Best API Security Software in New Zealand - Page 2

Find and compare the best API Security software in New Zealand in 2025

Use the comparison tool below to compare the top API Security software in New Zealand on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Akto Reviews
    Akto is an open source, instant API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers tests for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, XSS, security configurations, etc. Akto's powerful testing engine runs variety of business logic tests by reading traffic data to understand API traffic pattern leading to reduced false positives. Akto can integrate with multiple traffic sources - Burpsuite, AWS, postman, GCP, gateways, etc.
  • 2
    Pynt Reviews

    Pynt

    Pynt

    $1888/month
    Pynt, an innovative API Security Testing Platform, exposes verified API threats by simulating attacks. We help hundreds companies, including Telefonica, Sage and Halodoc to continuously monitor, categorize and attack poorly secured APIs before hackers do. Pynt’s uses a unique hacking technology and an integrated shift-left strategy, using home-grown attack scenario, to detect real threats. It also helps to discover APIs and suggest fixes for verified vulnerabilities. Pynt is trusted by thousands of companies to protect the No. As part of their AppSec strategies, a number of companies rely on Pynt to secure the no.
  • 3
    Utilihive Reviews

    Utilihive

    Greenbird Integration Technology

    Utilihive, a cloud-native big-data integration platform, is offered as a managed (SaaS) service. Utilihive, the most popular Enterprise-iPaaS (iPaaS), is specifically designed for utility and energy usage scenarios. Utilihive offers both the technical infrastructure platform (connectivity and integration, data ingestion and data lake management) and preconfigured integration content or accelerators. (connectors and data flows, orchestrations and utility data model, energy services, monitoring and reporting dashboards). This allows for faster delivery of data-driven services and simplifies operations.
  • 4
    Reblaze Reviews
    Reblaze is a cloud-native, fully managed security platform for websites and web applications. Reblaze’s all-in-one solution supports flexible deployment options (cloud, multi-cloud, hybrid, DC), deployed in minutes and includes state-of-the-art Bot Management, API Security, next-gen WAF, DDoS protection, advanced rate limiting, session profiling, and more. Unprecedented real time traffic visibility as well as highly granular policies enables full control of your web traffic.
  • 5
    API Critique Reviews

    API Critique

    Entersoft Information Systems

    $199 per month
    API critique offers a penetration testing solution specifically designed for enhancing REST API Security. We have pioneered the first-ever pentesting tool, marking a significant advancement in safeguarding APIs amidst the increasing number of targeted attacks. Drawing from OWASP guidelines and our extensive expertise in penetration testing, we ensure that a wide array of vulnerabilities is thoroughly evaluated. Our scanning tool assesses the severity of issues using the CVSS standard, which is recognized and utilized by numerous respected organizations, allowing your development and operations teams to effectively prioritize vulnerabilities with ease. Results from your scans are available in multiple reporting formats such as PDF and HTML, catering to both stakeholders and technical teams, while we also offer XML and JSON formats for automation tools to facilitate the creation of tailored reports. Moreover, development and operations teams can enhance their knowledge through our exclusive Knowledge Base, which outlines potential attacks and provides countermeasures along with remediation steps to effectively reduce risks to your APIs. This comprehensive approach not only strengthens your API security posture but also empowers your teams with the insights needed to proactively address vulnerabilities.
  • 6
    Authress Reviews

    Authress

    Rhosys

    $1.10 per month
    Authress, Authorization API to your application. Authorization can be complicated quickly. Even though it seems simple, there are many hidden complications involved in authorization. It is not something you want to do on your own. It takes time to get authorization right. In simple cases, it takes an average of 840 hours to implement authorization logic. This number increases rapidly as you add more features to your app. Your application is your biggest security vulnerability. If you don't have the right skills, your doors are open to malicious attacks. You run the risk of compromising user data, non-compliance to local regulations, and major business losses. Features: Secure authorization API. Instead of creating your own authorization logic, call our API. Written by developers for developers. Granular permissions. Define multiple levels and group them by user role. You can be as specific as you like; Identity provider integrations; Simply call an API to connect any ID provider.
  • 7
    Wallarm API Security Platform Reviews
    Wallarm provides automated real-time protection for web applications, microservices, and APIs through its advanced WAF, API safeguarding, automated incident response, and asset discovery functionalities. It effectively secures these digital assets from the OWASP Top 10 vulnerabilities, bot attacks, and application misuse without necessitating manual rule setups, all while maintaining a remarkably low rate of false positives. The platform is designed for seamless deployment across major cloud services like AWS, GCP, and Azure, as well as in hybrid cloud environments. Additionally, it boasts native compatibility with Kubernetes and service mesh architectures, making it highly versatile. Wallarm also offers adaptable rules to combat account takeover (ATO) and credential stuffing threats. This makes Wallarm the preferred choice for DevSecOps teams aiming to securely develop cloud-native applications. Furthermore, Wallarm’s API security capabilities are designed for straightforward integration with leading API gateway solutions, allowing organizations to install Wallarm effortlessly, regardless of their existing infrastructure. The comprehensive features provided by Wallarm ensure that security is effectively woven into the development lifecycle from the start.
  • 8
    Spherical Defense Reviews

    Spherical Defense

    Spherical Defense

    $1 per hour
    Spherical Defense is an innovative API security solution that leverages deep unsupervised learning techniques to safeguard your APIs effectively. The Spherical Defense Express variant is designed for deployment on AWS and can be downloaded in just one minute, starting its protective measures within two hours at an economical rate of $1 per hour. After setting up your Spherical instance, it begins monitoring API traffic right away and continues to do so until it gathers enough data for initial model training. Once approximately 16,000 requests are processed, the system transitions to the training phase, where it refines its security model over about six hours before undergoing evaluation. As the system continues to receive new data, it adapts by training additional models to reflect changes in your API's traffic patterns over time. The process of training and adapting ensures ongoing protection, making it a dynamic and responsive security solution for your APIs. After the evaluation of the trained security model, the system is better equipped to handle future threats effectively.
  • 9
    Imperva API Security Reviews
    Imperva API Security safeguards your APIs using an automated positive security model, which identifies vulnerabilities in applications and protects them from being exploited. On average, organizations handle at least 300 APIs, and Imperva enhances your security framework by automatically constructing a positive security model for each uploaded API swagger file. The rapid development of APIs often outpaces the ability of security teams to review and approve them before deployment. With Imperva’s API Security, your teams can maintain a proactive stance in DevOps through automation. This solution equips your strategy with pre-configured security rules tailored to your specific APIs, ensuring comprehensive coverage of OWASP API standards and enhancing visibility into all security events for each API endpoint. By simply uploading the OpenAPI specification file created by your DevOps team, Imperva will efficiently generate a positive security model, allowing for streamlined security management. This capability not only simplifies API security but also enables organizations to focus more on innovation while maintaining robust protection.
  • 10
    CloudGuard AppSec Reviews

    CloudGuard AppSec

    Check Point Software Technologies

    Enhance your application security and shield your APIs with AppSec that utilizes contextual AI. Defend against threats targeting your web applications through a fully automated, cloud-native security framework. Say goodbye to the cumbersome process of manually adjusting rules and drafting exceptions every time you modify your web applications or APIs. Today's applications require advanced security measures. Safeguard your web applications and APIs, reduce false positives, and thwart automated assaults on your enterprise. CloudGuard employs contextual AI to accurately neutralize threats without the need for human oversight, adapting seamlessly as the application evolves. Ensure the defense of your web applications and guard against the OWASP Top 10 vulnerabilities. From the initial setup to ongoing operations, CloudGuard AppSec comprehensively evaluates every user, transaction, and URL to generate a risk score that effectively halts attacks while avoiding false alarms. Remarkably, 100% of CloudGuard clients have fewer than five rule exceptions for each deployment, showcasing the efficiency of the system. With CloudGuard, you can trust that your security measures evolve alongside your applications, providing not just protection but peace of mind.
  • 11
    aapi Reviews

    aapi

    aapi

    $4 per user per month
    Enhance the identity experiences across various applications to ensure they are more seamless, secure, compliant, and productive. By automatically incorporating the appropriate real-time actions, users and teams can efficiently interact with data in downstream applications with just a single click. This next-generation technology offers granular access to specific functions within applications, going beyond traditional PAM and CASB solutions to achieve genuine zero trust. Events such as identity provisioning and detection of suspicious activity are managed by AAPI, which automates responses related to identity, applications, and security. Furthermore, AAPI seamlessly integrates the right real-time actions for users and teams, allowing them to easily engage with data in their selected applications while being safeguarded by your IAM. Users are granted access solely to the features they require within the applications, ensuring that all other aspects remain protected and secure, all managed through your IAM. This streamlined approach significantly enhances the overall efficiency and security of identity management processes.
  • 12
    BoxyHQ Reviews
    Security Building Blocks for Developers. BoxyHQ offers a suite of APIs for enterprise compliance, security and privacy. It helps engineering teams to reduce Time to Market without sacrificing their security posture. They can implement the following features with just a few lines of code. SaaS or Self-hosted. 1. Enterprise Single Sign On (SAML/OIDC SSO) 2. Directory Sync 3. Audit Logs 4. Data Privacy Vault (PII, PCI, PHI compliant)
  • 13
    open-appsec Reviews
    open-appsec is an open-source initiative that builds on machine learning to provide pre-emptive web app & API threat protection against OWASP-Top-10 and zero-day attacks. It can be deployed as add-on to Kubernetes Ingress, NGINX, Envoy and API Gateways. The open-appsec engine learns how users normally interact with your web application. It then uses this information to automatically detect requests that fall outside of normal operations, and sends those requests for further analysis to decide whether the request is malicious or not. open-appsec uses two machine learning models: 1. A supervised model that was trained offline based on millions of requests, both malicious and benign. 2. An unsupervised model that is being built in real time in the protected environment. This model uses traffic patterns specific to the environment. open-oppsec simplifies maintenance as there is no threat signature upkeep and exception handling, like common in many WAF solutions.
  • 14
    Proxed.AI Reviews

    Proxed.AI

    Proxed.AI

    $10/month
    Proxed.AI offers an incredibly swift solution for securing AI APIs in iOS applications. The integration of AI in iOS apps presents significant security issues, particularly in safeguarding API keys against unauthorized access and usage. The exposure of these keys can result in substantial financial losses, data leaks, and misuse of services. Proxed.AI effectively addresses this dilemma in mere seconds. In contrast to conventional security approaches that demand a software development kit (SDK) or backend support, Proxed.AI enables you to secure AI API keys effortlessly through a simple URL and key modification, eliminating the need for additional code installation, infrastructure, or ongoing maintenance. This innovative method streamlines the protection process, making it accessible to developers with varying levels of technical expertise.
  • 15
    NetScaler Reviews

    NetScaler

    Cloud Software Group

    Managing application delivery at scale can be challenging, but NetScaler simplifies the process. Whether you are firmly on-premises, fully in the cloud, or operating in a hybrid environment, NetScaler provides consistent functionality across all platforms. Its architecture is built on a single code base, ensuring that regardless of whether you opt for hardware, virtual machines, bare metal, or containers, the performance remains uniform. No matter if your audience consists of hundreds of millions of consumers or hundreds of thousands of employees, NetScaler guarantees reliable and secure application delivery. Renowned as the preferred application delivery and security solution for the largest enterprises globally, NetScaler is trusted by thousands of organizations, including over 90 percent of the Fortune 500, to deliver high-performance application services, robust application and API security, and comprehensive visibility across all operations. This widespread trust underscores NetScaler's vital role in today's digital landscape.
  • 16
    Orca Security Reviews
    Orca Security is the pioneer of agentless cloud security that is trusted by hundreds of enterprises globally. Orca makes cloud security possible for enterprises moving to and scaling in the cloud with its patented SideScanning™ technology and Unified Data Model. The Orca Cloud Security Platform delivers the world's most comprehensive coverage and visibility of risks across AWS, Azure, Google Cloud and Kubernetes.
  • 17
    RestCase Reviews
    API Design and Development entails initiating your APIs with a focus on both Design-first and Security-first methodologies through RestCase. The Design-first strategy is implemented during the preliminary phases of API development, yielding an API definition that is comprehensible to both humans and machines. Prioritizing API security from the outset is crucial; thus, RestCase conducts an analysis of the API definitions to identify potential security flaws and other vulnerabilities. In terms of Design-first Development, create APIs using a robust and user-friendly visual designer optimized for speed and efficiency, ensuring design consistency remains intact. Additionally, leverage collaboration tools to ease the transition to design-first and spec-first development practices, enhancing internal API adoption while facilitating the exchange of ideas and addressing concerns during the design phase. By embracing the design-first approach, you can enjoy advantages such as rapid feedback loops, impactful suggestions, and reduced wasted efforts. The Security-first Development principle emphasizes the importance of embedding security measures throughout the API building process to safeguard against potential threats. Overall, adopting these strategies can significantly enhance the quality and reliability of your APIs.
  • 18
    Data Theorem Reviews
    Take stock of your applications, APIs, and hidden assets within your expansive multi-cloud framework. Develop tailored policies for various asset categories, utilize automated attack tools, and evaluate security weaknesses. Address security concerns prior to launching into production, ensuring compliance for both applications and cloud data. Implement automatic remediation processes for vulnerabilities, with options to revert changes to prevent data leaks. Effective security identifies issues swiftly, while exceptional security eliminates them entirely. Data Theorem is dedicated to creating outstanding products that streamline the most complex aspects of contemporary application security. At the heart of Data Theorem lies the Analyzer Engine, which empowers users to continuously exploit and penetrate application vulnerabilities using both the analyzer engine and proprietary attack tools. Furthermore, Data Theorem has created the leading open-source SDK, TrustKit, which is utilized by countless developers. As our technology ecosystem expands, we enable customers to easily safeguard their entire Application Security (AppSec) stack. By prioritizing innovative solutions, we aim to stay at the forefront of security advancements.
  • 19
    APImetrics Reviews
    Independent, real-time monitoring of APIs tailored for developers, consumers, providers, and regulators is essential, as 70% of API issues are often overlooked by traditional tools and systems. This solution provides authentic, external calls from various global locations, ensuring continuous assurance regarding the security of your APIs. Users can effortlessly assess service performance and receive immediate alerts when issues arise, accompanied by insightful reports. Furthermore, it facilitates the swift resolution of third-party disputes while meeting regulatory requirements and enabling quick proof of compliance to relevant stakeholders. The platform offers valuable analysis and metrics, along with actionable service level agreements that come with straightforward reporting features. It supports customized monitoring for both REST and SOAP APIs and boasts cross-cloud integration capabilities. Adherence to API security standards, including JSON signing and full compliance with relevant regulations, is guaranteed. Moreover, it seamlessly integrates with popular DevOps and CI/CD tools through webhooks, providing a comprehensive solution for API coverage and assurance. This ensures that organizations can maintain robust API performance and security in an increasingly complex digital landscape.
  • 20
    Cortex Cloud Reviews

    Cortex Cloud

    Palo Alto Networks

    Cortex Cloud, developed by Palo Alto Networks, is an innovative platform aimed at delivering real-time security for cloud environments throughout the software delivery lifecycle. Integrating Cloud Detection and Response (CDR) with a sophisticated Cloud Native Application Protection Platform (CNAPP), Cortex Cloud provides comprehensive visibility and proactive safeguards for code, cloud, and Security Operations Center (SOC) settings. This platform empowers teams to swiftly prevent and address threats through AI-enhanced risk prioritization, runtime defense, and automated remediation processes. Additionally, with its effortless integration across multiple cloud environments, Cortex Cloud guarantees scalable and effective protection for contemporary cloud-native applications while adapting to evolving security challenges.
  • 21
    PingDataGovernance Reviews
    The rapid growth of digital transactions and data has led to a situation where authorization logic is dispersed throughout organizations. This fragmentation can make it challenging to update, audit, and manage such logic, often turning it into a cumbersome process. PingDataGovernance addresses this issue by offering a centralized system for authorization policies that can assess various factors, including identity attributes, entitlements, and contextual information, to facilitate authorization of essential actions and access to valuable data. This solution empowers organizations to respond swiftly without compromising on security or compliance with regulations. With an intuitive drag-and-drop interface, anyone can modify policies in just minutes. Additionally, organizations have the flexibility to determine which teams should have access to manage these policies, allowing for tailored governance. In contrast to traditional role-based access control (RBAC), dynamic authorization leverages important contextual data attributes to evaluate access requests in real-time, enabling centralized policy enforcement that meets regulatory standards. This innovative approach not only streamlines the management of access controls but also enhances overall organizational agility in a rapidly changing digital landscape.
  • 22
    Apiiro Reviews
    Achieve complete risk visibility at every stage of development, from design through coding to cloud deployment. Introducing the industry-leading Code Risk Platform™, which offers a comprehensive 360° overview of security and compliance threats across various domains, including applications, infrastructure, developers' expertise, and business ramifications. By making data-driven choices, you can enhance decision-making quality. Gain insight into your security and compliance vulnerabilities through a dynamic inventory that tracks application and infrastructure code behavior, developer knowledge, third-party security alerts, and their potential business consequences. Security professionals are often too busy to meticulously scrutinize every modification or to delve into every alert, but by leveraging their expertise efficiently, you can analyze the context surrounding developers, code, and cloud environments to pinpoint significant risky changes while automatically creating a prioritized action plan. Manual risk assessments and compliance evaluations can be a drag—they are often laborious, imprecise, and out of sync with the actual codebase. Since the design is embedded in the code, it’s essential to improve processes by initiating intelligent and automated workflows that reflect this reality. This approach not only streamlines operations but also enhances overall security posture.
  • 23
    Imvision Reviews
    Enterprises implement robust measures to secure their APIs throughout their entire lifecycle, ensuring protection regardless of their location. Achieving comprehensive visibility is crucial, as it allows a deep understanding of the underlying business logic that drives these APIs. By conducting thorough analyses of full API payload data, organizations can identify endpoints, usage trends, expected workflows, and any potential exposure of sensitive information. Imvision enhances this process by enabling the discovery of hidden vulnerabilities that go beyond conventional rules, thereby thwarting functional attacks and facilitating proactive measures against potential threats. Moreover, the application of Natural Language Processing (NLP) ensures high detection accuracy across large datasets while offering clear insights into the findings. This technology excels at recognizing ‘Meaningful Anomalies’ by interpreting API data as a language, thus revealing the functionalities of APIs through AI that models intricate data interrelations. It is also adept at identifying behavioral patterns that may attempt to tamper with the API logic at scale, allowing organizations to grasp anomalies more swiftly and in alignment with their business objectives. Ultimately, leveraging these advanced methodologies empowers enterprises to stay one step ahead of potential attackers while safeguarding their critical API infrastructure.
  • 24
    Salt Reviews

    Salt

    Salt Security

    Only Salt continuously and automatically discovers all APIs. It captures granular details about APIs to help you identify blind spots, assess risk, protect APIs, and maintain APIs protected, even as your environment changes. Continuously and automatically discover all APIs internal and external. You can also capture granular details like parameters, parameter functions and exposed sensitive data to help understand your attack surface, assess risk, and make informed decisions about how to protect them. Salt customers have discovered anywhere from 40% to 800% more APIs that what was listed in their documentation. These shadow APIs pose a serious risk to organizations as they can expose sensitive data or PII. Bad actors attacking APIs have moved past traditional "one-and done" attacks like SQLi and XSS. They now focus on exploiting API business logic vulnerabilities. Your APIs are unique so attacks must be unique.
  • 25
    42Crunch Reviews
    The true asset in your intelligence framework lies not in AI, but in the expertise of your developers. Equip them with the necessary tools to take charge of API security, ensuring consistent and exceptional protection throughout the entire API lifecycle. Integrate your OpenAPI definition seamlessly into your CI/CD pipeline to enable automatic auditing, scanning, and safeguarding of your API. By evaluating your OpenAPI/Swagger file against over 300 security vulnerabilities, we will prioritize them according to severity and provide precise remediation instructions, thus embedding security into your development processes effortlessly. Implement a zero-trust architecture by verifying that all APIs adhere to a defined security standard prior to production, actively scanning live API endpoints for potential risks and automating redeployment as needed. Maintain the integrity of your APIs from the design phase to deployment, gaining comprehensive insights into attacks targeting APIs in production, while also defending against threats without compromising performance. This proactive approach to security not only strengthens your defenses but also fosters a culture of vigilance within your development team.