Technology

Ammune™ Actively Protecting APIs from the 1st Request

Ammune™ presents a unique concept of API security technology, solely based on AI/ML. It is built at a “bottom-up” approach. Each API, at each protection layer, is protected by a separate “micro-AI/ML machine” (resulting in thousands of them). The protection layer is completed by a robust AI/ML model that protects all APIs throughout, based on the micro-machines’ output.

The Ammune™ platform technology was proven to be very accurate in finding threats in years of production experience, while consistently protecting the user experience at high quality.

Ammune™ protects from a wide range of cyber attacks

Ammune™️ modules (separated licensed) protect from different types of common API attacks

protects from a wide range of cyber attacks

Ammune™️ “Bottom-Up” protection process

  1. API ENDPOINT DISCOVERY
    New API endpoints are discovered by Ammune™ from the traffic flow and a specific adapted AI-based protection policy is set to it, according to the licensed modules.
  2. THREAT ANALYSIS
    Traffic is analyzed by the Ammune™ real-time and analytical units. Both include AI models that are adapted to the need of the different protection modules and attack types.
  3. ACTIVE PROTECTION
    Active protection is made by the Ammune™ real-time unit, according to the threat analysis results.

Ammune™ AI/ML Traffic Analysis Flow

web-trafic-to-the-apis-diagram

Ammune™ bio-originated “Danger Model” correlates independent positive and negative security models to identify attack patterns with extremely high accuracy

Bio-Originated-Danger-Model-Diagram