Best API Security Software for Salesforce

Find and compare the best API Security software for Salesforce in 2026

Use the comparison tool below to compare the top API Security software for Salesforce on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Graylog Reviews

    Graylog

    Graylog

    $1250/month
    417 Ratings
    See Software
    Learn More
    Graylog empowers security teams by providing comprehensive insights across logs, events, and API interactions, which are crucial for identifying threats, examining incidents, and executing precise responses. With Graylog Enterprise, organizations can manage logs at scale, utilizing robust search capabilities, alert systems, and correlation features to speed up root cause investigations. Building upon this foundation, Graylog Security introduces enhanced threat detection, ready-to-use content for prevalent attack methods, and seamless integration with Security Operations Centers (SOCs). Meanwhile, Graylog API Security enhances oversight of the increasingly important API landscape by automatically discovering APIs, pinpointing sensitive data vulnerabilities, and detecting data breaches in real time. Collectively, the Graylog platform offers integrated, cost-effective security operations and API safeguarding—available both on-premises and in cloud environments—enabling teams to effectively identify, investigate, and address critical security issues.
  • 2
    aapi Reviews

    aapi

    aapi

    $4 per user per month
    Enhance the identity experiences across various applications to ensure they are more seamless, secure, compliant, and productive. By automatically incorporating the appropriate real-time actions, users and teams can efficiently interact with data in downstream applications with just a single click. This next-generation technology offers granular access to specific functions within applications, going beyond traditional PAM and CASB solutions to achieve genuine zero trust. Events such as identity provisioning and detection of suspicious activity are managed by AAPI, which automates responses related to identity, applications, and security. Furthermore, AAPI seamlessly integrates the right real-time actions for users and teams, allowing them to easily engage with data in their selected applications while being safeguarded by your IAM. Users are granted access solely to the features they require within the applications, ensuring that all other aspects remain protected and secure, all managed through your IAM. This streamlined approach significantly enhances the overall efficiency and security of identity management processes.
  • 3
    Vorlon Reviews
    Achieve ongoing near real-time detection and identification of data in transit between third-party applications, equipped with remediation capabilities. Failing to consistently monitor third-party APIs may unwittingly give attackers an average of seven months to exploit vulnerabilities before you can identify and resolve an issue. Vorlon offers continuous surveillance of your third-party applications, detecting unusual activities in near real-time by processing your data every hour. Gain a clear understanding of the risks associated with the third-party apps utilized by your Enterprise, along with actionable insights and recommendations. You can confidently report progress to your stakeholders and board, ensuring transparency. Enhance visibility into your external applications and swiftly detect, investigate, and respond to unusual activities, data breaches, and security incidents as they occur. Additionally, assess the compliance of the third-party applications your Enterprise relies on with relevant regulations, providing stakeholders with solid proof of compliance. Maintaining effective security protocols is essential for safeguarding your organization against potential threats.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB