CloudVector
Get a Demo

Events

Featured Events and Webinars

Demos

CloudVector Enterprise Edition

Hosted by Dinesh Mistry or Ravi Balupari | 10:30-11:00am PT

Join us for a 30-minute software demo by a technical expert of CloudVector’s Enterprise Edition to learn how to automatically and continuously discover APIs, monitor for deviant behavior, and secure data from exfiltration to prevent data breaches.

Webinar

How CloudVector Can Help Protect Against OWASP API Security Top 10 Threats

Do you know the ins and outs of the OWASP API Security Top 10 threats, and how you can best protect your organization against them? Watch this CloudVector technical review to learn just that.

Webinar

Winning the Application Development Race with a Security Pit Crew

Learn from our security expert panel how to make it happen with the right teams working together at breakneck speed.

CISO Webinar Replay

2020 Hindsight and 2021 Foresight – Digital Transformation in the Work from Home Era

ON-DEMAND WEBINAR

SolarWinds SUPERNOVA malware: A Case for API Protection for your 3rd Party APIs

API Vulnerabilities have been at the core of the massive SolarWinds SUPERNOVA malware attack. In this technical webinar, Ravi unpacks what exactly happened from a technical point of view, what API vulnerabilities were exploited, and what you can do. We’ll review the third party API risks and the role of Shadow APIs in this attack.

10 Minute Video

SolarWinds SUPERNOVA malware: A Case for API Protection for your 3rd Party APIs (10 minute video)

In this 10 minute video, Ravi highlights what API vulnerabilities were exploited in this attack, how it happened, and what you can do to protect your enterprise. We’ll review the third party API risks and the role of Shadow APIs in this attack. Learn how to gain visibility over ALL your APIs in minutes.

FEATURED WEBINAR

CISOs Speak Out:
The Zen of Zero Trust For Data

In this on-demand webinar sponsored by CloudVector and Concentric, we tackle the topic of zero trust for data with 3 CISOs, and steps they are taking to discover and protect their most precious data assets.

Webinars

CloudVector CTO Lebin Cheng discusses the following best practices: Unravelling the unknown APIs being used today in your organization, maintaining an up to date API Asset Registry, and assessing the risk exposure of your APIs.

In this 30MIN webinar, you’ll learn how to automate the process to find and fix API vulnerabilities in testing to prevent against the most dangerous OWASP API Top 10 Security Threats.

Many API breaches have one thing in common; the breached organization didn’t know about their unsecured APIs until it was too late. This is why the first step in API security is to discover the APIs which your organization is delivering, or which it consumes from third-parties.

VPN & VDI have emerged as a stop-gap for remote work, but it isn’t a long term solution. Enterprise apps must move to a service model popularized by SaaS.  Security controls must adapt to the new normal.

Conferences and Events

CISO Visions 2021

(March 2021)

CloudVector is pleased to be a Solution Provider participating in the CISO VISIONS Cybersecurity Summit in March. Many exciting keynote talks on CISO and security topics, and great companies to meet.

RSA 2021

(May 2021)

Look for us at the show!  We’d love to meet with you. More coming soon about our team’s involvement in this year’s conference, and who you can meet with virtually or live. Stay tuned.

RSA 2020

(March 2020)

We featured a demo at our exhibitor booth showing a real world banking situation, how our micro-sensor based software solution discovers enterprise application APIs, generates a blueprint and creates a catalog (inventory).

CloudExpo Alliance

(November 2019)

We featured a demo at our exhibitor booth showing a real world banking situation, how our micro-sensor based software solution discovers enterprise application APIs, generates a blueprint and creates a catalog (inventory).

RSA 2020

(February 2019)

Our exhibitor booth hosted cyber experts who discussed some of the most prevalent  API threats and the importance of securing APIs across the enterprise.