Syndicated Blog

Impart Security Blog
API security insights.
Reduce False Positives with Dependent Sensitive Data Detections | Impart Security

Reduce False Positives with Dependent Sensitive Data Detections | Impart Security

|
With Impart’s Dependent Sensitive Data Detections, you can now create dependency graphs of different PII detections to improve accuracy and avoid false positives. In the example brought up earlier, one way to ...
Manage Access Control Lists Easily with Runtime Lists API | Impart Security

Manage Access Control Lists Easily with Runtime Lists API | Impart Security

|
Impart Security is proud to introduce Runtime Lists API, a groundbreaking feature designed to streamline how security teams manage Access Control Lists (ACLs). This innovation greatly simplifies the complex, time-consuming task of ...
Secure Authenticated Traffic with Integrated JWT Decoding Functions | Impart Security

Secure Authenticated Traffic with Integrated JWT Decoding Functions | Impart Security

|
Decoding JWTs has never been easier! Impart Security is excited to announce the addition of Integrated JWT Decoding Functions to our API security platform, enabling security teams to create sophisticated security rules ...

Manage Rule Dependencies and Rule Ordering with Runtime Rule Graphs | Impart Security

|
Today, Impart Security is proud to introduce Runtime Rule Graphs, our latest integrated API security platform feature. Unlike older runtime protection tools, like Web Application Firewalls (WAFs), that make it harder for ...
Enhancing API Security with JWT Core Detections | Impart Security

Enhancing API Security with JWT Core Detections | Impart Security

|
Security teams, we hear you. Today we release a few well-chosen JWT-based detections into our core ruleset for more effective API security. Some of the core detections available to our customers are: ...
Fingerprint API Attackers with Runtime Hash Patterns | Impart Security

Fingerprint API Attackers with Runtime Hash Patterns | Impart Security

|
Today, we’re excited to introduce Impart Security’s Runtime Hash Patterns, an innovative feature within our Runtime Rules framework that drastically simplifies how security teams can detect and respond to different types of ...

Streamlining the Alert Creation Process with Notification Templates | Impart Security

|
We're pumped to “impart” more great news: We’ve just launched Notification Templates, a composable, templated notification framework that allows security engineering teams to design thoughtful security notifications for a wide variety of ...

Bringing Composability to Firewalls with Runtime Protection Rules | Impart Security

|
Runtime Protection Rules are one of the most powerful features in Impart’s API security platform. We’ve taken all the lessons learned from decades of experience in the firewall space and created a ...
Improved Security Agility and Adaptability with Dynamic Runtime Lists | Impart Security

Improved Security Agility and Adaptability with Dynamic Runtime Lists | Impart Security

|
We’re proud to announce Impart Security’s newest release, Dynamic Runtime Lists, which are purpose-built to enable security teams to streamline security operations with adaptive security techniques that quickly and intelligently respond to ...
Use LLMs Safely with AI Workflows | Impart Security

Use LLMs Safely with AI Workflows | Impart Security

|
Today we are announcing the launch of Impart AI Workflows, our newest LLM-powered enhancement. Impart Security’s AI Workflows is a security workflow engine that helps security teams get things done faster using ...