https://store-images.s-microsoft.com/image/apps.51431.76eb5aff-0a94-4350-8136-dbad1cc85947.474ecc3b-7765-4a58-bf43-aff849d1018b.8ff7e03f-434b-46e7-b65f-c8f551adf7ef

42Crunch API Firewall Container

42Crunch
Positive security REST API firewall deployed as a sidecar proxy with your microservices in AKS
https://store-images.s-microsoft.com/image/apps.52837.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.e1561f10-3071-4383-81dc-23c373ed5fd6
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.52837.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.e1561f10-3071-4383-81dc-23c373ed5fd6
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.20222.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.b30c6948-7b7f-447f-838f-5e322622939e

42Crunch API Firewall Container

42Crunch

Positive security REST API firewall deployed as a sidecar proxy with your microservices in AKS

API Firewall Container protects REST APIs exposed by microservices deployed in Azure Kubernetes Services (AKS). The firewall enforces the Positive Security Model based on the API definition (in OpenAPI format). The firewall gets automatically deployed within the microservice pods and enforces security on calls and responses with submillisecond overhead.

Automatically Apply Protection at Deployment Time

API Security is rapidly becoming one of the primary cybersecurity threats. APIs are proliferating due to the wide adoption of mobile apps, rich web applications, smart devices, and microservices architectures. Combined with the use of cloud services, this radically expands the attack surface compared to traditional web application user interfaces. With so many entry points often widespread in the network architecture, the perimeter defense with WAF in front of a server is no longer enough to ensure all entry points are protected.

To address these issues, 42Crunch Platform moves the defense from the network perimeter to in-depth directly in front of your APIs. With API Protection, you can protect each API from malicious intents with an API micro-firewall. The micro-firewall is tailored to your APIs, so it can distinguish hacking API calls from legitimate API traffic, unlike a traditional WAF-based solution.

Benefits

  • Automated Configuration: : Unlike most solutions dealing with security today, you do not need to manually create rules to configure 42Crunch’s API firewall. You can deploy our API firewall (from your CI/CD pipeline) and reconfigure it automatically each time the API changes.
  • Minimal Latency: : The API firewall was developed with performance in mind. Written in C and highly optimized, it typically only adds less than 1 millisecond of latency to the whole transaction, allowing you to deploy it at scale across your enterprise.
  • Flexible Deployment: : Our runtime is fully compatible with existing API management solutions or API gateways and with microservices-based architectures. We support the sidecar proxy and gateway deployment models.
  • Getting Started

    Click ‘GET IT NOW’ to get started, after following the steps below as 42Crunch subscription is required:

    1. Sign up to the 42Crunch platform at https://platform.42crunch.com/register
    2. Import into 42Crunch OpenAPI definition of the API you wish to protect
    3. Subscribe to this offering to get the firewall container image to your repository
    4. Follow 42Crunch documentation to deploy the firewall
    https://store-images.s-microsoft.com/image/apps.52837.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.e1561f10-3071-4383-81dc-23c373ed5fd6
    /images/videoOverlay.png
    https://store-images.s-microsoft.com/image/apps.52837.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.e1561f10-3071-4383-81dc-23c373ed5fd6
    /images/videoOverlay.png
    https://store-images.s-microsoft.com/image/apps.20222.76eb5aff-0a94-4350-8136-dbad1cc85947.8b421e09-eb7f-4813-9d2a-265fce2f585d.b30c6948-7b7f-447f-838f-5e322622939e