SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Weapon detection
  • Home
  • About
  • News
  • Security beat
  • Expert commentary
  • Case studies
  • Round table
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Graylog acquires Resurface.io’s API security solutions signalling wider industry consolidation trend

21 Jul 2023

Graylog acquires Resurface.io’s API security solutions signalling wider industry consolidation trend
Contact company
Contact Graylog, Inc.
icon Add as a preferred source Download PDF version

Graylog, a global provider of award-winning SIEM and log management solutions announced its acquisition of Resurface.io’s data-driven API security platform.

The acquisition broadens Graylog’s security portfolio and delivers to enterprise customers a comprehensive API security Threat Detection and Incident Response platform to combat the evolving challenges in the API security landscape. The product will be named Graylog API Security. 

Resurface API solution

As APIs have become one of the most exposed attack surfaces, Resurface.io's distinct expertise and innovative technologies will help customers fortify their defences against API-related threats.

By building integration points between the Resurface API solution that captures complete API traffic data for insights into attacks and threats and Graylog’s existing SIEM solution, customers will benefit from seamless API security monitoring, threat detection, and incident response capabilities.

Lack of security monitoring

APIs have rapidly become a favoured attack surface for cybercriminals as attacks in Europe reach peak levels"

Graylog CEO, Andy Grolnick, stated, “APIs have rapidly become a favoured attack surface for cybercriminals as attacks in Europe reach peak levels. Yet, not unlike the “emperor has no clothes” fable, most APIs are exposed due to lack of security monitoring, authentication issues, and other vulnerabilities."

"This has led to the theft of millions of personal records (PII), ransomware, and other damaging attacks."

Solution focused on API-specific threats

"What is needed is a purpose-built API security solution  focused on the detection of and response to API-specific threats, working in concert with a SIEM to provide a more complete defence.”

“Integrating Resurface.io’s data-driven API security solution with Graylog’s award-winning SIEM platform will empower organisations across Europe to proactively safeguard their APIs and position Graylog as the only SIEM provider offering an API Security solution,” added Grolnick. 

WAF and API gateways

An additional layer of defence can also address sophisticated attacks from authenticated users

Unlike other API solutions, Graylog API Security works with existing Web Application Firewall (WAF) and API gateways to provide an additional layer of defence that can also address sophisticated attacks from authenticated users who often gain entry as trial users, partners, and even paying customers.

This minimises disruption to the security team with improvements to the organisation’s overall security posture achieved in minutes.

Key advantages

Key advantages of Graylog’s API Security solution include the following: 

  • Guided Threat Detection & Response - out-of-the-box alerts that include clear explanations and actionable steps finely tuned to each API, including OWASP Top 10 coverage.
  • Continuous, Uninterrupted Monitoring - Runtime scanning provides real-time threat detection without impacting app performance no matter how many threat signatures are checked.
  • Full Request AND Response Payload - Goes beyond request header data, sampling, and modeling to enable precise alerts, efficient retroactive threat hunting, incident investigation forensics, and insightful trend analysis.
  • Secure Self-Managed Solution - Keeps sensitive data in-house, avoids third-party disruptions and PII concerns, and eliminates the hassle and red tape of SaaS security reviews.
  • Effortless Implementation & Maintenance - The self-contained security data lake and modern Kubernetes architecture makes Implementation and maintenance easy and cost-effective for even smaller enterprises

SIEM approach

Resurface.io’s Founder, Rob Dickinson, stated, “I am thrilled to become a part of Graylog and help contribute Resurface’s expertise in API security to their innovative portfolio. Resurface.io’s solution takes a SIEM approach to solve the API Threat Detection issue, so there are many synergies."

"The Resurface API technology and solution will enable Graylog to reach a broader audience, accelerate product advancements, and provide customers unparalleled API ecosystem protection.”

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Industrial security
  • Commercial security
  • Security management
  • Security policy
  • Security devices
  • Security tagging
  • Security monitoring system
  • Network monitoring
  • Video analytics
  • Remote video monitoring
  • Intrusion detection
  • Identity management
  • Explosives detection
  • Industrial security systems
  • Security software
  • IP Surveillance
  • Security service
  • Industrial surveillance
  • Human identification system
  • Visitor management systems
  • IP security solutions
  • Integration software
  • Cyber security
  • Video Management System
  • Corporate Security
  • Central Monitoring
  • Data Security
  • IP transmission
  • Incident Management
  • Cloud security
  • Weapon detection
  • Related categories
  • CCTV software
  • Network video recorders (NVRs)
Related white papers
School security moves to the cloud

School security moves to the cloud

Download
Cloud video and smart cities

Cloud video and smart cities

Download
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
Related articles
The how and why of gunshot detection

The how and why of gunshot detection

Do we have the technology to reduce our epidemic of mass shootings?

Do we have the technology to reduce our epidemic of mass shootings?

Gunfire detection solutions and AI technology to address the growth in mass shootings

Gunfire detection solutions and AI technology to address the growth in mass shootings

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Weapon detection
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec