SHARE
Facebook X Pinterest WhatsApp

Data Theorem Develops Active Protection Suite for Application Stacks

PALO ALTO, Calif. — Data Theorem is introducing an active protection suite with observability and run-time defense to secure applications stacks. The offering covers a range of functions: API, cloud, mobile, modern web, and serverless (Lambda), according to Data Theorem this month. It works across Data Theorem’s product portfolio to help customers enable application-layer security […]

Written By
thumbnail Chris Ehrlich
Chris Ehrlich
Nov 22, 2021
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

PALO ALTO, Calif. — Data Theorem is introducing an active protection suite with observability and run-time defense to secure applications stacks.

The offering covers a range of functions: API, cloud, mobile, modern web, and serverless (Lambda), according to Data Theorem this month.

It works across Data Theorem’s product portfolio to help customers enable application-layer security defenses across their application stacks.

See more: Application Security: Complete Definition, Meaning & Examples

Active Protection Suite features

  • Starts at the client layer (mobile and web), protects the network layer (REST and GraphQL APIs), and extends down through the underlying infrastructure (cloud services)
  • The run-time defenses include attack prevention, OWASP Top 10 rules, known malicious sources, policy violations of encryption levels, authentication types, authorization rules, and a variety of custom rule checks, including preventing Broken Object Level Authorization (BOLA) attacks
  • Increased observability (logging, tracing, trending)
  • Customers can enable Data Theorem’s Active Protection through the use of their SDKs (software development kits), application extensions (Lambda layers), and AppSec proxy (L7 sidecar proxying)

“Application environments are more dynamic when leveraging cloud services requiring increased telemetry,” said Doug Dooley, Data Theorem COO.

“Organizations need to discover their growing attack surfaces as their cloud adoption grows.”

See more: Top Application Security Vendors
thumbnail Chris Ehrlich

Chris Ehrlich is the managing editor of several web properties in the TechnologyAdvice network. He has over 20 years of experience delivering content-based results across journalism and communications, including on B2B technologies. As a leader in digital journalism, he’s driven targeted content that resonates with audiences and increases key metrics. As a leader in branded communications, he’s driven multi-channel content for clients that spreads their messages and generates measurable returns. He holds a B.A. in English and political science from Denison University in Ohio.

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.