The growing threat to APIs and how Cloudflare API Gateway can help
The real value of datacenter modernization
Business is driven by APIs. In fact, more than half the traffic we see on our network is API-related. What’s more, we now block a greater percentage of API traffic than web traffic, showing attackers have APIs firmly in their crosshairs.
At the same time, well-meaning internal teams build and deploy APIs fast—often without consulting security. This requires clear visibility to avoid shadow endpoints, the right layers of security, and API management that includes performance monitoring.
Join this webinar to hear Cloudflare discuss:
- The good and bad behind API growth
- Consideration for how to keep a close eye on all API endpoints—both known and unknown
- Security layers to block OWASP top 10 risks
- Management options once APIs are secure
- And see a live demo walkthrough of API Gateway capabilities
Watch now.
Provided by Cloudflare
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Ugreen NASync DXP4800 Pro reviewReviews A great value 4-bay NAS with a top hardware spec and good 10GbE performance but Ugreen's software is playing catch-up with the competition
-
Hardware volatility continues to squeeze channel marginsMemory pricing, in particular, is causing tension and forcing the channel ecosystem to quickly adapt to fast-changing market dynamics
-
The SMB Guide to Ransomware Recoverywhitepaper
-
Email Security at an Inflection Point: The 2026 Strategy Reportwhitepaper
-
The Network Penetration Testing Buyer’s Guidewhitepaper
-
Top 10 Critical Pentest Findings Report for 2025whitepaper
-
Delivering Agile Data Protection for Microsoft 365whitepaper
-
The Data Security Playbook for Insurance Leaderswhitepaper
-
How Thales Helps Meet Compliance Requirements in Europewhitepaper
-
Digital Operational Resilience Act (DORA)whitepaper
