Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Wallarm: Like a Bouncer for Your Backend

Truth in IT
05/05/2025
37
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025, crawling the floor looking at the latest and greatest cybersecurity vendors. And we are going to look at something pretty innovative right now. I've got Tim here. Tim, welcome. Thank you Mike. Happy to be here. Now is that while ARM is that pronounced. That is wall. Arm. You got it right. All right. Uh, talk to us a little bit about where in the cybersecurity space you guys fit in. Sure. So ARM is fundamentally an API security company. So our our mission in life, if you will, is to detect and block API attacks. Uh, so APIs as an attack surface have really grown not only with just automation in general, the velocity of development, but now with AI and generative AI, which all runs on top of APIs. We're really seeing an explosion of APIs inside of organizations and APIs exposed to the world, and we're all about protecting those APIs. So I've coded a few things that have APIs and used a lot of APIs in my illustrious programing career, which hasn't been that long, um, despite the gray hair. Uh, so when you say protecting APIs, are you saying if I'm, if I'm exposing an API, you're helping protect it on my side. Or if I'm using APIs, you're helping me there. If you're exposing an API. So if you either build and deploy APIs for your customers or your partners, or if you purchase products that have APIs that get exposed, either external to your organization as a service or even inside your organization to other employees or partners or developers, all of those APIs, we're interested in protecting them from being attacked. We also, of course, you can't protect what you don't know about. So part of what we do is to inventory and catalog those APIs and tell you what you have so that you can then protect it. I mean, does this include I'm just going to throw things out like SaaS apps that have APIs and container environments, microservices with thousands of APIs. Does it go that whole gamut? It does. So if you're if you're building those APIs and exposing them, if you're a SaaS provider as an example, and you provide those APIs. Absolutely. Okay. So are you sitting in the middle then between the things going to the API or coming out of it, or are you monitoring from the edge? How does that work? So most of what we do, not 100%, but most of what we do is focused around traffic analysis. So we have lots of different ways to deploy the solution, because there are lots of different kinds of environments out there. But what we're really after ultimately is for you to send your API traffic through what we call our filtering nodes so that we can analyze it. We use that data to do API discovery and then to identify attacks and block them. All right. And just give us a quick example of some of the kinds of attacks people might do against an API. Absolutely. So I break attacks into two big categories. There are stateful attacks which are behavior based. So we're looking at the behavior across an API session. And we're looking for anomalies. So that would be things like uh, you know scraping data or account takeover attacks. And then there are more the classic sort of traditional attacks that are stateless. We can detect those in one request that's like SQL injection or remote code execution, that kind of thing. All right. Which is so so you're not necessarily in the middle in that sense of like having it go through you, but you're looking at the analysis of what's flowing back and forth and doing that, doing that observation. Generally speaking, we are in the middle. As I said, there are lots of different ways to deploy it so we can be really, truly in the middle. As an inline component, we can integrate with an API gateway that's already in the middle, so we don't want to replace it, we just want to integrate with it. We can deploy in your Kubernetes environment as a Kubernetes ingress controller. There are like 1520 different ways to deploy. So I won't list them all. All right, all right. Well definitely check out check them out in more detail if you have APIs. So let me ask you this. We're here at RSAC. There's 25,000 people here. If you wanted to get a message out to everyone about improving their security posture, obviously around APIs, what kind of message would you like them to take away? Well, I think there there are two key messages for me. One is to really understand that the APIs that you have and expose are a huge part of your attack surface today, attackers are targeting those APIs because they provide a programmatic way to interact with your applications, with your data. Second is around AI. All of AI apps, all those AI agents, they're built on top of APIs. They interact with APIs. It's API security on steroids, if you will. So we expect to see that AI growth drive API growth as well. All right. So it's kind of a layered approach. And there's definitely big AI theme here both good and against AI. We want to protect against malicious use, and we want to use it for the forces of good. But that means there's more APIs out there for AI. Definitely, definitely see it. Yeah, that's exactly right. And that's what we're looking to protect. All right. If someone wants to learn a little bit more then about Waltham, check it out and say like, oh, you know, I probably have some APIs. I probably am vulnerable because I haven't done anything specific about APIs yet. What would you point them at as a good place to get started? Well, you'll be shocked and surprised. I'm going to point to Alarm.com resources there. We've got our blog there. We've got product information, data sheets, best practices. So it's a great resource. All right. So start at alarm.com. Um, if you had one sort of like final place where you'd say, like, hey, here's where you should get started. What would that be? Well, I think the, the if you're looking for something like the OWASp Foundation is a good example, owasp API top ten is a good place to get started. Just learning about API security and understanding what the threats are. All right. So all right Tim, thank you very much. Thanks, Mike. Appreciate it. All right. Check out Walmart if you've got API's. And you all do.
Wallarm defends modern APIs, AI apps, and AI agents with a cloud-native platform that blocks attacks in real time. Whether you’re in Kubernetes, multi-cloud, or a hybrid environment, Wallarm provides the visibility and protection you need—without blowing up your latency or drowning your team in alerts.
Categories:
  • » Cybersecurity » Data Security
  • » Cybersecurity » Application Security
  • » Small World Big Data
  • » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • wallarm
  • web
  • app
  • security
  • api
  • protection
  • real-time
  • filtering
  • cloud-native
  • security
  • kubernetes
  • multi-cloud
  • runtime
  • protection
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Wallarm: Like a Bouncer for Your Backend

              Upcoming Webinar Calendar

              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Insights
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-insights/
              • 03/05/2026
                01:00 PM
                03/05/2026
                "VMware Alternative" or "Private Cloud OS"?
                https://www.truthinit.com/index.php/channel/1834/vmware-alternative-or-private-cloud-os/
              • 03/11/2026
                01:00 PM
                03/11/2026
                AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets
                https://www.truthinit.com/index.php/channel/1838/ai-driven-endpoint-management-scale-it-operations-with-fewer-tools-faster-tickets/
              • 03/11/2026
                01:00 PM
                03/11/2026
                Introducing the Netskope AI Launch for the Americas
                https://www.truthinit.com/index.php/channel/1850/introducing-the-netskope-ai-launch-for-the-americas/
              • 03/12/2026
                12:00 AM
                03/12/2026
                Unveiling the Netskope AI Initiative in the APAC Region
                https://www.truthinit.com/index.php/channel/1849/unveiling-the-netskope-ai-initiative-in-the-apac-region/
              • 03/12/2026
                06:00 AM
                03/12/2026
                Introducing the Netskope AI Revolution in EMEA
                https://www.truthinit.com/index.php/channel/1848/introducing-the-netskope-ai-revolution-in-emea/
              • 03/17/2026
                06:00 AM
                03/17/2026
                L'importance cruciale de l'ITDR pour 2026 et les années suivantes
                https://www.truthinit.com/index.php/channel/1856/limportance-cruciale-de-litdr-pour-2026-et-les-années-suivantes/
              • 03/18/2026
                01:00 PM
                03/18/2026
                Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk
                https://www.truthinit.com/index.php/channel/1847/beyond-chatbots-agentic-ai-that-actually-fixes-identity-risk/
              • 03/19/2026
                01:00 PM
                03/19/2026
                Cyber CSI 2.0: Phishing Forensics in the Age of AI and Deepfakes
                https://www.truthinit.com/index.php/channel/1842/cyber-csi-2-0-phishing-forensics-in-the-age-of-ai-and-deepfakes/
              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk Through AI-Driven Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-driven-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/

              Upcoming Spotlight Events

              • Mar
                05

                "VMware Alternative" or "Private Cloud OS"?

                03/05/202601:00 PM ET
                • Mar
                  11

                  AI-Driven Endpoint Management: Scale IT Operations with Fewer Tools, Faster Tickets

                  03/11/202601:00 PM ET
                  • Mar
                    18

                    Beyond Chatbots: Agentic AI That Actually Fixes Identity Risk

                    03/18/202601:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Mar
                      03

                      Energize Your Connections with Netskope and Presidio Insights

                      03/03/202601:00 PM ET
                      • Mar
                        11

                        Introducing the Netskope AI Launch for the Americas

                        03/11/202601:00 PM ET
                        • Mar
                          12

                          Unveiling the Netskope AI Initiative in the APAC Region

                          03/12/202612:00 AM ET
                          More events

                          Recent Spotlight Events

                          • Feb
                            19

                            The CISO Dilemma: Fostering Innovation & Security in the Age of AI

                            02/19/202601:00 PM ET
                            • Feb
                              03

                              Evolution of Cloud Adaptability and AI Performance

                              02/03/202601:00 PM ET
                              • Jan
                                27

                                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                                01/27/202601:00 PM ET
                                More events

                                Recent Industry Events

                                • Feb
                                  26

                                  Strategies for Safeguarding Data Amidst AI Innovations with DSPM

                                  02/26/202609:30 PM ET
                                  • Feb
                                    26

                                    HUMAN Dialogue: Examining the Effects of OWASP's Top Ten Agentic Risks on Builders and Defenders

                                    02/26/202601:00 PM ET
                                    • Feb
                                      26

                                      Demonstrating and Ensuring Endpoint Compliance in the Age of AI

                                      02/26/202612:00 PM ET
                                      More events
                                      Truth in IT
                                      • Sponsor
                                      • About Us
                                      • Terms of Service
                                      • Privacy Policy
                                      • Contact Us
                                      • Preference Management
                                      Desktop version
                                      Standard version