API Security Strategy - Discover and map APIs, block unwanted connection and prevent data leakage
This is the 2nd part of a 3 part series articles. For Part 1 - Governance and Automation - Distributd Apps for Hybrid Cloud Architecture, please refer to the link.
API Overview
API are fundamenta...
Updated Jan 04, 2023
Version 3.0Foo-Bang_Chan
Employee
Joined May 20, 2019
Foo-Bang_Chan
Dec 28, 2022Employee
Thanks. Yes. The fundamental principle is "you can't protect what you can't see". F5 XC API discovery help to uncover what you can't see (shadow API).