CASE STUDY

Bullish reduces costs, increases efficiency, and enhances overall security posture with Traceable

As an institution-focused cryptocurrency exchange, API security testing is a cornerstone of Bullish's business operations.

Read Case Study
arrow

CASE STUDY

Navan Identifies and Remediates Vulnerabilities at Scale With Traceable’s API Security Testing

We knew the vulnerabilities were there, and without a platform like Traceable, we had no way to uncover them in a repeatable way. Now, as people publish new APIs, we can test them immediately.

Read Case Study
arrow

CASE STUDY

DigitalOcean Partners with Traceable to help Advance Fraud Detection

Read Case Study
arrow

Data Sheet

Traceable + Wiz – Code to Cloud: API Threat Correlation

Read Datasheet
arrow

Data Sheet

Cequence vs Traceable Solution Comparison

Read Datasheet
arrow

Demo

Runtime Threat Protection

Watch Demo
arrow

Ebook

The Quest for Non-Intrusive Security

Read Ebook
arrow

Guide

API Security Buyer’s Guide

Download Guide
arrow

Podcast

How FinTech Innovator Razorpay Uses Open-Source Tracing And Observability to Manage Fast-Changing API Ecosystems

Watch Demo
arrow

Report

2024 State of API Security: Financial Services

Download Report
arrow

Solution Brief

Digital Fraud Prevention

Download Solution Brief
arrow

Video

Why API Security? (KubeCon 2021)

Watch Video
arrow

ON-DEMAND WEBINAR

PCI - DSS 4.0 Explained

A Practical Guide to the Latest Standards

Watch Webinar
arrow

Whitepaper

Data Collection for Context-Aware API Security

Download Whitepaper
arrow

Whitepaper

Meeting Regulatory and Industry Standards for API Security

Download Whitepaper
arrow

Blog

Service Now RCE - The Three Keys to ServiceNow's Data Vault

ServiceNow recently patched critical vulnerabilities (CVE-2024-4879, CVE-2024-5178, CVE-2024-5217) that allow remote code execution and sensitive file reads. Exploits involve server-side template injection using Apache Jelly. Traceable has deployed protection mechanisms to safeguard against these threats.

Read Blog
arrow

Blog

Securing Generative AI-Enabled Applications: Crawl - Walk - Run Strategy for Product Security

Buzz around generative AI security is at an all-time high, but most security pros are still in “listen and learn” mode when it comes to securing generative AI in their applications. So when is it time to get serious about securing generative AI in your applications, and what steps should you take? This post outlines a Crawl - Walk - Run approach for product and application security pros when it comes to securing generative AI-enabled applications.

Read Blog
arrow

Blog

Announcing Traceable API Inspector

Empowering API Security with Deep Inspection

Read Blog
arrow