<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS in PANCast™ Episodes</title>
    <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/ta-p/583316</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F_u5VPyfLsjc%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D_u5VPyfLsjc&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F_u5VPyfLsjc%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;&lt;EM&gt;Episode Transcript:&lt;/EM&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Hello and welcome back to PANCast™.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Today we have Jayakumar Prakasam from the Prisma Cloud team, and we will discuss the API discovery feature on WAAS.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Hey John, thanks for inviting me today and giving this opportunity to deliver another great episode of PANCast™. My name is Jayakumar Prakasam and I am a Staff Technical Support Engineer working in the Prisma Cloud and Compute domain with&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Jayakumar Prakasam is a Staff Technical Support Engineer at Palo Alto Networks, specializing in the Prisma Cloud and compute domain. With years of experience in Cyber Security, Jayakumar is dedicated to enhancing the Cloud security and protecting the Cloud infrastructure from potential threats. With a passion for knowledge sharing, Jayakumar actively engages in sharing insights and best practices through various platforms. He is committed to fostering a culture of continuous learning and collaboration in the cybersecurity community." style="width: 307px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59016i4007736933A1668D/image-dimensions/307x337?v=v2" width="307" height="337" role="button" title="PANCast Ep_Jay_palo-alto-networks.png" alt="Jayakumar Prakasam is a Staff Technical Support Engineer at Palo Alto Networks, specializing in the Prisma Cloud and compute domain. With years of experience in Cyber Security, Jayakumar is dedicated to enhancing the Cloud security and protecting the Cloud infrastructure from potential threats. With a passion for knowledge sharing, Jayakumar actively engages in sharing insights and best practices through various platforms. He is committed to fostering a culture of continuous learning and collaboration in the cybersecurity community." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Jayakumar Prakasam is a Staff Technical Support Engineer at Palo Alto Networks, specializing in the Prisma Cloud and compute domain. With years of experience in Cyber Security, Jayakumar is dedicated to enhancing the Cloud security and protecting the Cloud infrastructure from potential threats. With a passion for knowledge sharing, Jayakumar actively engages in sharing insights and best practices through various platforms. He is committed to fostering a culture of continuous learning and collaboration in the cybersecurity community.&lt;/span&gt;&lt;/span&gt; years of support experience in cyber security.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So can you remind our audience what is WAAS? And what is the use case for the API Discovery feature?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1736998815"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Benefits from Using API Discovery&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt; Sure , WAAS stands for Web Application and API Security. WAAS helps organizations protect their web applications and APIs from various threats such as OWASP Top 10 vulnerabilities, API abuse, and account takeovers. I also recommend taking a look at the PANCast™ Episode 31 that details the WAAS feature. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Prisma Cloud WAAS API Discovery is a feature of Prisma Cloud that helps organizations discover and secure their APIs used in web applications. It scans cloud environments to identify APIs and provides insights into their usage, dependencies, and potential security risks. This information helps organizations ensure that their APIs are properly secured, compliant with regulations, and efficiently managed. Prisma Cloud WAAS API Discovery enhances visibility into API landscapes, enabling organizations to improve their security posture and governance of cloud-native applications.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;OK, so API discovery improves our customers' security posture by inspecting all the APIs on their web applications. Can you tell us a bit more about APIs?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Certainly! APIs, or Application Programming Interfaces, are a set of rules and protocols that allow different software applications to communicate with each other. They define the methods and data formats that applications can use to request and exchange information.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;In the context of web applications, APIs are crucial for enabling various functionalities. For example, an API might allow a web application to retrieve data from a server, update a database, or interact with third-party services like payment gateways or social media platforms.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;APIs play a key role in modern web development, enabling developers to build more dynamic and feature-rich applications. However, they also introduce security challenges, as they can be a target for attackers looking to exploit vulnerabilities or gain unauthorized access to sensitive data.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;By inspecting and monitoring all the APIs used in web applications, API discovery helps improve the security posture of customers by identifying potential vulnerabilities, ensuring compliance with security policies, and detecting and preventing malicious activity.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great! So how does the discovery work?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Sure, let me explain how the API discovery works, when API discovery is enabled, the Defender inspects API traffic routed to the protected app. Defenders learn the endpoints in your API by analyzing incoming requests and generating a tree of API paths. Every 30 minutes, Defender sends the Console a diff of what it has learned since its last update. The Console merges the update with what it already knows about the API.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;The API discovery subsystem attempts to ignore all HTTP traffic that doesn’t resemble an API call.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;OK, so we are inspecting publicly exposed resources to detect the APIs to protect. From your experience, who can benefit from using the API discovery and what are the use cases?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Yeah, the answer is pretty much anyone who needs to secure web applications and APIs. If you're running an e-commerce website, online banking application, or government portal, you need to keep your web applications and APIs secure. And if you're moving to the cloud, WAAS provides scalable and flexible security that can grow and adapt with your needs. Basically, if you've got a website or API, you need WAAS. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;Prisma Cloud WAAS API discovery offers several use cases to enhance the security of web applications and APIs , like building an inventory of the discovered APIs that helps in understanding the API landscape and the dependencies within your applications. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Enforcing security policy by ensuring only the approved APIs are accessed. API discovery helps in threat detection and prevention by monitoring the API traffic and identifying the vulnerabilities in APIs, while also ensuring the Compliance with regulatory requirements by monitoring API usage. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;You can also implement fine-grained access control policies based on API discovery insights to restrict access to sensitive APIs and data.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great! Anything we need to be aware of?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Well, definitely there are a few criteria for identifying which requests to inspect:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Requests must have non-error response codes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Requests must not have extensions (like .css, and .html).&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Requests Content-Type must be textual (text/), application (application/), or empty.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;&lt;SPAN&gt;On the API discovery database, when new path entries for images or API endpoints are added, the Console uses the 'Last Observed' date to delete the older entries to optimize the available resources. When an image or API endpoint is deleted from the database, an alert is generated, and the details are written to the Console logs.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks Jayakumar, how about the implementation of the API discovery? How complex is it?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;API discovery is enabled by default when you create a WAAS policy and it is not so complex to implement.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;You would need to log in to the Prisma Cloud Console and navigate to the 'Defend' tab. From there, you can access the Web Application and API Security (WAAS) module, which offers a range of deployment options to suit your needs.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Depending on your architecture, you can choose between different deployment modes, including Container (Inline/Out-Of-Band), Host (Inline/Out-Of-Band), App-Embedded, Serverless, or Agentless. Each mode is designed to provide comprehensive security without compromising your application's performance.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Whether you're looking to protect containerized applications, host-based environments, embedded applications, serverless functions, or require agentless protection, Prisma Cloud WAAS has you covered. Select the deployment mode that best fits your infrastructure and security requirements, and start securing your applications with ease. Select an existing rule and enable API endpoint discovery.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;There are several potential pitfalls to consider to ensure the feature is properly configured and effective, like ensuring that the API discovery mechanism captures all APIs used by your applications. Incorrectly configured discovery settings can lead to missed APIs or false positives, impacting the accuracy of security policies and threat detection , so you need to ensure that there are no misconfigurations. You certainly need to ensure that your infrastructure can handle the increased load without affecting performance since the API discovery can introduce additional network traffic and processing overhead.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;If you want to learn more, be sure to check out the Palo Alto Networks TechDocs for Prisma Cloud documentation, videos, and tutorials. And remember, if you need any help getting started, Palo Alto Networks is here to assist you every step of the way. Here’s an essential checklist that you can prepare when raising a support case with us:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Screenshots help to describing the issue, including the current WAAS configuration, Screenshots from the API discovery page and the error or issue you are facing&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Defender log &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Console log&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;OK, so we have enabled API discovery, what’s next?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great question! Now that API discovery is enabled, it is now about inspecting the discovered API endpoints and protecting them. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;In the Monitor section of the Prisma Cloud Console, specifically under Web Application and API Security (WAAS) and API Discovery, you'll find an endpoint report that provides a detailed overview of the APIs discovered within your environment. This report categorizes APIs based on their path, HTTP method, associated application, and more. It includes essential information such as the path, HTTP method, number of hits, API protection status, path risks, the workload responsible for the APIs, image risk factors, resource vulnerabilities, App ID, and the date when the API was last seen.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;One of the key aspects highlighted in the report is the 'Path risks' column, which flags critical risks associated with specific endpoints. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;This report serves as a valuable tool for understanding the security posture of your APIs, allowing you to identify and address potential vulnerabilities and risks proactively.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Awesome, So, How exactly do we protect the endpoints?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1736998815"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;Protecting the Endpoints&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Well, this is just a click of a button, Select ‘Protect’ next to a resource to protect a path, set effects for all API endpoints discovered in the App, and select Protect all. This enables you to protect all the API endpoints in the resource path identified within an app to the WAAS policy rule, not just the selected path. When there is an event generated from a new endpoint, you have to explicitly Protect it.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Lots of things to remember today, can you summarize in a few takeaways?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1736998815"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;The Episode Takeaways&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Sure, John , here are some key takeaways:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;WAAS API Discovery helps organizations discover and secure their APIs used in web applications.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;By inspecting and monitoring all the APIs used in web applications, API discovery helps improve the security posture of customers by identifying potential vulnerabilities, ensuring compliance with security policies, and detecting and preventing malicious activity.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;WAAS provides scalable and flexible security that can grow and adapt with your needs. Basically, if you've got a website or API, you need WAAS. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;BR /&gt;
&lt;DIV&gt;&lt;SPAN&gt;WAAS API discovery offers several use cases like building the discovered APIs inventory , enforcing the security policy by allowing access to only approved APIs, threat detection and compliance monitoring&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thank you Jayakumar. Some great info today. PANCasters remember the transcript and useful links for this episode can be found at live.paloaltonetworks.com. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Jayakumar:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks again John for having me today, I hope to join in another episode soon.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Content:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A title="
API Discovery" href="https://docs.prismacloud.io/en/classic/compute-admin-guide/waas/waas-api-discovery" target="_blank" rel="noopener nofollow noreferrer"&gt;API Discovery&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="
API definition scan" href="https://docs.prismacloud.io/en/classic/compute-admin-guide/waas/api-def-scan" target="_blank" rel="noopener nofollow noreferrer"&gt;API definition scan&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="
PANCast™ Episode 27: The Importance of Making Use of Defender Logs" href="https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-27-the-importance-of-making-use-of-defender-logs/ta-p/556353" target="_blank" rel="noopener nofollow noreferrer"&gt;PANCast™ Episode 27: The Importance of Making Use of Defender Logs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A title="
PANCast™ Episode 31: WAAS, How Could It Help Us?" href="https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-31-waas-how-could-it-help-us/ta-p/566417" target="_blank" rel="noopener nofollow noreferrer"&gt;PANCast™ Episode 31: WAAS, How Could It Help Us?&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Prisma Cloud" id="Prisma_Cloud"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 11 Apr 2024 19:50:25 GMT</pubDate>
    <dc:creator>ozheng</dc:creator>
    <dc:date>2024-04-11T19:50:25Z</dc:date>
    <item>
      <title>PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/ta-p/583316</link>
      <description>&lt;P&gt;&lt;SPAN&gt;In this episode, we explore the importance of API discovery in securing web applications and APIs, focusing on how Prisma Cloud WAAS enhances API security through effective discovery mechanisms.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PANCast Ep 40_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59015iF0BCD70F5A427C0F/image-size/large?v=v2&amp;amp;px=999" role="button" title="PANCast Ep 40_palo-alto-networks.jpg" alt="PANCast Ep 40_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 19:50:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/ta-p/583316</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2024-04-11T19:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 40: Prisma Cloud API Discovery Using WAAS</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/tac-p/583445#M96</link>
      <description>&lt;P&gt;Great topic, and thank you for sharing your insights!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 23:58:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-40-prisma-cloud-api-discovery-using-waas/tac-p/583445#M96</guid>
      <dc:creator>jnathan</dc:creator>
      <dc:date>2024-04-11T23:58:29Z</dc:date>
    </item>
  </channel>
</rss>

