Risk, Downtime, and Regulatory Exposure w. Hitachi Vantara

                              08/13/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Sep
                                25

                                Netskope: Secure the Future--AI Usage & Data Security in the Enterprise

                                09/25/202512:00 PM ET
                                • Sep
                                  24

                                  Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop

                                  09/24/202502:00 PM ET
                                  • Sep
                                    23

                                    Enhancing Visibility, Control, and Trust in Cloud-First Data Security Posture

                                    09/23/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version