CloudVector
Get a Demo

Events

Featured Events and Webinars

WEBINAR

SolarWinds SUPERNOVA malware: A Case for API Protection for your 3rd Party APIs - Jan. 27 at 10:30am PT

API Vulnerabilities have been at the core of the massive SolarWinds SUPERNOVA malware attack. In this short, deep-dive webinar, Ravi unpacks what exactly happened from a technical point of view, what API vulnerabilities were exploited, and what you can do. We’ll review the third party API risks and the role of Shadow APIs in this attack. Learn how you can gain visibility over all your APIs within minutes, monitor their behavior, and secure them, to protect your enterprise.

TECHNICAL BRIEFING

SolarWinds SUPERNOVA malware: A Case for API Protection for your 3rd Party APIs (10 minute video)

API Vulnerabilities have been at the core of the massive SolarWinds SUPERNOVA malware attack. In this 10 minute technical deep dive video, Ravi unpacks what exactly happened from a technical point of view, what API vulnerabilities were exploited, and what you can do. We’ll review the third party API risks and the role of Shadow APIs in this attack. Learn how you can gain visibility over all your APIs within minutes, monitor their behavior and secure them, to protect your enterprise.  

Demos

CloudVector Enterprise Edition

Hosted by Dinesh Mistry or Ravi Balupari | 10:30-11:00am PT

Join us for a 30-minute software demo by a technical expert of CloudVector’s Enterprise Edition to learn how to automatically and continuously discover APIs, monitor for deviant behavior, and secure data from exfiltration to prevent data breaches.

FEATURED WEBINAR

CISOs Speak Out:
The Zen of Zero Trust For Data

In this on-demand webinar sponsored by CloudVector and Concentric, we tackle the topic of zero trust for data with 3 CISOs, and steps they are taking to discover and protect their most precious data assets.

Webinars

CloudVector CTO Lebin Cheng discusses the following best practices: Unravelling the unknown APIs being used today in your organization, maintaining an up to date API Asset Registry, and assessing the risk exposure of your APIs.

In this 30MIN webinar, you’ll learn how to automate the process to find and fix API vulnerabilities in testing to prevent against the most dangerous OWASP API Top 10 Security Threats.

Many API breaches have one thing in common; the breached organization didn’t know about their unsecured APIs until it was too late. This is why the first step in API security is to discover the APIs which your organization is delivering, or which it consumes from third-parties.

Conferences and Events

RSA 2021

(May 2021)

Look for us at the show!  We’d love to meet with you. More coming soon about our team’s involvement in this year’s conference, and who you can meet with virtually or live. Stay tuned.

RSA 2020

(March 2020)

We featured a demo at our exhibitor booth showing a real world banking situation, how our micro-sensor based software solution discovers enterprise application APIs, generates a blueprint and creates a catalog (inventory).

CloudExpo Alliance

(November 2019)

We featured a demo at our exhibitor booth showing a real world banking situation, how our micro-sensor based software solution discovers enterprise application APIs, generates a blueprint and creates a catalog (inventory).

RSA 2020

(February 2019)

Our exhibitor booth hosted cyber experts who discussed some of the most prevalent  API threats and the importance of securing APIs across the enterprise.