AppSentinels Product Demo
AppSentinels Product Demo
because
business must
go on as usual
About AppSentinels.ai
• An Innovation Driven Security Technology Company in the next generation Application & API Security technology space, founded after many
years of deep research in the Application Security technologies
• Revenue generating company with many of the largest API consumers are it’s customers
• Globally Acclaimed Founding Team of experienced engineers and scientist who have built many Industry key cyber security technologies and
products
An attacker managed to VPN into Tesla’s internal network from his car
Researchers at Unit-42 found that 22 APIs across 16 different
and take over their main backend server that controlled entire Tesla car
AWS services could be exploited to leak Identity and Access
fleet. He can further invoke unprotected API for any car, start it or even
Management (IAM) users, roles and tokens
move it.
Hackers are targeting Application’s business logic that are blind spots
of current gen security platforms
Proprietary and confidential Information, ©2024, AppSentinels.ai 7
Why Hackers love APIs?
APIs start at Most Untrusted Land directly on Crown APIs deal with organization’s IP
Places Jewels of the Organization and sensitive/PII data
A7: Cross Site Scripting (XSS) API7: Server Side Request Forgery
POST /search/products
POST /cart/add/{product-id}
POST /login
{token}
GET /profile
POST /cart/checkout/{cart-id}
PUT /payment/method
GET /browse/products
Continuous
Continuous Automatic
Discovery &
Stateful API Pen-Testing
Posture Management
• Gain unparalleled visibility. No blind • Automatically creates and runs • Run-time Protection against business-
spots – cover all your API paths & application workflow specific test- logic exploits, OWASP API Top-10,
application architectures cases to offer PROACTIVE security OWASP Top-10 etc
• Discover Shadow, Orphan, Unused, • Tests APIs for Business Logic, OWASP • API Schema conformance validation
UnAuth, Sensitive, Privilege, Public or API Top-10, OWASP Top-10, • Fraud & bot protection - Scrapping,
Internal, New or Changed APIs etc DoS/Rate-limit, fuzzing and many Carding, Credential stuffing etc
• Discover sensitive data exposure due more variety of tests
• Stateful testing of complete user- • Attack Progression analytics with
to APIs threat-actors mapped to MITRE tactic
journeys or workflows automatically
• Get OpenAPI documentation • Augments security-testing capability. • Manual OR fully automated
• Discover API Governance issues & Acts like 24x7 Pen-Tester or a bug- enforcement
Misconfigurations bounty hunter • Block via inline sensors OR via
• Real time Risk Score • Prioritize issues that hackers can integration with other devices
exploit • True DevSecOps – automatic triaging
of malicious issues in Production
Proprietary and confidential Information, ©2024, AppSentinels.ai 13
Deployment Flexibility: Up and running in minutes
Support SaaS OR On-Prem (air-gapped) Hosting options
• Inline Mode
• SSL Reverse Proxy OR Forward Proxy Mode
• Tap/OOB Mode
• API Gateway plugin
• NGINX load-balancer plugin
• Kubernetes Ingress
• Kubernetes Service-mesh
• Serverless
• Mirroring
• Apigee API Management
• Mulesoft API Management
• Software AG API Management
• Azure API-M
Ticketing Systems
• JIRA, Git, ServiceNow, Opsgenie etc
Messaging Systems
• Slack
• MS Teams
• Google Chat
AppSentinels covers:
• coverage in 6 out of 8
• 13 Controls
Inline Mode
Business Logic Attacks: OWASP API 3: Excessive Data Exposure - Real time sensitive information leak
Multi-Layer Defence
Shield Facebook & Uber Attack - OWASP API 1: Broken Object Level Authorization
True DevSecOps
Vulnerability
Attack - Broken Object Level Authorization
22