Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Wallarm: Like a Bouncer for Your Backend

Truth in IT
05/05/2025
36
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We are here at RSAC 2025, crawling the floor looking at the latest and greatest cybersecurity vendors. And we are going to look at something pretty innovative right now. I've got Tim here. Tim, welcome. Thank you Mike. Happy to be here. Now is that while ARM is that pronounced. That is wall. Arm. You got it right. All right. Uh, talk to us a little bit about where in the cybersecurity space you guys fit in. Sure. So ARM is fundamentally an API security company. So our our mission in life, if you will, is to detect and block API attacks. Uh, so APIs as an attack surface have really grown not only with just automation in general, the velocity of development, but now with AI and generative AI, which all runs on top of APIs. We're really seeing an explosion of APIs inside of organizations and APIs exposed to the world, and we're all about protecting those APIs. So I've coded a few things that have APIs and used a lot of APIs in my illustrious programing career, which hasn't been that long, um, despite the gray hair. Uh, so when you say protecting APIs, are you saying if I'm, if I'm exposing an API, you're helping protect it on my side. Or if I'm using APIs, you're helping me there. If you're exposing an API. So if you either build and deploy APIs for your customers or your partners, or if you purchase products that have APIs that get exposed, either external to your organization as a service or even inside your organization to other employees or partners or developers, all of those APIs, we're interested in protecting them from being attacked. We also, of course, you can't protect what you don't know about. So part of what we do is to inventory and catalog those APIs and tell you what you have so that you can then protect it. I mean, does this include I'm just going to throw things out like SaaS apps that have APIs and container environments, microservices with thousands of APIs. Does it go that whole gamut? It does. So if you're if you're building those APIs and exposing them, if you're a SaaS provider as an example, and you provide those APIs. Absolutely. Okay. So are you sitting in the middle then between the things going to the API or coming out of it, or are you monitoring from the edge? How does that work? So most of what we do, not 100%, but most of what we do is focused around traffic analysis. So we have lots of different ways to deploy the solution, because there are lots of different kinds of environments out there. But what we're really after ultimately is for you to send your API traffic through what we call our filtering nodes so that we can analyze it. We use that data to do API discovery and then to identify attacks and block them. All right. And just give us a quick example of some of the kinds of attacks people might do against an API. Absolutely. So I break attacks into two big categories. There are stateful attacks which are behavior based. So we're looking at the behavior across an API session. And we're looking for anomalies. So that would be things like uh, you know scraping data or account takeover attacks. And then there are more the classic sort of traditional attacks that are stateless. We can detect those in one request that's like SQL injection or remote code execution, that kind of thing. All right. Which is so so you're not necessarily in the middle in that sense of like having it go through you, but you're looking at the analysis of what's flowing back and forth and doing that, doing that observation. Generally speaking, we are in the middle. As I said, there are lots of different ways to deploy it so we can be really, truly in the middle. As an inline component, we can integrate with an API gateway that's already in the middle, so we don't want to replace it, we just want to integrate with it. We can deploy in your Kubernetes environment as a Kubernetes ingress controller. There are like 1520 different ways to deploy. So I won't list them all. All right, all right. Well definitely check out check them out in more detail if you have APIs. So let me ask you this. We're here at RSAC. There's 25,000 people here. If you wanted to get a message out to everyone about improving their security posture, obviously around APIs, what kind of message would you like them to take away? Well, I think there there are two key messages for me. One is to really understand that the APIs that you have and expose are a huge part of your attack surface today, attackers are targeting those APIs because they provide a programmatic way to interact with your applications, with your data. Second is around AI. All of AI apps, all those AI agents, they're built on top of APIs. They interact with APIs. It's API security on steroids, if you will. So we expect to see that AI growth drive API growth as well. All right. So it's kind of a layered approach. And there's definitely big AI theme here both good and against AI. We want to protect against malicious use, and we want to use it for the forces of good. But that means there's more APIs out there for AI. Definitely, definitely see it. Yeah, that's exactly right. And that's what we're looking to protect. All right. If someone wants to learn a little bit more then about Waltham, check it out and say like, oh, you know, I probably have some APIs. I probably am vulnerable because I haven't done anything specific about APIs yet. What would you point them at as a good place to get started? Well, you'll be shocked and surprised. I'm going to point to Alarm.com resources there. We've got our blog there. We've got product information, data sheets, best practices. So it's a great resource. All right. So start at alarm.com. Um, if you had one sort of like final place where you'd say, like, hey, here's where you should get started. What would that be? Well, I think the, the if you're looking for something like the OWASp Foundation is a good example, owasp API top ten is a good place to get started. Just learning about API security and understanding what the threats are. All right. So all right Tim, thank you very much. Thanks, Mike. Appreciate it. All right. Check out Walmart if you've got API's. And you all do.
Wallarm defends modern APIs, AI apps, and AI agents with a cloud-native platform that blocks attacks in real time. Whether you’re in Kubernetes, multi-cloud, or a hybrid environment, Wallarm provides the visibility and protection you need—without blowing up your latency or drowning your team in alerts.
Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • cybersecurity
  • matchett
  • wallarm
  • web
  • app
  • security
  • api
  • protection
  • real-time
  • filtering
  • cloud-native
  • security
  • kubernetes
  • multi-cloud
  • runtime
  • protection
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Wallarm: Like a Bouncer for Your Backend

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Trends into Tangible Business Success with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-trends-into-tangible-business-success-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/emea-partner-sales-talk-transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Advancements in Click Fraud Protection: Insights from LinkedIn + HUMAN for Budget and Campaign Optimization
                https://www.truthinit.com/index.php/channel/1583/advancements-in-click-fraud-protection-insights-from-linkedin-human-for-budget-and-campaign-optimization/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva AI
                https://www.truthinit.com/index.php/channel/1556/transforming-ai-buzz-into-tangible-business-value-with-druva-ai/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst the Rise of Agentic Commerce
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-the-rise-of-agentic-commerce/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Discover. Register. Attend. Win.

              • November 2025 D.R.A.W.

                November 2025 D.R.A.W.

                10/27/202501:17 PM ET

                Upcoming Spotlight Events

                • Nov
                  18

                  Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                  11/18/202501:00 PM ET
                  • Nov
                    20

                    Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                    11/20/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      • Nov
                        12

                        Transforming AI Trends into Tangible Business Success with Druva

                        11/12/202510:00 PM ET
                        • Nov
                          13

                          EMEA Partner Sales Talk: Transforming AI Buzz into Tangible Business Value with Druva

                          11/13/202505:00 AM ET
                          More events

                          Upcoming 360 View Events

                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                • Oct
                                  15

                                  Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                  10/15/202501:00 PM ET
                                  • Sep
                                    16

                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                    09/16/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      30

                                      Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                      10/30/202512:00 PM ET
                                      • Oct
                                        30

                                        Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                        10/30/202506:00 AM ET
                                        • Oct
                                          29

                                          Practical Strategies for Platform Engineering in the AI Era

                                          10/29/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version