Skip to main content
TrustRadius
Salt Security API Protection Platform

Salt Security API Protection Platform

Overview

What is Salt Security API Protection Platform?

For API-driven organizations, Salt Security is an API security platform that protects internal, external, and third-party APIs. The Salt C-3A Context-based API Analysis Architecture combines coverage and AI-powered big data todiscover APIs and exposed sensitive data - continuous and automatic discoverystop attackers…

Read more
Recent Reviews

TrustRadius Insights

The Salt Security API Protection Platform has been widely deployed across enterprises to gain better visibility into all APIs used, …
Continue reading

Salt review

9 out of 10
April 12, 2022
We use a Salt Security API Protection Platform as our provider of information about data consumption via API and call management at …
Continue reading

Salt Security Review

9 out of 10
September 30, 2021
We have implemented Salt in our in-house developed applications to identify and protect publicly accessible APIs.
Continue reading
Read all reviews
Return to navigation

Product Details

What is Salt Security API Protection Platform?

For API-driven organizations, Salt Security is an API security platform that protects internal, external, and third-party APIs. The Salt C-3A Context-based API Analysis Architecture combines coverage and AI-powered big data to
  • discover APIs and exposed sensitive data - continuous and automatic discovery
  • stop attackers in their tracks - block attackers by integrating with inline devices
  • provide remediation insights - for developers to improve API security posture

According to the vendor the Salt Platform differs from WAFs and API gateways, that cover only some APIs and operate on a narrow, single-transaction perspective, and is designed to understand the full context of APIs and users to provide complete security across the full API lifecycle.

The Salt platform deploys out of band, with no agents, and runs in cloud, on-premise and traditional or container/Kubernetes environments.

Salt Security API Protection Platform Features

  • Supported: discovery of APIs and exposed sensitive data
  • Supported: attack prevention
  • Supported: remediation insights

Salt Security API Protection Platform Competitors

Salt Security API Protection Platform Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesUS, EMEA, Asia Pac
Supported LanguagesEnglish

Salt Security API Protection Platform Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)0%
Mid-Size Companies (51-500 employees)35%
Enterprises (more than 500 employees)65%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(6)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

The Salt Security API Protection Platform has been widely deployed across enterprises to gain better visibility into all APIs used, including those in different cloud architectures and both in-house and third-party applications. Users have found this platform helpful for inventorying APIs and detecting attacks and unauthorized data access through these APIs. By providing a realistic view of the entire API infrastructure and the potential threats these APIs face, Salt Security API Protection Platform allows users to respond faster and more appropriately to potential attacks that exploit APIs as an attack vector. This platform addresses the need for visibility and control over the APIs being used and how they are consumed.

One key use case of the Salt Security API Protection Platform is to identify anomalies and support incident response. The platform integrates with SOC/SIEM tools to report detected attacks, facilitating investigations and faster incident response. Customers have implemented this platform in their in-house developed applications to identify and protect publicly accessible APIs. Salt Security API Protection Platform provides valuable information about data consumption via APIs and call management at application endpoints, considering PII tracking and access patterns of potential attackers. Users report productivity gains from the alerts generated and the intelligence provided by Salt Security API Protection Platform in analyzing vulnerabilities and threats. Additionally, the platform offers visibility into API traffic, enabling proactive identification of PII, discrepancies between API documentation and real traffic, potential attackers, as well as suggestions for countermeasures and improvements such as missing HTTP headers or endpoints lacking authorization. Customers appreciate that Salt Security API Protection Platform allows them to gain insights into their API traffic, which would be challenging without the platform given the number of endpoints and traffic volume.

Easy Deployment: Multiple users have expressed their appreciation for the easy deployment process of the product, which allowed them to set it up smoothly and without any hassle.

Excellent Visibility into API Activity: Many reviewers have specifically mentioned that the product offers excellent visibility into activity on APIs. This feature enables them to easily track and monitor how their APIs are being used.

Valuable Insights into Inventory: Some users have found great value in the product's ability to provide insights into their inventory. By using this tool, they were able to discover items that they were previously unaware of, resulting in a better understanding of their inventory.

Difficult Customized Deployments: Some users have found the process of setting up customized deployments to be challenging. They have encountered difficulties in configuring and implementing their specific requirements, which has resulted in frustration and delays.

Reporting Functionality Needs Improvement: Several reviewers have mentioned that the reporting functionality across the enterprise needs enhancement, not just in specific environments. Users have expressed a need for more comprehensive and robust reporting capabilities, including customizable reports, advanced analytics, and seamless integration with other systems.

Lack of Access to API Requests and Responses: A number of users have expressed a desire for access to requests and responses from all APIs, not just those related to attacks. They feel that having visibility into all API activities would allow them to better monitor and analyze potential threats or vulnerabilities.

Reviews

(1-6 of 6)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
We use Salt to have a realistic view of the entire API infrastructure and possible threats to which these APIs are being subjected. We were able to have a faster and more appropriate response to potential attacks that use APIs as an attack vector. Salt addresses the need to have visibility and control over what APIs we have and how these APIs are being consumed. I consider Salt a precious platform for security teams considering the massive and constant increase in the use of APIs in the architecture of new applications.
  • Detect possible attacks on APIs
  • Gain visibility into all APIs in your infrastructure
  • Access to requests and responses from all APIs (baseline), not only those related to attacks
Salt is highly recommended for anyone who wants to discover, monitor and protect their APIs against various types of attacks. Salt should not be used as a SIEM.
Score 8 out of 10
Vetted Review
Verified User
Use Case: Identify anomalies and support incident response. Salt Security API Protection Platform security is integrated with SOC/SIEM tools, reporting the found attacks in order to investigate and respond. The purpose is to have a faster incident response and provide data that supports attacks investigations and sensitive data flow control.
  • Sensitive data mapping
  • Detailed Attacks Reporting
  • Integration with SOC/SIEM tools
  • The platform could have more options for exporting detailed data from attackers' dashboards.
  • The Attackers dashboard could also have more options of filters in order to support the investigations of the attack.
  • The OAS analysis could present a more detailed view of the found issues.
Useful for detailing attacks and showing the sensitive data flow on APIs.
April 12, 2022

Salt review

Score 9 out of 10
Vetted Review
Verified User
We use a Salt Security API Protection Platform as our provider of information about data consumption via API and call management at application end-points, considering PII tracking and access patterns of eventual attackers (by IP address, authorization type, etc). In addition, Salt Security API Protection Platform provides us with a productivity gain related to the alerts generated and intelligence embedded in the analysis of possible vulnerabilities or threats.
  • List of Apis callers
  • Alert triagens about suspicious behaviors
  • PII identificaton
  • Consolidation reports about Apis accessing profiles.
  • Swagger to programming Apis.
Salt Security API Protection Platform is particularly well addressed to occasions when a park of endpoints is under attack and needs the identification of their origin, as well as the interpretation of their patterns related to the properties of the call header, helping to understand the type of attack that is taking place and the countermeasure to be taken.
Score 10 out of 10
Vetted Review
Verified User
Salt provides visibility on our API traffic, allowing us to proactively identify PII, differences in API documentation (swagger files) and real traffic, alerts in situations that indicate a potential attacker allowing us to take countermeasures and suggestions on improvements (missing important HTTP headers, endpoints lacking authorization, etc.). Given the number of endpoints we have and the traffic we have would be really difficult to get these insights without Salt.
  • PII identification in API traffic.
  • Divergence between API traffic and documentation (swagger files).
  • Potential attacks with information to take counter measures.
  • Reporting - more flexible ways to get information.
  • API documentation in order to interact with the platform.
If you have a large number of API endpoints and a dynamic scenario where teams create and change API endpoints and you want to get visibility on key information to keep your API traffic secure and compliant with privacy regulations.
September 30, 2021

Salt Security Review

Score 9 out of 10
Vetted Review
Verified User
We have implemented Salt in our in-house developed applications to identify and protect publicly accessible APIs.
  • Identifies APIs
  • Identifies attacks against the APIs
  • Identifies the type data that is accessible through the APIs
  • Better correctly identify the data that is accessible through the APIs.
It is great at identifying APIs that are being used within your custom developed applications. Once the APIs are identified, it also identifies all of the endpoints associated with those APIs. For a security team that is separate from the DEV team, this is very helpful.
Score 10 out of 10
Vetted Review
Verified User
We have deployed Salt [Security API Protection Platform] across the entire enterprise to have better visibility around all of our APIs. This is including several different cloud architectures and both in house and 3rd party applications. Salt [Security API Protection Platform] has helped us inventory our APIs and see any attacks and type of data being accessed through these APIs.
  • Easy deployment
  • Excellent visibility into activity on APIs
  • Inventory! It helps you find things you didn't know you had
  • Some customized deployments can be difficult
  • Reporting functionality across the enterprise and not just per environment needs improved
  • Better attack handling options needed
Easy deployment for common cloud API architectures, so it's very easy to at least get visibility into what you have. In house developed apps with a custom infrastructure could be a difficult integration.
Return to navigation