We're excited to announce the release of UAP 8.0, featuring significant enhancements to API security management that deliver unprecedented visibility and control over your risk posture, alongside major updates to our Bot Management capabilities with cutting-edge machine learning and comprehensive threat analytics. This release introduces comprehensive issue tracking capabilities, robust evidence validation, seamless integration with your existing IT service management workflows, and transforms how security teams detect, analyze, and remediate sophisticated bot attacks across diverse industry verticals with a completely redesigned user experience.
The 8.0 release of Cequence Unified API Protection (UAP) is generally available as of July 4, 2025.
API Security Improvements
Comprehensive Issue Status Management
UAP 8.0 transforms how you monitor and manage API security risks with sophisticated issue tracking capabilities. The platform now offers seven customizable status options, allowing security teams to categorize and track issues with precision across their entire API landscape. Real-time state changes are reflected instantly on both the API Risk Posture page and executive summary dashboards, providing stakeholders at every level with current, actionable intelligence.
The system intelligently manages issue lifecycles through automatic status updates, seamlessly transitioning issues between states as they're resolved or regress. This automation ensures your security posture remains accurate without manual intervention, while maintaining complete visibility into issue history and progression patterns.
Issue Status Management
Extended Visibility with Year-Long Audit Trails
Security governance requires historical context, which is why UAP 8.0 now retains issues with full evidence and history for up to one year. This extended retention capability provides comprehensive audit trails that support compliance requirements and enable trend analysis for strategic security planning. Teams can efficiently manage large-scale remediation efforts through bulk update functionality, allowing simultaneous status assignments across multiple endpoints that share common risk characteristics.
Evidence-Based Risk Validation
UAP 8.0 elevates risk validation with detailed evidence capture for all identified threats, including weak authentication scenarios and sensitive data exposure incidents. Security teams can now examine raw HTTP requests and responses directly within the platform, with full download capabilities for offline analysis and documentation. The system pinpoints specific problem areas within communications, eliminating guesswork and accelerating remediation efforts.
For sensitive data exposure scenarios, the platform provides direct access to detection regex patterns with in-place editing capabilities, allowing teams to fine-tune risk detection efficacy without leaving the interface. This streamlined approach ensures your security rules evolve with your application landscape.
Risk Evidence Analysis
Seamless ServiceNow Integration
Enterprise security operations demand integration with existing IT service management workflows. UAP 8.0 delivers comprehensive ServiceNow integration that automatically generates tickets with complete risk context, endpoint details, custom tags, and supporting evidence. This automation eliminates manual ticket creation while ensuring all relevant information reaches your remediation teams.
The integration features streamlined self-service connector creation through the Integrations menu, making deployment straightforward for any organization. Real-time sync monitoring provides visibility into connector health and connectivity status, while bidirectional status updates ensure changes made in ServiceNow are automatically reflected within the UAP platform, maintaining consistency across your security ecosystem.
ServiceNow Integration
API Dependency Visualization with Flow Graph
Understanding the interconnected nature of modern API architectures is crucial for comprehensive security management. UAP 8.0 introduces Flow Graph, a powerful visualization feature that maps dependencies between your internal APIs, revealing the complete network of service communications within your environment. This intuitive graph-based interface provides immediate visibility into which APIs are calling which others, enabling security teams to quickly identify critical pathways and potential cascade effects of security issues.
Flow Graph delivers comprehensive internal API traffic visualization accessible directly from the API Definitions page or Events menu, making dependency analysis a seamless part of your security workflow. Security teams can filter the visualization to focus on specific components or services, then drill down into granular details including client and server information, transaction volumes, and Kubernetes pod names and labels. This level of detail empowers teams to understand not just what services communicate, but how frequently and through which infrastructure components, enabling more informed security decisions and efficient incident response.
API Flow Graph for Internal APIs
Enhanced Platform Scalability and Performance
UAP 8.0 delivers substantial improvements in platform scalability to meet the demands of enterprise-scale API environments. The platform now supports API specifications up to 50MB, representing a significant increase in capacity that accommodates even the most complex API architectures and comprehensive documentation. This enhanced specification handling ensures that organizations with extensive API portfolios can leverage UAP's full security capabilities without size limitations.
Bot Management Improvements
Redesigned Threat Protection with Industry-Specific Intelligence
Our Bot Management platform now delivers unprecedented threat detection capabilities with over 20 industry-specific threat categories automatically identified through advanced machine learning models. These categories are detected seamlessly without requiring user configuration or input, providing immediate protection across critical business functions.
The platform intelligently recognizes account protection threats including account takeover attempts, fake account registration, and credential stuffing campaigns. For telecommunications providers, specialized detection covers CPNI data exfiltration, device activation fraud, and SIM swapping attacks. Retail organizations benefit from targeted protection against inventory scalping, gift card abuse, and payment fraud schemes, while financial institutions receive comprehensive coverage for credit origination fraud and related threats.
The user experience has been completely redesigned with simplified rule names and intuitive ruleset groupings that organize related detection capabilities for easier security team management. The enhanced Detection page now displays critical threat context including detected threat categories and current mitigation volumes, enabling security teams to prioritize response efforts on unmitigated threats from specific fingerprints or IP addresses. Seamless navigation between Detection and Mitigation pages eliminates manual data transfer, streamlining incident response workflows.
Out-of-the-box Threat Classification
Interactive Machine Learning for Threat Analysis
Security teams can now directly interact with Cequence's machine learning technology to analyze malicious activity and implement targeted remediation measures. When anomalous traffic spikes occur or suspicious fingerprint activity is detected, the Attack Feature Detection ML model provides instant analysis and actionable recommendations.
This intelligent system compares detected activity against established behavioral baselines to identify genuine threats and automatically suggests appropriate rules and policies for immediate threat blocking. This automation eliminates time-consuming manual analysis processes while reducing the risk of human error in threat assessment and response.
Invoke Attack Feature Detection ML to analyze and remediate threats
Threat & Entity Behavioral Analytics (TEBA) Technology
The platform introduces sophisticated Threat & Entity Behavioral Analytics capabilities that detect advanced malicious behaviors across three critical attack vectors. TEBA technology identifies enumeration attacks where threat actors systematically test parameter values to extract unauthorized data, such as using a single API key to access multiple customer profiles or tracking identifiers to gather shipment information.
Rotation behavior detection identifies attackers cycling through multiple stolen credentials, API keys, or tokens, typically sourced from compromised databases or public repositories. This capability is particularly effective against advanced account takeover attempts using common password lists or validation attacks against exposed API keys.
Replay attack detection identifies attempts to reuse previously valid authentication tokens or keys that may exploit application weaknesses in token validation. This protection addresses implementation gaps where applications fail to properly verify the current validity of submitted credentials.
TEBA technology monitors and analyzes behavior patterns across IP addresses, device fingerprints, and user sessions, enabling detection of sophisticated bots targeting high-value APIs to exploit vulnerabilities or security misconfigurations.
Automated Baselining with Machine Learning
The platform features a new Baselining machine learning model that automatically configures TEBA rules based on detected application activity within customer environments. This intelligent system operates on a regular cadence, continuously discovering new application behaviors and automatically updating protection rules to address emerging threats.
Baselining technology ensures that threat detection capabilities evolve with your application landscape, maintaining effective protection against sophisticated attacks without requiring manual rule management. Organizations can disable this automated functionality if needed, while benefiting from continuous threat intelligence updates that enhance detection accuracy over time.
Comprehensive Web Application and API Protection (WAAP)
UAP 8.0 introduces comprehensive Web Application and API Protection capabilities that unify security controls across your entire application landscape. This integrated WAAP solution combines advanced Web Application Firewall (WAF) protection, robust DDoS mitigation, sophisticated bot management, and comprehensive API security within a single, unified platform.
Available as an add-on to Cequence Bot Management, the WAF component delivers extensive protection against OWASP Web Application Top 10 threats, providing comprehensive coverage for common web application vulnerabilities. Protection extends to administrative interfaces, preventing unauthorized access that could lead to system compromises and data breaches. The platform also defends against malicious input patterns including Log4j exploits, Java deserialization attacks, and localhost bypass attempts, while sophisticated SQL injection prevention capabilities use extended pattern matching to block database exploitation attempts.
DDoS protection operates at enterprise scale, defending against the most frequent Layer 3 and Layer 4 attacks including SYN floods, UDP floods, and reflection attacks through always-on network flow monitoring. The solution provides comprehensive coverage across all deployment regions with automatic detection and inline mitigation capabilities, delivering 99.99% availability protection against common infrastructure attacks.
The WAAP integration creates a unified security architecture that eliminates the operational complexity of managing multiple security solutions. This consolidation reduces administrative overhead while providing consistent protection across all application components, from traditional web applications to modern API-driven architectures. The single-platform approach ensures seamless policy management and eliminates coverage gaps that can occur when routing traffic through multiple security tools.
UAP Platform Updates
Complete UI/UX redesign organizes features under "Discover," "Posture Management," and "Threat Protection" with improved navigation, universal search, and light/dark mode options.
UI/UX Overhaul
The UI has been redesigned to a more modern experience with a new color palette and design template. New improved UX patterns include the following:
- New left-hand menu organized under the "Discover", "Posture Management" and "Threat Protection" to align with Cequence's value propositions. Includes a new secondary navigation menu that slides out on mouse-over.
- Universal Search - Trouble finding pages? Use the search-box on the top nav to easily find pages that may have moved around in our efforts to simplify the UI/UX (we have significantly reduced the number of pages)
- Light/Dark Mode - Use the toggle under your login avatar/icon to switch between light and dark modes.
New improved user experience for the UI
New Traffic Sources Page
You can now view the traffic sources sending traffic to your Cequence environment on the new Traffic Sources page. This page includes the following information per traffic source:
- Instance - the actual instance of Cequence Defender, Sensor, Bridge, or 3rd party technology (e.g. Apigee, MuleSoft) sending traffic to Cequence.
- Pool - multiple instances can be configured to belong to a pool. This pool information is configurable by the users deploying Cequence.
- Enhanced Filtering - Use filters to observe which sources are actively sending traffic.
New Data Export Integrations
New turnkey integrations for Google Big Query, Azure Blob Storage, Splunk, Elasticsearch and Kafka allow you to export data to these systems instantly with quick configuration wizards that are customized for each of these specialized applications.
UAP 8.0 also introduces a new data export integration to Kafka destinations using mutual TLS (mTLS) for organizations that would like to enforce strict security practices for exporting data.
Improved View Transactions page
Resized columns in several tables improve your data visibility. Improved triaging highlights the last viewed transaction to improve your workflow continuity.
Deprecations
UAP 8.0 deprecates the Notification Workflows feature. The newly availability ServiceNow integration and new Data Export integrations replace the Workflows feature. Additional integrations are expected to be added to the product in upcoming releases.