docs.securetheorem.com Open in urlscan Pro
151.101.1.195  Public Scan

Submitted URL: https://api.securetheorem.com/
Effective URL: https://docs.securetheorem.com/
Submission: On August 15 via automatic, source certstream-suspicious — Scanned from CA

Form analysis 0 forms found in the DOM

Text Content

Data Theorem

 * Overview
 * API Conventions
 * API Security Results API
   * Overview
 * SAST Security Results API
   * Overview
 * Webhooks (beta)
   * Overview
 * Mobile Security DevOps API
   * Overview
   * Uploading Mobile Apps
   * Uploading XCUITest Bundles
   * Uploading Espresso UI Tests
 * Mobile Security: Results API
   * Introduction
   * Mobile Apps
   * Mobile App Scans
   * Mobile App Insights
   * Mobile App Third-Party SDKs
   * Mobile Apps Changes
   * Mobile Apps Monthly Security Metrics
   * Mobile Apps Security KPIs
   * Security Findings
   * Security Finding Targets
   * Suggested Workflows
 * Integrating with Jira
 * Mobile Security: Phishing API
   * Overview
 * Cross-Product APIs
   * Management API


DATA THEOREM INTEGRATIONS

Data Theorem provides several kinds of integrations, as well as APIs for
creating your own integrations.

The following sections are organized by what you may be trying to accomplish by
integrating with one of Data Theorem’s APIs.

However, if you are going to build an integration with one of our APIs, read API
Conventions first. It explains the conventions that Data Theorem follows for all
of our APIs, as well as how to authenticate to our APIs.


API SECURITY INTEGRATIONS

 * The API Security Results API (beta) provides access to the API, Cloud, and
   Web assets discovered by API Discover, as well as their Policy Violations
   from API Inspect. Note: This API is still considered to be in Beta, and it
   may change without notice.
 * API/Cloud/Web Security Webhooks (beta) Sends webhooks to external services
   triggered by API/Cloud/Web Security events like Policy Violations. Note:
   Webhooks are still considered to be in Beta and may change without notice.


MOBILE SECURITY INTEGRATIONS


PROVIDING DATA THEOREM WITH PRE-PRODUCTION BUILDS OF YOUR MOBILE APPS

Data Theorem automatically scans builds of your apps in the app stores. However,
to use Data Theorem’s Mobile Security offering to its full effectiveness, you
need to send pre-production builds, along with supplementary information like
credentials, to Data Theorem for analysis.

See the Mobile Security DevOps API section for more information on how to send
builds of your Mobile apps to Data Theorem.


WORKING WITH YOUR MOBILE APPS’ SECURITY ISSUES

 * Mobile Security issues can be automatically pushed to Jira. See the Jira
   Integration page for more details.
 * The Mobile Security Results API, which provides access to the list of all
   mobile apps registered within your Data Theorem account and the list of
   security issues found during the scans.
 * Data Theorem’s Mobile Security API client library provides a reference client
   for accessing the Mobile Security Results API:
   https://bitbucket.org/datatheorem/dt-api-client


EXAMINING POTENTIAL “CLONE” APPS IN UNOFFICIAL APP STORES

 * The Mobile Security: Phishing API (beta) provides access to the list of
   mobile apps discovered by Mobile Phishing in various unofficial app stores,
   along with Data Theorem’s analysis of the potential threat those apps may
   pose to your organization.


PROGRAMMATIC USER MANAGEMENT IN DATA THEOREM’S PORTAL

 * The Management API provides access to data related to users registered with
   your Data Theorem account.