Listing Thumbnail

    Spherical Defense API Security

     Info
    Deployed on AWS
    Free Trial
    Spherical Defense uses unsupervised Deep Learning to secure your API traffic without human intervention or configuration.

    Overview

    Spherical Defense learns normal application behaviour in a completely unsupervised manner and uses this learned knowledge to detect anomalies and threats in API traffic. Spherical is deployed on-premise or private cloud, with a simple 1-click deployment process on AWS. Security models can start detecting malicious behaviour within 4 hours and offer excellent support for zero-day attacks. No configuration needed, and no data leaves your premises. Ever.

    Highlights

    • Integrates with your workflow.
    • 99.99% attack detection accuracy.
    • 1-click installation with no configuration required.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 18.01

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 7 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Spherical Defense API Security

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (5)

     Info
    Dimension
    Cost/hour
    g3s.xlarge
    Recommended
    $2.00
    g4dn.2xlarge
    $2.00
    g3.4xlarge
    $2.00
    p2.xlarge
    $2.00
    g4dn.xlarge
    $2.00

    Vendor refund policy

    Full refund within 7 days.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Malicious activity and behavior detection.

    Additional details

    Usage instructions

    Once launching the instance, follow the instructions to get up and running here: https://guide.sphericaldefence.com/guide/quickstart/amazon-machine-image#data-ingestion 

    1. Fire POST requests at the /evaluate endpoint, in which the JSON body of each request comprises the event to be analyzed.
    2. When at least 16,000 events have been received, a security model will be trained asynchronously.
    3. Every subsequent request sent to the /evaluate endpoint will be classified, and an interpretation included in the response.

    To integrate with your stack, including Kong and the AWS API Gateway, follow instructions here: https://guide.sphericaldefence.com/guide/integrations 

    Resources

    Vendor resources

    Support

    Vendor support

    Our team can help with workflow integrations, and help get you up and running. contact@sphericaldefence.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Natural Language Processing
    Top
    100
    In IT Business Management

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    1 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    23 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Anomaly Detection
    Utilizes unsupervised Deep Learning to identify abnormal API traffic patterns and potential security threats
    Machine Learning Model
    Learns normal application behavior automatically without human intervention or manual configuration
    Deployment Flexibility
    Supports on-premise and private cloud deployment with rapid single-click installation process
    Threat Detection Speed
    Capable of detecting malicious behavior within 4 hours of deployment
    Zero-Day Attack Protection
    Provides advanced security detection capabilities for emerging and unknown attack vectors
    Threat Detection
    Advanced AI and machine learning algorithms for real-time identification and blocking of cyber threats targeting APIs
    DDoS Mitigation
    Automated detection and prevention of distributed denial-of-service attacks without performance degradation
    Traffic Monitoring
    Real-time visibility and analysis of API traffic patterns, anomalies, and usage metrics across multiple deployment environments
    Machine Learning Defense
    Intelligent threat detection system capable of identifying zero-day exploits and preventing API abuse through adaptive learning mechanisms
    Security Coverage
    Comprehensive protection framework ensuring confidentiality, integrity, and availability of sensitive API data across cloud, hybrid, and on-premise infrastructures
    API Behavioral Analytics
    Advanced context-based behavioral analytics for detecting and analyzing API interactions and potential security threats
    Distributed Tracing
    Continuous monitoring and tracking of API transactions across distributed microservices environments
    Deployment Flexibility
    Supports out-of-band and inline deployment modes without requiring agents or application code modifications
    Cloud-Native Security
    Specialized security solution designed for dynamic and rapidly changing microservices-based application architectures
    Real-Time Threat Protection
    Immediate detection and response to potential API security risks through continuous monitoring and analytics

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    5
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    100%
    0%
    0%
    0%
    0%
    1 AWS reviews
    Martin

    Really nice, automated API security solution

    Reviewed on Feb 13, 2020
    Review from a verified AWS customer

    I’m the Head of Engineering at a mid-sized e-commerce retailer. I deployed Spherical Defense to secure our application servers, which are increasingly vulnerable as our inbound traffic grows. I spoke with Jack at Spherical, and together we were able to get a deployment and integration done with a couple of calls.

    Since deploying the solution, I’ve been picking up numerous threats, including blind SQL injections and bot traffic from China.

    View all reviews