Unified API Protection
Across
- 3. tool that allows you to build, manage, and deploy REST APIs
- 5. analyzes source code to find security vulnerabilities that make your organization's apps susceptible to attack
- 7. finding fixing and preventing security vulnerabilities at the application level
- 8. practice of protecting information by mitigating risks
Down
- 1. simulates automated attacks on an application, mimicking a malicious attacker
- 2. endpoint used for query execution
- 4. code that allows two software programs to communicate with each other
- 5. allows you to describe the structure of your APIs so that machines can read them
- 6. allows systems to verify identity & establish a network connection to another system