Subscribe to the Salt blog to learn about the latest developments in API Security

Blog Post

Securing API Gateways — Pros and Cons

Chris WestphalChris Westphal
May 6, 2020

Today we kick off a video series called API Security With A Pinch Of Salt where we dig deep into API security.  In this first episode, Adam, Chris and Ran tackle the topic of using API gateways for security.

Read about the top API security challenges and how to protect APIs in real-world environments.

While the primary use case for an API gateway is management, many of them have security features like authentication, authorization, encryption and rate limiting. Given this we often get asked by customers with API gateways – why do I need anything else?

In this episode we answer that question and more. We hope you enjoy.

If you’re interested in seeing the Salt Security API Protection Platform in action, contact us for a customized demo today!

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

November 5, 2024

Eric Schwake
Head of Product Marketing

Industry

API Security: The Non-Negotiable for Modern Transportation

Airlines and transportation companies heavily rely on APIs to handle sensitive data, from customer information to payment details and flight schedules. While crucial for efficient operations, these APIs are also prime cyberattack targets.

Read more

October 31, 2024

Alexandria Nicosia
Social Media Manager

Industry

Securing APIs in Retail: Safeguarding Customer Data

In the fast-paced retail industry, where customer trust and data protection are critical, API security must be a top priority to ensure both reliability and a seamless customer experience, confidence, and trust in digital services.

Read more

October 30, 2024

Eric Schwake
Head of Product Marketing

Customer

Salt Security and Dazz: A Powerful Partnership for API Security

Integrating Salt Security and Dazz provides a robust solution for organizations aiming to enhance their API and application security.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back