Unified API Protection

12345678
Across
  1. 3. tool that allows you to build, manage, and deploy REST APIs
  2. 5. analyzes source code to find security vulnerabilities that make your organization's apps susceptible to attack
  3. 7. finding fixing and preventing security vulnerabilities at the application level
  4. 8. practice of protecting information by mitigating risks
Down
  1. 1. simulates automated attacks on an application, mimicking a malicious attacker
  2. 2. endpoint used for query execution
  3. 4. code that allows two software programs to communicate with each other
  4. 5. allows you to describe the structure of your APIs so that machines can read them
  5. 6. allows systems to verify identity & establish a network connection to another system