Date
Time
-
Location
TBD
APIs serve critical business functions and handle sensitive data and business logic, making them prime targets for attackers. Security teams face an uphill battle protecting key user flows like logins and checkouts from abuses such as credential stuffing, account takeover, and SQL injection. But manual instrumentation and siloed tools introduce blind spots and slow down response times.
But, the threat doesn’t stop at the API layer. Once attackers gain access, workloads become their immediate next target. Post-exploitation activity—such as privilege escalation, shell access, or lateral movement—can go unnoticed without proper runtime protection.
In this session, we’ll examine key challenges in defending APIs and workloads, as well as how Datadog App & API Protection and Workload Protection allow you to:
- Secure mission-critical APIs and workloads without code changes
- Detect post-exploitation attacks in real time with runtime visibility Scale protection with your ever-growing cloud environment
- Triage and remediate threats more effectively across security, dev, and ops teams