Skip to content
Wallarm

Wallarm

Category: API Security
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 12, 2026
6 min read
Key Takeaways
  • Protects 160,000+ APIs processing billions of requests daily. Combines WAF with ML-based API security, automatic discovery, and bot management.
  • Security Edge DNS deployment puts API protection in front of infrastructure in as little as 15 minutes — no infrastructure changes or agents required.
  • API Discovery builds inventory from live traffic (not uploaded specs), detecting shadow APIs, zombie APIs, and sensitive data flows including PII and credentials.
  • Covers OWASP API Top 10 with BOLA protection, GraphQL security (query depth limits, introspection blocking), and credential stuffing detection.

Wallarm is an API security platform that protects over 160,000 APIs and processes billions of requests daily. It pairs a web application firewall with ML-based API protection, automatic API discovery, and bot management in a single product.

Wallarm console dashboard showing traffic and attack analytics

The company is headquartered in Austin, TX with an additional office in San Francisco. Customers include Panasonic, Victoria’s Secret, Miro, Samsung, Dropbox, and Semrush. Wallarm also maintains several open-source projects: API Firewall, GoTestWAF, and the libDetection library.

What is Wallarm?

Wallarm started as a WAF and expanded into API security tools as API traffic outgrew traditional web application traffic. The platform treats API protection as the primary concern rather than a bolt-on to WAF rules.

It works in two modes. Inline mode sits in the request path and blocks attacks before they reach your backend. Out-of-band mode mirrors traffic for analysis without touching the live request flow. Both feed the same Wallarm Console for visibility.

The platform organizes into four product areas:

Advanced API Security
Bundles API Discovery, API Security Testing, API Abuse Prevention, and credential stuffing detection. Discovers your full API inventory from real traffic and blocks OWASP API Top 10 attacks.
Cloud-Native WAAP
Web application and API protection that deploys across cloud, Kubernetes, and on-premise environments. Handles injection attacks, XSS, and L7 DDoS alongside API-specific threats.
Security Edge
DNS-based edge deployment that puts API protection in front of your infrastructure. Wallarm claims deployment in as little as 15 minutes by redirecting DNS. Multi-cloud and multi-CDN compatible.
API Attack Surface Management
Agentless detection of external-facing APIs and hosts. Finds API leaks and exposed endpoints you may not know about.

Key Features

FeatureDetails
APIs protected160,000+
Requests processedBillions daily
API DiscoveryAutomatic inventory from live traffic, shadow/zombie/orphan API detection
Threat detectionML-based anomaly detection + signature matching
OWASP coverageFull OWASP API Security Top 10
Bot managementCredential stuffing, ATO, L7 DDoS, scraping detection
GraphQLQuery depth limits, complexity analysis, introspection blocking
Deployment optionsDocker, Kubernetes, NGINX, cloud connectors, DNS edge, eBPF
IntegrationsSlack, Teams, PagerDuty, Jira, Splunk, Datadog, Sumo Logic, and more

API Discovery

Wallarm builds your API inventory by analyzing real traffic rather than relying on uploaded specs. The API Discovery module identifies endpoints, request methods, parameters, data types, and authentication patterns.

Wallarm API Discovery showing discovered endpoints with methods and risk scores

It flags shadow APIs (undocumented endpoints handling live traffic), zombie APIs (deprecated endpoints still accessible), and orphan APIs (endpoints with no owner). Sensitive data detection picks up PII, financial data, credentials, and health information flowing through your APIs.

Wallarm API Discovery showing request parameters and data types for an endpoint

Risk scoring ranks endpoints by attack likelihood. Business-critical flows like authentication, billing, and account management are tagged automatically.

Key Differentiator
Wallarm builds API specs from observed traffic rather than requiring teams to upload OpenAPI definitions. The inventory updates continuously as your APIs change, and differences between actual behavior and documented specs are surfaced automatically.

Threat Detection and WAAP

ML models establish baselines of normal API behavior and flag deviations. This catches zero-day attacks and business logic abuse that signature-only tools miss. Wallarm also uses traditional signature matching for known attack patterns, so the two approaches cover different ground.

Protection covers the OWASP API Security Top 10:

  • BOLA (Broken Object Level Authorization) with automatic protection rules
  • Broken Authentication detection
  • Excessive Data Exposure monitoring
  • Rate Limiting enforcement
  • Broken Function Level Authorization detection
  • Mass Assignment blocking
  • Injection attacks (SQLi, XSS, RCE)
  • Security Misconfiguration identification

API Abuse Prevention

The API Abuse Prevention module targets automated attacks that traditional WAFs miss. It uses specialized detectors for:

  • Account takeover and credential stuffing — identifies automated login attempts by analyzing request patterns and timing
  • L7 DDoS — detects high-volume API abuse that overwhelms application logic
  • Scraping — blocks automated data extraction across API endpoints
  • Security crawlers — identifies scanning tools probing your API surface

Each detector has adjustable weighting and thresholds. Session-level blocking lets you stop a specific malicious session without affecting legitimate users sharing the same IP.

GraphQL Security

Wallarm includes protections specific to GraphQL APIs:

  • Query depth limiting to prevent deeply nested queries
  • Query complexity analysis
  • Introspection blocking in production
  • Batching attack prevention

Bot Management

The platform distinguishes legitimate automation (monitoring tools, partner integrations) from malicious bots. Policies can allow, challenge, or block different bot categories based on signatures, behavioral patterns, and client fingerprints.

Deployment

Wallarm offers several deployment paths depending on your infrastructure. All installation commands below come from the official documentation.

Docker

The NGINX-based Docker image runs on both x86_64 and ARM64. The current image is wallarm/node:6.10.1 based on Alpine Linux 3.22 with NGINX stable 1.28.0.

docker run -d \
  -e WALLARM_API_TOKEN='<YOUR_TOKEN>' \
  -e WALLARM_LABELS='group=<GROUP>' \
  -e NGINX_BACKEND='your-backend.example.com' \
  -e WALLARM_API_HOST='us1.api.wallarm.com' \
  -p 80:80 \
  wallarm/node:6.10.1

Set WALLARM_MODE to block, safe_blocking, monitoring, or off to control filtering behavior. Omit WALLARM_API_HOST if using the EU cloud.

Kubernetes (Helm)

Wallarm provides a Helm chart that wraps the community NGINX Ingress Controller (v1.11.8) with Wallarm filtering built in. The chart supports Kubernetes 1.26 through 1.30.

helm repo add wallarm https://charts.wallarm.com
helm repo update wallarm

helm install --version 6.10.1 wallarm-ingress wallarm/wallarm-ingress \
  -n wallarm-system \
  -f values.yaml

The values.yaml requires at minimum:

controller:
  wallarm:
    enabled: "true"
    token: "<NODE_TOKEN>"
    apiHost: "us1.api.wallarm.com"  # omit for EU cloud

Enable traffic analysis per ingress with annotations:

kubectl annotate ingress <YOUR_INGRESS> \
  nginx.ingress.kubernetes.io/wallarm-mode=monitoring

Additional Kubernetes options include sidecar proxy injection and eBPF-based out-of-band analysis.

All-in-One Installer (NGINX)

For compute instances running NGINX, the all-in-one installer auto-detects your OS and NGINX version:

curl -O https://meganode.wallarm.com/6.10/wallarm-6.10.1.x86_64-glibc.sh

sudo env WALLARM_LABELS='group=<GROUP>' \
  sh wallarm-6.10.1.x86_64-glibc.sh -- \
  --batch -t <YOUR_TOKEN> -c US

ARM64 builds are available at the same path with aarch64-glibc in the filename.

Cloud Connectors

Native connectors are available for:

  • AWS — ALB, API Gateway, CloudFront
  • Azure — Application Gateway, Front Door
  • GCP — Cloud Armor, Load Balancer
  • Cloudflare — Workers integration
  • CDN/Gateway — Kong, MuleSoft, Fastly, Akamai

Security Edge

Security Edge is the fastest deployment option. Point your DNS at Wallarm’s edge network and traffic is filtered before reaching your origin. No infrastructure changes, no agents to install. Wallarm claims setup in 15 minutes.

Integrations

Cloud Providers
AWS AWS
Azure Azure
GCP GCP
Alibaba Cloud Alibaba Cloud
Incident Management
PagerDuty PagerDuty
Jira Jira
OpsGenie OpsGenie
ServiceNow ServiceNow
SIEM & Observability
Splunk Splunk
Sumo Logic Sumo Logic
Datadog Datadog
Microsoft Sentinel Microsoft Sentinel
Communication
Slack Slack
Microsoft Teams Microsoft Teams
Telegram Telegram

Getting Started

1
Choose a deployment method — Security Edge (DNS redirect, 15 minutes), Docker container, Kubernetes Helm chart, all-in-one NGINX installer, or a cloud connector.
2
Create a Wallarm Console account — Sign up at us1.my.wallarm.com (US) or my.wallarm.com (EU). Generate an API token for your node.
3
Deploy the node — Run the Docker image, install the Helm chart, or execute the all-in-one script with your token. The node registers with Wallarm Cloud automatically.
4
Enable API Discovery and protection — Toggle API Discovery in the Console to start building your API inventory. Set filtering mode to monitoring first, then switch to blocking once you’ve reviewed the baseline.

Wallarm API Discovery showing endpoint inventory and traffic analysis

When to Use Wallarm

Wallarm is a good fit if:

  • You need API-specific protection beyond what a standard WAF provides
  • You want automatic API inventory built from live traffic, not manual spec uploads
  • Your APIs face bot abuse, credential stuffing, or scraping attacks
  • You run GraphQL endpoints that need query-level controls
  • You deploy across multiple clouds and need consistent API protection
  • You want the option of DNS-based deployment without infrastructure changes
Best For
API-first organizations and microservices teams that need both WAF and API-specific protection in one platform, with automatic API discovery from live traffic.

It’s probably not the right pick if:

  • You only need a basic WAF for static web pages without significant API traffic
  • You already use a dedicated API security tool like 42Crunch for spec-driven security and want a different approach
  • Your environment requires all security tooling to run entirely on-premise with no cloud component (though Wallarm does support on-premise Wallarm Cloud)

Wallarm also offers a Terraform provider for infrastructure-as-code management and a free API Security Certification program through Wallarm University.

Frequently Asked Questions

What is Wallarm?
Wallarm is an API security platform that combines web application firewall capabilities with API-specific protection. It protects over 160,000 APIs and handles billions of API requests daily. The platform discovers APIs automatically, detects threats using machine learning, and blocks attacks inline.
How does Wallarm deploy?
Wallarm offers multiple deployment methods: Security Edge via DNS redirect (as fast as 15 minutes), Docker containers using the wallarm/node image, Kubernetes via Helm-based NGINX Ingress Controller or sidecar proxy, the all-in-one NGINX installer for compute instances, and cloud connectors for AWS, Azure, GCP, and Cloudflare.
Does Wallarm discover APIs automatically?
Yes. Wallarm’s API Discovery module builds an API inventory from actual traffic. It identifies endpoints, parameters, data types, and authentication methods. Shadow APIs, zombie APIs, and orphan APIs are flagged automatically. Sensitive data flows such as PII, financial data, and credentials are detected.
What API attacks does Wallarm detect?
Wallarm detects BOLA attacks, credential stuffing, account takeover, data scraping, L7 DDoS, rate limit bypass, business logic manipulation, and GraphQL-specific threats like query depth abuse and introspection exploitation. It covers the full OWASP API Security Top 10.
Does Wallarm have a free tier?
Security Edge offers a free tier for getting started. The full Advanced API Security product and Cloud-Native WAAP are commercial offerings with pricing based on deployment scope.