Akamai API Security is the behavioral-analytics API security platform Akamai built from the Neosec acquisition (closed Q2 2023). The platform discovers all APIs the customer is actually serving, including shadow APIs that no one in security knew existed, baselines normal behavior per endpoint and per consumer, and detects business-logic abuse and data-exfiltration patterns that signature-based WAFs are blind to.
Discovery is the first move and the most actionable insight the platform produces. Most enterprise programs do not have a complete inventory of the APIs they serve. The platform sees real traffic, infers the API surface, and surfaces every endpoint with risk scoring against authentication, sensitive data handling, and consumer behavior. Customers Merito has worked with consistently find APIs in the discovery beat that no one had documented and no one was protecting.
Behavioral baselining is the second move. The platform learns normal request patterns per API and per consumer over time. Anomalies trigger alerts for security analysts. Business-logic abuse (account takeover, broken object level authorization, broken function level authorization, scraping, abuse of legitimate API contracts) is the category of attack that signature-based tools cannot catch because the requests are individually well-formed. The behavioral platform is the right tool for the category.
Akamai API Security pairs with Akamai App and API Protector for closed-loop blocking. When the behavioral analytics flag an abuse pattern, App and API Protector enforces the block in line at the edge. The two products layer rather than compete, and the dominant Merito recommendation for customers with significant API surface area is both products together.
Ideal use cases
- Initial API discovery against an unknown or partially documented API surface
- Behavioral baselining and detection of business-logic abuse
- Threat hunting against suspected account-takeover or data-exfiltration patterns
- API posture management and continuous audit of authentication and sensitive-data handling
- Closed-loop blocking pairing API Security detection with App and API Protector enforcement