Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Wallarm: Like a Bouncer for Your Backend

Truth in IT
05/05/2025
36
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025, crawling the floor looking at the latest and greatest cybersecurity vendors. And we are going to look at something pretty innovative right now. I've got Tim here. Tim, welcome. Thank you Mike. Happy to be here. Now is that while ARM is that pronounced. That is wall. Arm. You got it right. All right. Uh, talk to us a little bit about where in the cybersecurity space you guys fit in. Sure. So ARM is fundamentally an API security company. So our our mission in life, if you will, is to detect and block API attacks. Uh, so APIs as an attack surface have really grown not only with just automation in general, the velocity of development, but now with AI and generative AI, which all runs on top of APIs. We're really seeing an explosion of APIs inside of organizations and APIs exposed to the world, and we're all about protecting those APIs. So I've coded a few things that have APIs and used a lot of APIs in my illustrious programing career, which hasn't been that long, um, despite the gray hair. Uh, so when you say protecting APIs, are you saying if I'm, if I'm exposing an API, you're helping protect it on my side. Or if I'm using APIs, you're helping me there. If you're exposing an API. So if you either build and deploy APIs for your customers or your partners, or if you purchase products that have APIs that get exposed, either external to your organization as a service or even inside your organization to other employees or partners or developers, all of those APIs, we're interested in protecting them from being attacked. We also, of course, you can't protect what you don't know about. So part of what we do is to inventory and catalog those APIs and tell you what you have so that you can then protect it. I mean, does this include I'm just going to throw things out like SaaS apps that have APIs and container environments, microservices with thousands of APIs. Does it go that whole gamut? It does. So if you're if you're building those APIs and exposing them, if you're a SaaS provider as an example, and you provide those APIs. Absolutely. Okay. So are you sitting in the middle then between the things going to the API or coming out of it, or are you monitoring from the edge? How does that work? So most of what we do, not 100%, but most of what we do is focused around traffic analysis. So we have lots of different ways to deploy the solution, because there are lots of different kinds of environments out there. But what we're really after ultimately is for you to send your API traffic through what we call our filtering nodes so that we can analyze it. We use that data to do API discovery and then to identify attacks and block them. All right. And just give us a quick example of some of the kinds of attacks people might do against an API. Absolutely. So I break attacks into two big categories. There are stateful attacks which are behavior based. So we're looking at the behavior across an API session. And we're looking for anomalies. So that would be things like uh, you know scraping data or account takeover attacks. And then there are more the classic sort of traditional attacks that are stateless. We can detect those in one request that's like SQL injection or remote code execution, that kind of thing. All right. Which is so so you're not necessarily in the middle in that sense of like having it go through you, but you're looking at the analysis of what's flowing back and forth and doing that, doing that observation. Generally speaking, we are in the middle. As I said, there are lots of different ways to deploy it so we can be really, truly in the middle. As an inline component, we can integrate with an API gateway that's already in the middle, so we don't want to replace it, we just want to integrate with it. We can deploy in your Kubernetes environment as a Kubernetes ingress controller. There are like 1520 different ways to deploy. So I won't list them all. All right, all right. Well definitely check out check them out in more detail if you have APIs. So let me ask you this. We're here at RSAC. There's 25,000 people here. If you wanted to get a message out to everyone about improving their security posture, obviously around APIs, what kind of message would you like them to take away? Well, I think there there are two key messages for me. One is to really understand that the APIs that you have and expose are a huge part of your attack surface today, attackers are targeting those APIs because they provide a programmatic way to interact with your applications, with your data. Second is around AI. All of AI apps, all those AI agents, they're built on top of APIs. They interact with APIs. It's API security on steroids, if you will. So we expect to see that AI growth drive API growth as well. All right. So it's kind of a layered approach. And there's definitely big AI theme here both good and against AI. We want to protect against malicious use, and we want to use it for the forces of good. But that means there's more APIs out there for AI. Definitely, definitely see it. Yeah, that's exactly right. And that's what we're looking to protect. All right. If someone wants to learn a little bit more then about Waltham, check it out and say like, oh, you know, I probably have some APIs. I probably am vulnerable because I haven't done anything specific about APIs yet. What would you point them at as a good place to get started? Well, you'll be shocked and surprised. I'm going to point to Alarm.com resources there. We've got our blog there. We've got product information, data sheets, best practices. So it's a great resource. All right. So start at alarm.com. Um, if you had one sort of like final place where you'd say, like, hey, here's where you should get started. What would that be? Well, I think the, the if you're looking for something like the OWASp Foundation is a good example, owasp API top ten is a good place to get started. Just learning about API security and understanding what the threats are. All right. So all right Tim, thank you very much. Thanks, Mike. Appreciate it. All right. Check out Walmart if you've got API's. And you all do.
Wallarm defends modern APIs, AI apps, and AI agents with a cloud-native platform that blocks attacks in real time. Whether you’re in Kubernetes, multi-cloud, or a hybrid environment, Wallarm provides the visibility and protection you need—without blowing up your latency or drowning your team in alerts.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • wallarm
  • web
  • app
  • security
  • api
  • protection
  • real-time
  • filtering
  • cloud-native
  • security
  • kubernetes
  • multi-cloud
  • runtime
  • protection
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Wallarm: Like a Bouncer for Your Backend

            Upcoming Webinar Calendar

            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant
              https://www.truthinit.com/index.php/channel/1445/die-doppelte-funktion-der-ki-innovationsantrieb-und-sicherheitsgarant/
            • 09/18/2025
              04:00 AM
              09/18/2025
              Netskope: La dualité de l’IA : inspirer l’innovation tout en protégeant l’avenir
              https://www.truthinit.com/index.php/channel/1446/la-dualité-de-lia-inspirer-linnovation-tout-en-protégeant-lavenir/
            • 09/18/2025
              10:00 AM
              09/18/2025
              Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro
              https://www.truthinit.com/index.php/channel/1444/la-dualità-dellia-stimolare-linnovazione-e-salvaguardare-il-futuro/
            • 09/18/2025
              11:00 AM
              09/18/2025
              Trend Micro Webinar: Risk in Real Time: Agentic SIEM
              https://www.truthinit.com/index.php/channel/1372/risk-real-time-agentic-siem/
            • 09/18/2025
              01:00 PM
              09/18/2025
              Netskope: Harnessing AI’s Dual Nature: Progress and Protection
              https://www.truthinit.com/index.php/channel/1424/harnessing-ais-potential-for-innovation-and-mitigating-associated-risks/
            • 09/23/2025
              01:00 PM
              09/23/2025
              Enhancing Visibility, Control, and Trust in Cloud-First Data Security Management
              https://www.truthinit.com/index.php/channel/1497/enhancing-visibility-control-and-trust-in-cloud-first-data-security-management/
            • 09/24/2025
              01:00 PM
              09/24/2025
              Transforming Risk into Resilience: Managing Data and Access in Regulated Settings
              https://www.truthinit.com/index.php/channel/1500/transforming-risk-into-resilience-managing-data-and-access-in-regulated-settings/
            • 09/24/2025
              02:00 PM
              09/24/2025
              Achieving Full Network and Application Visibility through Zero Trust with Netskope and ExtraHop
              https://www.truthinit.com/index.php/channel/1427/achieving-full-network-and-application-visibility-through-zero-trust-with-netskope-and-extrahop/
            • 09/25/2025
              12:00 PM
              09/25/2025
              Netskope: Secure the Future--AI Usage & Data Security in the Enterprise
              https://www.truthinit.com/index.php/channel/1434/ensuring-data-security-and-ai-integration-for-a-resilient-enterprise-future/
            • 10/15/2025
              01:00 PM
              10/15/2025
              Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?
              https://www.truthinit.com/index.php/channel/1521/managing-human-risk-in-an-ai-driven-threat-landscape-are-your-defenses-evolving-fast-enough/
            • 10/23/2025
              12:00 PM
              10/23/2025
              360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
              https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
            • 10/28/2025
              12:00 PM
              10/28/2025
              Netskope: Data Security Reimagined: Regain Your Control and Confidence
              https://www.truthinit.com/index.php/channel/1432/data-security-reimagined-regain-your-control-and-confidence/
            • 11/20/2025
              12:00 PM
              11/20/2025
              360View: Budget Optimization: Doing More with Less
              https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
            • 12/18/2025
              12:00 PM
              12/18/2025
              360View: 2026 IT Predictions & Emerging Trends
              https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

            Upcoming Industry Events

            • Sep
              18

              Netskope: La dualité de l’IA : inspirer l’innovation tout en protégeant l’avenir

              09/18/202504:00 AM ET
              • Sep
                18

                Netskope: Die doppelte Funktion der KI: Innovationsantrieb und Sicherheitsgarant

                09/18/202504:00 AM ET
                • Sep
                  18

                  Netskope: La dualità dell'IA: stimolare l'innovazione e salvaguardare il futuro

                  09/18/202510:00 AM ET
                  More events

                  Upcoming 360 View Events

                  • Oct
                    23

                    360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                    10/23/202512:00 PM ET
                    • Nov
                      20

                      360View: Budget Optimization: Doing More with Less

                      11/20/202512:00 PM ET
                      • Dec
                        18

                        360View: 2026 IT Predictions & Emerging Trends

                        12/18/202512:00 PM ET
                        More events

                        Recent Spotlight Events

                        • Oct
                          21

                          DCIG Top5 AWS & Azure Cloud Backup Solutions

                          10/21/202001:00 PM ET
                          • Jan
                            21

                            NetApp: Delivering End User Computing in 2021

                            01/21/202101:00 PM ET
                            • Jan
                              28

                              HCL & Cisco: VelocITy Reference Architecture

                              01/28/202101:00 PM ET
                              More events

                              Recent Industry Events

                              • Sep
                                16

                                HUMAN Security: CISO to CISO: A HUMAN conversation about Artificial Intelligence

                                09/16/202501:00 PM ET
                                • Sep
                                  16

                                  SOC 2 for Startups: Strategies to Reduce Costs, Enhance Efficiency, and Achieve Compliance

                                  09/16/202512:00 PM ET
                                  • Sep
                                    10

                                    Netskope: Ask Bob: How to Mitigate Your Risk Profile

                                    09/10/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version