Log in
Enquire now
L7 Defense

L7 Defense

L7 Defense is a Be'er Sheva, Israel-based cybersecurity and network security company working to develop systems to protect APIs and API-based applications.

OverviewStructured DataIssuesContributors

Contents

l7defense.com
Is a
Organization
Organization
Company
Company

Company attributes

Industry
‌
AI-enabled cybersecurity
Enterprise software
Enterprise software
Artificial Intelligence (AI)
Artificial Intelligence (AI)
Cybersecurity
Cybersecurity
‌
Web application security
Software
Software
Technology
Technology
Security
Security
...
Location
Israel
Israel
‌
Jersey City, New Jersey
‌
Be'er Sheva, HaDarom, Israel
B2X
B2B
B2B
CEO
Avraam Fried
Avraam Fried
0
Founder
Doron Chema
Doron Chema
Yisrael Gross
Yisrael Gross
AngelList URL
angel.co/l7-defense
Legal Name
L7 Defense Ltd.
Number of Employees (Ranges)
11 – 50
Email Address
office@l7defense.com
Full Address
77 Ha-Energia St. Beer-Sheva, 8470912 Israel0
67, 4th cross, Hennur Main Road, Bangalore, Karnataka India0
11 Kim Berley Court Kimberley Road London, NW6 7SL United Kingdom0
72 Van Reipen Ave. Suite 86, Jersey City NJ, 07306 USA0
Investors
Avraam Fried
Avraam Fried
TRUMPF Venture
TRUMPF Venture
EASME (EU Executive Agency for SMEs)
EASME (EU Executive Agency for SMEs)
Incubit Technology Ventures
Incubit Technology Ventures
Founded Date
2015
Total Funding Amount (USD)
6,584,000
Latest Funding Round Date
January 14, 2021
Competitors
Deep Instinct
Deep Instinct
Wallarm
Wallarm
Spherical Defence
Spherical Defence
Salt Security
Salt Security
CYR3CON
CYR3CON
Business Model
Subscription
Latest Funding Type
Series A
Series A
Wellfound ID
l7-defense

Other attributes

Blog
l7defense.com/blog/
Company Operating Status
Active
Contact Page URL
l7defense.com/contact-us/

L7 Defense is a cybersecurity company developing solutions for web application security, API and API-based application security, and DDoS protection solutions. The company works to help protect organizations' infrastructures, applications, customers, employees, and partners from API-borne attacks and other cybersecurity attacks. These systems use artificial intelligence-based technology in the Ammune platform.

Ammune Platform

Ammune is L7 Defense's platform technology for protecting APIs, which uses an unsupervised learning artificial intelligence approach for the protection of APIs. The platform has been deployed at a Tier-1 US telecommunications company to protect the company's APIs and applications. As well, the platform has contributed to the Energy Shield project in the European Union to help protect the project's smart grid development from DDoS attacks.

API-WAF Module

The API-WAF module works to protect from malicious content-based attacks or more classic cybersecurity attacks. The module performs in real time to conduct deep packet inspection (DPI), with an artificial intelligence or machine learning analysis of requests and replies that pass through an API, making it the first line of API protection. The module works to protect against a variety of types of security risks:

  • Injection
  • Broken authentication
  • Sensitive data exposure
  • XML external entities (XXE)
  • Broken access control
  • Security misconfiguration
  • Cross-site scripting
  • Insecure deserialization
  • Using components with known vulnerabilities
  • Insufficient logging and monitoring
API-BL Module

The API-BL module works to protect APIs against business logic (BL) attacks that have led to forbidden data or functionality access, or the attacks can lead to abused business processes and fraud. Protection is offered through the platform's ability to perform in-session traffic analysis to identify the attack and related patterns in real time, including in sessions and with historical data points. The types of attack this module works to protect against include the following:

  • Broken object level authorization
  • Broken user authentication
  • Broken functional level authorization
  • Mass assignment
  • Broken payment flow - missing bind between payment and order
  • Broken payment flow - insufficient input validation
  • Broken credentials restore flow
  • Broken credentials revoke flow
  • JWT token tampering
  • Insufficient 3rd party application trust
API-BOT Module

The API-BOT module of the platform works to protect APIs from business-related bot attacks. The module works to perform real-time full deep packet inspection (DPI), followed by artificial intelligence and machine learning analysis of the APIs traffic, content, context, and metadata, using specific bot activity measurements according to bot type activity characteristics. The type of attacks this module works to protect against include:

  • Carding
  • Token cracking
  • Ad fraud
  • Fingerprinting
  • Scalping
  • Expediting
  • Credential cracking
  • Credential stuffing
  • CAPTCHA defeat
  • Card cracking
  • Scraping
  • Cashing out
  • Sniping
  • Vulnerability scanning
  • Denial of service
  • Skewing
  • Spamming
  • Footprinting
  • Account creation
  • Account aggregation
API-DDoS Module

The API-DDoS module of the Ammune platform works to protect APIs against DDoS attacks, especially any attacks that could be tailored against a specific API or APIs, and even with attacks that use rotating source IPs or request content randomization while using optimization algorithms to decide a next wave of attack. This module also performs deep packet inspection (DPI) and uses the same artificial intelligence and machine learning systems to analyze the traffic of an API. This module works to protect against a variety of types of attack:

  • Classical botnets flood attack
  • Human mimicking attack
  • AI-based optimization attack
  • Heavy file downloads attack
  • Rotating IP's attack
  • IoT source IP's/anonymous proxies attacks
  • Multiple vectors attacking simultaneously
  • Request content randomization attack
  • "Out of scheme" parameters and contents attack
  • Cache evading attack
  • Randomly changing traffic volumes attack
  • Baseline poisoning attack
  • Flash crowding mimicking event attack
  • Attack occurs through flash crowding event
  • Asymmetric requests attack
  • Brute force attack
  • SlowLoris and slow-post attack
  • Slow read attack
  • SSL re-negotiation attack
  • SSL session exhaustion attack
Technology
Example of the Ammune API security platform.

Example of the Ammune API security platform.

The technology underlying the Ammune platform uses a bottom-up approach to API security, in which each protection layer is protected by one of the modules of the platform, and each module uses a separate artificial intelligence or machine learning platform. These modules are then supported by a separate module that protects an API throughout, based on micro-machines output.

Use Cases

L7 Defense's platform has been used in industries including API internet companies, financial institutions, financial technology companies, telecommunication companies, and industrial companies. For each of these industries, the Ammune platform works to protect the APIs and applications of these different institutions.

Timeline

No Timeline data yet.

Funding Rounds

Products

Acquisitions

SBIR/STTR Awards

Patents

Further Resources

Title
Author
Link
Type
Date

Blocking "Under the Radar" API Attacks - L7 Defense

https://www.l7defense.com/blocking-under-the-radar-api-attacks/

Web

October 26, 2020

Protecting APIs in AWS Cloud - L7 Defense

https://www.l7defense.com/protecting-apis-in-aws-cloud/

Web

October 26, 2020

Protecting the APIs of an MSSP - L7 Defense

https://www.l7defense.com/747-2/

Web

October 26, 2020

References

Find more companies like L7 Defense

Use the Golden Query Tool to find similar companies in the same industry, location, or by any other field in the Knowledge Graph.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.