www.cequence.ai Open in urlscan Pro
2600:9000:2251:9200:1:f8e9:1c80:93a1  Public Scan

Submitted URL: https://salesloft.cequence.ai/t/100151/c/4ccff874-c482-4593-ba13-039a1e9392a4/NB2HI4B2F4XXO53XFZRWK4LVMVXGGZJOMFUT643COJRT2MKC...
Effective URL: https://www.cequence.ai/?sbrc=1BsuhMLmYY-dPZQE6QldkaQ%3D%3D%24-aNe1zfFFs9UVjVUDV-QlA%3D%3D
Submission: On October 12 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

/

<form action="/">
  <input class="search-input" name="s" required="">
  <button class="search-icon"><img src="/wp-content/themes/cequence/dist/images/icon/search.svg" alt="search-img">
  </button>
</form>

/

<form action="/">
  <input class="search-input" placeholder="Search…" name="s" required="">
</form>

Text Content

Skip to content
Cequence named “Best-in-Class” in Datos Insights API Security Solutions Report. 
Download the Report  
Search for:
Blog Contact Us
 * Why Cequence
 * Products & Services
   * Dark Gray Box
     * Products & Services
     * Deployment Options
     * Get a Free Assessment
   * Light Grey Box
     * Products
     * API Spyder
     * API Sentinel
     * API Spartan
     * Deployment Options
     * SERVICES
     * API Discovery & Risk Monitoring
     * API Discovery & Risk Monitoring
     * Threat Protection
     * Threat Protection
     * API Edge Protection
     * API Edge Protection
     * Get a Free Assessment
 * Solutions
   * Dark Gray Box
     * Solutions
     * Deployment Options
     * Get a Free Assessment
   * Light Grey Box
     * BY USE CASE
     * API Discovery and Risk Classification
     * Sensitive Data Exposure Remediation
     * API Risk Assessment and Compliance
     * Account Takeover Prevention
     * Cloud Native App Security
     * Prevent BOLA Attacks
     * Prevent Shopping Bots and Content Scraping
     * test
     * BY INDUSTRY
     * Automotive
     * Financial Services
     * Healthcare
     * Telecom
     * Online Dating
     * Public Sector
     * Retail
     * For Enterprise
     * For SMB
 * Resources
   * Dark Grey Box
     * Resource Center
     * Resource Center
     * Cequence Blog
     * CQ Prime Research
   * Light Grey Box
     * RESOURCE CENTER
       * API Bites Videos
       * Case Studies
       * Datasheets
       * Infographics
       * Webinars
       * Whitepapers/eBooks
       * Videos
       * Browse Resources
     * CEQUENCE BLOG
       * About Cequence
       * API Security
       * Bot Management
       * Case Studies
       * CQ Prime Threat Research
       * Industry Reports
       * OWASP
       * Product News
     * GETTING STARTED
       * Demos
       * Deployment Options
       * Integration Guides
       * Solution/Technology Briefs
       * Gartner Peer Insight Customer Reviews
       * CQPrime Research
 * Partners
   * Dark Grey Box
     * Partners
     * Partner Portal Login
     * Contact Partner Team
   * Light Grey Box
     * OUR PARTNERS
     * Channel Partners & Systems Integrators
     * Technology Partners & Integrations
     * HOW TO
     * Integration Guides
     * Demos
     * Solution Briefs
     * Contact Partner Team
     * Partner Portal Login
 * Company
   * Dark Grey Box
     * Company
   * Light Grey Box
     * ABOUT CEQUENCE
       * Events
       * Compliance
       * Contact Us
       * Newsroom
       * Careers
       * Read What Our Customers Say
 * Blog
 * Contact Us

   Search for:
 * Why Cequence
 * Products & Services
    * Dark Gray Box
      * Products & Services
        
        Address every phase of your API protection journey with the Cequence
        Unified API Protection platform and services.
      
      * Deployment Options
      * Get a Free Assessment
    * Light Grey Box
      * Products
      * API Spyder
        
        Discover your API attack surface that includes external and internal
        APIs.
      
      * API Sentinel
        
        Surface compliance violations, security risks and test your APIs for
        critical vulnerabilities.
      
      * API Spartan
        
        Prevent automated API attacks and fraud using the largest API threat
        database in the world.
      
      * Deployment Options
      * SERVICES
      * API Discovery & Risk Monitoring
        
        Optimizes the discovery of your API attack surface and runtime
        inventory.
      
      * API Discovery & Risk Monitoring
        
        Optimizes the discovery of your API attack surface and runtime
        inventory.
      
      * Threat Protection
        
        Provides customers with threat monitoring, consulting, and optimization.
      
      * Threat Protection
        
        Provides customers with threat monitoring, consulting, and optimization.
      
      * API Edge Protection
        
        Deploys web application firewall (WAF) and distributed denial of service
        (DDoS) protection services.
      
      * API Edge Protection
        
        Deploys web application firewall (WAF) and distributed denial of service
        (DDoS) protection services.
      
      * Get a Free Assessment

 * Solutions
    * Dark Gray Box
      * Solutions
        
        Transform your API security posture with the name trusted by Fortune 500
        to protect billions of accounts and trillions in asset value.
      
      * Deployment Options
      * Get a Free Assessment
    * Light Grey Box
      * BY USE CASE
      * API Discovery and Risk Classification
      * Sensitive Data Exposure Remediation
      * API Risk Assessment and Compliance
      * Account Takeover Prevention
      * Cloud Native App Security
      * Prevent BOLA Attacks
      * Prevent Shopping Bots and Content Scraping
      * test
      * BY INDUSTRY
      * Automotive
      * Financial Services
      * Healthcare
      * Telecom
      * Online Dating
      * Public Sector
      * Retail
      * For Enterprise
      * For SMB

 * Resources
    * Dark Grey Box
      * Resource Center
        
        Stay up to date with API security research, webinars, blogs and
        whitepapers.
      
      * Resource Center
      * Cequence Blog
      * CQ Prime Research
    * Light Grey Box
      * RESOURCE CENTER
      * API Bites Videos
      * Case Studies
      * Datasheets
      * Infographics
      * Webinars
      * Whitepapers/eBooks
      * Videos
      * Browse Resources
      * CEQUENCE BLOG
      * About Cequence
      * API Security
      * Bot Management
      * Case Studies
      * CQ Prime Threat Research
      * Industry Reports
      * OWASP
      * Product News
      * GETTING STARTED
      * Demos
      * Deployment Options
      * Integration Guides
      * Solution/Technology Briefs
      * Gartner Peer Insight Customer Reviews
      * CQPrime Research

 * Partners
    * Dark Grey Box
      * Partners
        
        Review our integration partners, step-by-step guides or contact us to
        become a partner.
      
      * Partner Portal Login
      * Contact Partner Team
    * Light Grey Box
      * OUR PARTNERS
      * Channel Partners & Systems Integrators
      * Technology Partners & Integrations
      * HOW TO
      * Integration Guides
      * Demos
      * Solution Briefs
      * Contact Partner Team
      * Partner Portal Login

 * Company
    * Dark Grey Box
      * Company
        
        Learn more about our leadership’s vision and mission for end-to-end API
        security for the API-first world.
    * Light Grey Box
      * ABOUT CEQUENCE
      * Events
        
        Join us at virtual, hybrid and face-to-face events.
      
      * Compliance
        
        Trust starts with a team dedicated to maintaining compliance.
      
      * Contact Us
        
        Your time is valuable. Talk to our experts.
      
      * Newsroom
        
        Check out the latest news articles and press releases from Cequence.
      
      * Careers
        
        Join a global team of API security leaders making a difference in the
        world.
      
      * Read What Our Customers Say
        
        Check out our Gartner Peer Insight Reviews

 * Blog
 * Contact Us

Free Assessment


API SECURITY REDEFINED:
UNIFIED API PROTECTION

Unlike other point API Security solutions, Cequence unifies API discovery,
inventory, compliance, dynamic testing with real-time detection and native
prevention to defend against fraud, business logic attacks, exploits and
unintended data leakage.


$9T

Business value protected


6B

Daily API calls secured


2B

User accounts safeguarded
Free API Security Assessment
Watch 2 Minute Overview

One powerful platform. Hundreds of happy customers. Millions of dollars saved.
Billions of users and transactions secured.
One powerful platform.
Hundreds of happy customers.
Millions of dollars saved.
Billions of users and transactions secured.


SOLUTION


CEQUENCE UNIFIED API PROTECTION PLATFORM

Discover
Comply
Protect
DISCOVER
COMPLY
PROTECT
DISCOVER


DISCOVER


API ATTACK SURFACE DISCOVERY

Discover what your attackers see without any agents or software to deploy, and
prioritize risks with the most up-to-date attack surface views.
LEARN MORE ABOUT THIS PRODUCT:
API Spyder
API Attack Surface Discovery

COMPLY


COMPLY


API SECURITY POSTURE MANAGEMENT

Assess API inventory for risk, ensure compliance with regulations, and secure
API specifications by detecting and remediating coding errors.
LEARN MORE ABOUT THIS PRODUCT:
API Sentinel
API Risk Assessment

PROTECT


PROTECT


API THREAT PROTECTION

Detect automated attacks and exploits using native, real-time attack responses
that are configurable on a per-policy or per-API or app basis.
LEARN MORE ABOUT THIS PRODUCT:
API Spartan
Bot Protection


PARTNERS


INTEGRATE YOUR API ECOSYSTEM

We make it easy for technology and partners to integrate with Cequence.
Our technology integrations enable Cequence to be deployed seamlessly into your
existing API and security infrastructure, ensuring that your APIs are always
protected from attacks. Channel partners can deploy robust API protection to any
market.
Technology Integrations
Channel Partners
Deployment Options


USE CASES


WE FOCUS ON YOUR RISK. YOU FOCUS ON YOUR BUSINESS.


API DISCOVERY AND RISK CLASSIFICATION

Discover your API attack surface and define risk for each API.


SENSITIVE DATA EXPOSURE REMEDIATION

Understand when and where your applications expose sensitive data.


API RISK ASSESSMENT
AND COMPLIANCE

Assess your API risk and determine if your APIs are compliant.


ACCOUNT TAKEOVER
PREVENTION

Prevent ATO attacks that seek to compromise user accounts.


PROTECTING APIS
FROM BOLA

Protect against BOLA attacks that perform business logic abuse.


STOP SHOPPING BOTS
AND CONTENT SCRAPING

Stop bots in their tracks and get protection from automated attacks.

CUSTOMERS


INDUSTRY LEADERS TRUST CEQUENCE

“Through the Cequence UAP solution and managed services, our security team was
able to achieve an application security defense-in-approach that provided
comprehensive security to defend our entire application portfolio.”
Read the Ulta Beauty Case Study
Play Video about Ulta Beauty – Unified API Protection customer

“We chose Cequence because they were doing things differently. The approach was
different than what we were seeing elsewhere in the market. We went from two
weeks to protect a single API to 30 minutes to protect an entire domain that
could be thousands of APIs.”
Read the Telecom Case Study
Play Video about T-Mobile – Unified API Protection customer

“After implementing the Cequence UAP solution, we were able to block automated
attacks in real time before they reached our applications. This enabled us to
ensure that only legitimate users were on our platform.”
Read the Poshmark Case Study
Play Video about Poshmark – Unified API Protection customer


AWARDS AND RECOGNITION


RECOGNIZED FOR INNOVATION IN PROTECTING APIS



INDUSTRY RECOGNITION


CEQUENCE NAMED “BEST-IN-CLASS” IN DATOS INSIGHTS API SECURITY SOLUTIONS REPORT

“Cequence earned the highest product scores in the history of Datos Insights
publishing its Vendor Evaluation reports.”
– Tari Schreider, Strategic Advisor, Datos Insights
Download the Report



FIND OUT HOW CEQUENCE CAN HELP YOUR ORGANIZATION.

Cequence Security API protection experts will show you how we can help you
improve your API security posture with a personalized demo.
Schedule a Demo


API SECURITY AND UNIFIED API PROTECTION FAQ

What is API Security?
API Security is a crucial aspect of ensuring the protection and integrity of
application programming interfaces (APIs) by implementing essential measures to
counter risks and vulnerabilities that could lead to data breaches, fraudulent
activities, and operational disruptions. To achieve optimal API security, it is
vital to adhere to three core principles: API discovery, risk and compliance
analysis, and threat remediation and mitigation. Key concepts in API security
include secure API management, data security, and safeguarding sensitive
information.
 1. The initial step in API Security involves the identification and cataloging
    of all APIs, including managed, unmanaged, shadow, zombie, third-party,
    internal, and external APIs. This process ensures proper access management,
    compliance with OWASP API Security guidelines, and overall network and
    application security.
 2. The second phase, API Security risk analysis emphasizes identifying coding
    errors that may expose vulnerabilities (API risks) and targeted attacks that
    could exploit these vulnerabilities or attempt to manipulate business logic
    (API threats). Detecting attacks and threats necessitates more comprehensive
    analysis, which may involve human intervention, digital tools, or a
    combination of both.
 3. The final aspect of API Security involves the detection and remediation of
    risks and the mitigation of threats identified during the detection phase.
    Risk remediation involves notifying the development team of the detected
    risks and confirming the implemented fixes through continuous analysis,
    testing, and cybersecurity measures. Native threat mitigation necessitates
    real-time responses without relying solely on signaling a web application
    firewall (WAF) or employing other tools. Implementing authentication
    protocols such as OAuth, securing cloud-based applications, and maintaining
    rigorous application security standards are essential to preventing
    unauthorized access and ensuring the protection of sensitive data.

API Security is vital for safeguarding APIs from potential threats and
vulnerabilities, ensuring data security and the protection of sensitive
information. By following the three fundamental principles of API discovery,
risk and compliance analysis, and risk and threat remediation and mitigation,
organizations can create a secure environment for their APIs, applications, and
networks.
What is Unified API Protection?
Unified API Protection is the practice of protecting your application
programming interfaces (API) from threats and vulnerability exploits throughout
the API protection lifecycle: API discovery, inventory, risk analysis and
compliance, security testing, threat detection, and threat mitigation. Unified
API Protection goes beyond the using point products to address individual
phases, such as compliance or testing, along with legacy security technologies
to protect your APIs. Unified API Protection begins with the discovery and
inventory of all public-facing APIs along with their associated resources. Then
using that inventory to continually track all APIs – managed, unmanaged, shadow,
zombie, third-party, internal and external. Unified API Protection continues
with compliance, accomplished by analyzing APIs to enforce OpenAPI specification
conformance, and adherence to government regulations like PCI. Compliance also
entails continuous risk assessment to find coding errors quickly. Unified API
Protection solutions include threat detection to find vulnerability exploits and
business logic attacks. Finally, Unified API Protection solutions also include
threat mitigation and API security testing. Threat mitigation means using
alerts, real-time blocking and even deception for attack response, without the
need to signal third-party tools. API security testing uses API specific test
cases to help security and development teams uncover and remediate errors before
they become security incidents.
What are the types of API Security?
The types of API security solutions available can include API gateways, web
application firewalls (WAF), API specific security tools and Unified API
Protection. It’s important to understand how each of these tools addresses an
organizations’ API security requirements, which typically entail API discovery,
threat and risk detection followed by mitigation and remediation. The first type
of API security are API gateways, which are designed to aggregate and manage
APIs. API gateways include basic security functions such as rate limiting and IP
block lists. API gateways are unable to proactively discover APIs and do not
perform threat detection, risk analysis, remediation or mitigation. The next
type of API security is a WAF, which is web focused and do not perform automated
API discovery, or uncover coding errors. WAFs use signatures to detect known
vulnerabilities found in the OWASP Web Application Top 10 Threats list. The
third type of API security is an API specific toolset which focuses on helping
development produce APIs with fewer errors. These tools fall short of addressing
the complete set of API security requirements defined above. The most complete
type of API security is a Unified API Protection solution, complete with API
discovery, threat and risk detection followed by mitigation and remediation.
Unified API Protection goes beyond using point products to address individual
phases, such as compliance or testing, along with legacy security technologies
to protect your APIs.
What are common API Security Risks?
Common API security risks are those defined by the Open Web Application Security
Project (OWASP) API Security Top 10, business logic attacks, known informally as
OWASP API 10+ and coding errors that are exploited by attackers. Common API
security defined by the OWASP API Security top 10 list include a threat
definition and how to address them. Examples include sensitive data exposure,
authentication errors, resource and rate limiting. A top 10 list means there are
many others, so it’s important to use OWASP API Top 10 as a starting point. A
common API security risk often overlooked is business logic abuse, or attacks on
perfectly coded APIs. Known informally as OWASP API 10+, this category
encompasses the different ways perfectly coded APIs are attacked using
techniques outside of the OWASP API Security Top 10. Examples include large
scale shopping bots, enumeration attacks and account takeovers – all against
properly coded APIs. The last group of common API security risks are unknown
vulnerability exploits caused by API coding errors. . This group of API security
risks places significant emphasis on API testing as well as continuous threat
detection and mitigation to protect the improperly coded API while a fix is
rolled out.
What are API Security Best Practices and Strategies?
Application Programming Interfaces (APIs) have become an integral part of modern
software development, enabling seamless integration and communication between
various applications, services, and platforms. As the reliance on APIs grows, so
does the need for robust API security measures to protect sensitive data and
ensure the overall stability of digital ecosystems. This comprehensive guide
will provide an in-depth understanding of API security, its importance, best
practices, and strategies to help you secure your APIs and safeguard your
organization from potential risks.
Table of Contents:
Understanding API Security: Importance and Challenges
Key Components of Effective API Security
 * API Discovery and Inventory
 * API Risk and Threat Detection
 * API Risk Remediation and Threat Mitigation

 1. Security Best Practices
    * Implement Strong Authentication and Authorization
    * Detect attacks on both managed and unmanaged APIs
    * Apply Rate Limiting and Throttling
    * Encrypt Data in Transit and at Rest
    * Validate Input Data and Use Parameterized Queries
    * Regularly Monitor and Audit API Inventory and Activity
    * Keep APIs Updated and Patched
 2. API Security Tools and Technologies
    * Web Application Firewalls (WAFs)
    * API Gateway Solutions
    * API Security Testing Tools
    * API Management Platforms
    * Bot management Solutions
    * API Attack Surface Management tools
    * API Security Tools
    * Unified API Protection Platforms
 3. Building a Comprehensive API Security Strategy
    * Creating an API Security Inventory
    * Performing risk and compliance analysis on APIs
    * Creating an API Security Policy
    * Integrating Security into the API Development Lifecycle
    * Conducting Regular Security Assessments and Penetration Testing
    * Detecting and stopping live API attacks
    * Ensuring Continuous Improvement and Adaptation

As APIs continue to play a critical role in the digital landscape, ensuring
robust API security is more crucial than ever. By comprehending the key
components of API security, implementing best practices, and utilizing the
appropriate tools and technologies, organizations can effectively mitigate
risks, safeguard sensitive data, and maintain the integrity of their digital
ecosystems. This all-encompassing guide to API security serves as an invaluable
resource for both technical and non-technical stakeholders, assisting them in
the development and maintenance of secure APIs and, ultimately, contributing to
the overall security posture of their organization.
What is the difference between API Security and API Protection?
API security and API protection are two terms often used interchangeably in
cybersecurity. However, these terms refer to distinct yet overlapping concepts.
You can secure your APIs all day along but clever hackers will always find a way
to business logic launch attacks on perfectly coded APIs. This is why
organizations need to protect APIs in addition to securing them.
API Security focuses on the principles and methods used to secure an Application
Programming Interface (API) from malicious exploits, unauthorized access, and
other potential cyber threats. It involves a broad range of practices such as
authentication, authorization, encryption, and input validation to safeguard the
API. The goal is to ensure that only authorized entities can interact with the
API and that they can only perform actions that align with their granted
permissions. API security is about managing the risks associated with exposing
APIs, which are the critical interfaces that connect systems, services, and
data.
On the other hand, API Protection encompasses API Security but also extends
beyond it. While API Security is more focused on preventing unauthorized access
and malicious attacks, API Protection involves a more holistic view of
maintaining the integrity, availability, and performance of APIs. In addition to
API Security it includes two other key components:
 1. Discovery – Detecting all APIs using both inside out and outside in methods
    to know exactly where we need to apply API Security tools
 2. Threat Protection – Once threats are detected, stop them in their tracks
    natively without relying on a third-party solution such as a WAF. It
    includes measures to protect against threats such as Denial of Service (DoS)
    attacks, rate limiting to manage the number of requests an API can handle,
    and continuous monitoring to detect any unusual activities or anomalies.

Furthermore, API Protection includes managing the API lifecycle, versioning, and
deprecation to ensure that the APIs continue to serve their intended purpose
without disruption. It also deals with the quality of the APIs, ensuring that
they are robust, reliable, and efficient. API Protection takes into account not
just security but also the overall health and performance of APIs.
In summary, while API Security is an integral component of Unified API
Protection, the latter takes a more comprehensive approach. Unified API
Protection considers all aspects that could affect the usability, reliability,
and performance of APIs. It is essential for organizations to focus on both API
Security and API Protection when developing and managing APIs to ensure they
deliver their intended functionality securely, reliably, and efficiently.
It is vital to remember that a well-protected API is not just about being
secure. It also means the API is robust, reliable, and capable of serving its
intended purpose effectively and efficiently. This is why, for a business to
thrive in today’s interconnected digital world, a holistic approach that
encapsulates both API Security and API Protection is critical.




GET AN ATTACKER’S VIEW
INTO YOUR ORGANIZATION

Free API Security Assessment
100 S. Murphy Avenue
Suite 300
Sunnyvale, CA 94086

+1 650 437 6338
Contact Us
Book a Demo

FOLLOW US

Twitter LinkedIn Youtube

PRODUCTS & SERVICES

 * API Spyder
 * API Sentinel
 * API Spartan
 * Managed Services

 * API Spyder
 * API Sentinel
 * API Spartan
 * Managed Services

INDUSTRIES

 * Automotive
 * Financial Services
 * Healthcare
 * Telecom Services
 * Online Dating Services
 * Retail and eCommerce

 * Automotive
 * Financial Services
 * Healthcare
 * Telecom Services
 * Online Dating Services
 * Retail and eCommerce

RESOURCES

 * Blog
 * Case Studies
 * CQ Prime Threat Research
 * Datasheets
 * Demos

 * Blog
 * Case Studies
 * CQ Prime Threat Research
 * Datasheets
 * Demos

SOLUTIONS

 * API Discovery
 * Sensitive Data Exposure
 * API Risk Assessment
 * Account Takeover
 * Prevent BOLA Attacks
 * Prevent Shopping Bots
 * Cloud-native App Security

 * API Discovery
 * Sensitive Data Exposure
 * API Risk Assessment
 * Account Takeover
 * Prevent BOLA Attacks
 * Prevent Shopping Bots
 * Cloud-native App Security

PARTNERS

 * Technology Integrations
 * Channel Partners/SIs
 * Cloud Providers
 * Become a Partner
 * Partner Login

 * Technology Integrations
 * Channel Partners/SIs
 * Cloud Providers
 * Become a Partner
 * Partner Login

COMPANY

 * About Us
 * Careers
 * Certifications
 * Events
 * Newsroom
 * Gartner Peer Insight Customer Reviews

 * About Us
 * Careers
 * Certifications
 * Events
 * Newsroom
 * Gartner Peer Insight Customer Reviews

© 2018-2023 Cequence Security, Inc. All rights reserved.
Privacy Policy | Cookie Policy | Responsible Disclosure Policy.



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer. More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

STRICTLY NECESSARY COOKIES

Always Active
Strictly Necessary Cookies

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

Confirm My Choices

Back Button

Back


PERFORMANCE COOKIES

Vendor Search Search Icon Filter Icon


Clear Filters

Information storage and access
Apply
Consent Leg.Interest

All Consent Allowed

Select All Vendors
Select All Vendors
All Consent Allowed


 * 33ACROSS
   
   HOST DESCRIPTION
   
   VIEW COOKIES
   
   
   REPLACE-WITH-DYANMIC-HOST-ID
    * Name
      cookie name


 * 33ACROSS
   
   View Privacy Notice
   
   3 Purposes
   
   REPLACE-WITH-DYANMIC-VENDOR-ID
   Arrow
   
   Consent Purposes
   
   Location Based Ads
   
   Consent Allowed
   
   Legitimate Interest Purposes
   
   Personalize
   
   Require Opt-Out
   
   Special Purposes
   
   Location Based Ads
   
   Features
   
   Location Based Ads
   
   Special Features
   
   Location Based Ads

Confirm My Choices


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Cookies Settings Reject All Accept All Cookies






×
We Value Your Privacy
Settings
NextRoll, Inc. ("NextRoll") and our advertising partners use cookies and similar
technologies on this site and use personal data (e.g., your IP address). If you
consent, the cookies, device identifiers, or other information can be stored or
accessed on your device for the purposes described below. You can click "Allow
All" or "Decline All" or click Settings above to customize your consent.
NextRoll and our advertising partners process personal data to: ● Store and/or
access information on a device; ● Create a personalized content profile; ●
Select personalised content; ● Personalized ads, ad measurement and audience
insights; ● Product development. For some of the purposes above, our advertising
partners: ● Use precise geolocation data. Some of our partners rely on their
legitimate business interests to process personal data. View our advertising
partners if you wish to provide or deny consent for specific partners, review
the purposes each partner believes they have a legitimate interest for, and
object to such processing.
If you select Decline All, you will still be able to view content on this site
and you will still receive advertising, but the advertising will not be tailored
for you. You may change your setting whenever you see the Manage consent
preferences on this site.
Decline All
Allow All
Manage consent preferences