Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Traceable by Harness: Your API Just Leaked… Everything

Truth in IT
05/05/2025
43
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025 live. We are talking to all the latest and greatest cybersecurity vendors. We are now talking to Traceable up here about more application security paradigms and models and domains and what you're doing. Uh, so would you introduce yourself? Uh, first of all, thank you for having me, Mike. Uh, my name is Sudeep Reddy. I'm the senior director of product management at Traceable by Harness. And, uh, we are an AI ready appsec platform. All right, all right, we're gonna have to unpack that a little bit. Okay, so I understand what application security is. Uh, are we. Let's just take that. Are we are we talking about security? Uh, for application developers or people who are building applications? So we are a AI native DevSecOps platform. So what I mean by that is DevSecOps. So security is embedded in every phase of the SDLC all the way from design to runtime. So we offer security at every phase of the SDLC and we help developers ship secure code faster. So that's our mission. Okay. So yeah. So app app DevSecOps, right? Is like on the on their on their. So just as a side question, um, we're here obviously at a security conference. So the dev set part is important. Uh, do you find that it's challenging for a lot of companies to merge the application development people with the security people and get to a coherent, uh, plan moving forward? Definitely. Uh, traditionally, there has been a challenge to bring the engineering and security teams together. There was always this friction between security teams coming up with a lot of vulnerabilities, and engineering team doesn't have enough time to fix them. So with harness, which is a DevSecOps platform, there's one platform where security and engineering teams can collaborate more effectively. And it reduces that friction, where security is embedded very early in the life cycle and also in runtime. So it makes developers life easier to ship secure code faster. All right. Tell me a little bit. And we don't have a lot of time today, but just really quickly. What are we talking about when you're looking at application security? Give us some examples. Definitely. So when when you write your code you're trying to understand basically if there are any vulnerabilities in the code. So there's some static scanning that happens at that time. There's also supply chain security where you'd like to understand third party libraries that you're using in your software. And once your code goes through the build process then you look at artifact security. Then once your code is shipped in production, that's where runtime security comes in, where you want to secure your applications and APIs against a wide range of threats from bots and different attackers when your app is actually running live in production. I mean, I like I like the stories about how we're taking and looking at a life cycle approach and not making it different silos either by the time of development versus CI, CD versus deployment. But we're looking at that whole thing together. Code is just getting shipped faster and faster and faster on there. If you look around at the 25,000 people out of here on the show floor. If you wanted them to understand something about traceable, one of the key most message you'd want to get to them, what would you tell them all? Definitely. Uh, the the narrative is harness is an AI native DevSecOps platform that helps software developers ship secure code faster. And we make it easy for developers by embedding security in every phase of the SDLC. Yeah, and that's just you can just keep hammering that message, probably getting that home. Uh, if someone wants to, uh, get started on that, maybe dig a little deeper, uh, particularly from the security side, since it's a security show. Is there something specific you point them at? Definitely. You can visit our website. To learn more about our products and reach out to us for any questions. All right. Thank you so much Sudhir. Thank you. Mike. All right.
Traceable by Harness secures APIs by understanding application behavior and identifying anomalies in real time. As APIs multiply and attackers shift their focus, traditional tools fall short. Traceable uses machine learning to create a living blueprint of API traffic—so you know what’s normal, what’s risky, and what to block before damage is done.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • traceable
  • api
  • security
  • application
  • behavior
  • anomaly
  • detection
  • api
  • traffic
  • machine
  • learning
  • real-time
  • protection
  • zero
  • trust
  • apis
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Traceable by Harness: Your API Just Leaked… Everything

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT service delivery workflows that close the efficiency gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                22

                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                01/22/202601:00 PM ET
                More events

                Upcoming Industry Events

                • Jan
                  29

                  Preparing Your Cybersecurity Strategy for the Challenges of 2026

                  01/29/202610:00 AM ET
                  More events

                  Recent Spotlight Events

                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    • Dec
                      02

                      The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                      12/02/202501:00 PM ET
                      • Nov
                        20

                        Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                        11/20/202501:00 PM ET
                        More events

                        Recent Industry Events

                        • Dec
                          18

                          Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                          12/18/202501:00 PM ET
                          • Dec
                            16

                            HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                            12/16/202501:00 PM ET
                            • Dec
                              11

                              Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                              12/11/202501:00 PM ET
                              More events
                              Truth in IT
                              • Sponsor
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Preference Management
                              Desktop version
                              Standard version