Practitioner's Guide · Updated May 2026 · 9 min read
Application security monitoring, explained without the marketing fog.
What it is, what it actually catches, where it overlaps with APM and SIEM, and a five-point checklist for picking a tool. Written by engineers who got tired of dashboards that show pretty graphs but miss the credential-stuffing attack happening right now.
The 30-second version
Application security monitoring (ASM) is what you call observability once you start looking at it through a security lens. The same trace data your APM uses to plot p99 latency can also tell you that 400 requests in the last 60 seconds tried to log in as admin from 73 different IPs — every one of them on three large hosting providers, every one of them failing with a 401. Your APM saw a 401 spike. ASM saw a credential-stuffing attack.
Why it matters now (and didn't in 2018)
Three things changed:
- The attack surface is the application, not the network. Most workloads are in someone else's VPC. Network-layer SIEMs see less and less of what attackers actually do.
- Bots are economically rational.LLM training scrapers, sneaker-bot resellers, and credential-stuffing rings have ROI math. They'll outrun rate limits, rotate IPs, and probe every CVE within hours of disclosure. Static rules can't keep up.
- OpenTelemetry made the data layer free.Every modern framework now emits structured traces. The hard part isn't collection anymore — it's correlation, intent classification, and enforcement.
ASM vs APM vs SIEM vs WAF — the actual differences
These categories are increasingly merged in practice, but they answer different questions:
- APM answers “is my app fast and not erroring?”
- ASM answers “is my app being abused?”
- WAF / IP firewall answers “drop these requests before they hit my app.”
- SIEM answers “correlate everything across all my systems for compliance and IR.”
The historical reason teams bought four products is that the data was in four places. Today the trace pipeline gives you all four answers from one stream — if your tool was built for it.
What ASM actually catches
A non-exhaustive list of what good ASM picks up that the WAF rules miss:
- Slow-rolling credential stuffing (under per-IP rate limits).
- API scraping with rotating residential proxies.
- Business-logic abuse: cart cycling, refund fraud, free-tier abuse.
- Model-training scrapers that ignore
robots.txt. - CVE probes within hours of disclosure — the new log4shell-of-the-week attack pattern.
- Account-takeover sequences: password reset → MFA enrol → device add, all from a new ASN.
- Internal misuse: a service principal calling endpoints it has never touched before.
The 5-point ASM tool checklist
- OpenTelemetry-native, not a proprietary agent. Otherwise you're locked in the day you sign.
- Logs + traces + IP intel in one query layer. Fragmented = slow forensics.
- Enforcement included. If you have to glue a separate WAF to your ASM, the round-trip kills response time.
- AI-assisted investigation.Humans can't scroll every span. The tool should summarise, hypothesise, and link evidence.
- Usage-based pricing.If your bill scales with host count instead of with data scanned, you'll over-provision the wrong thing.
How SecureNow does it
SecureNow is one OpenTelemetry collector + one ClickHouse + one firewall + one AI investigation layer, sold as a single product. Concretely:
npm install securenow+ a-rpreload — no code changes — captures HTTP, gRPC, DB, and outbound requests with full headers and bodies (with redaction).- The same SDK exposes a real-time IP firewall (500k+ IPs from AbuseIPDB + your custom blocklist + automation rules).
- The dashboard correlates spans, logs, and IP intel; the AI agent answers “was anyone exploiting CVE-2024-X today?” in plain English.
- Free tier (1 GB/month) and $5 per TB after that. No per-host pricing.
See the Datadog comparison, the APM + security combo guide, or the free firewall.
Frequently asked
What is application security monitoring (ASM)?
Application security monitoring is the continuous observation of a running application's traffic, behavior, and dependencies to detect attacks, abuse, and abnormal behavior in real time. Unlike static application security testing (SAST) — which scans code at build time — ASM watches what the app actually does in production: who is calling which endpoints, with what payloads, from which IPs, and with what success rate. The result is a feed of investigable security events rather than a list of theoretical vulnerabilities.
How is it different from APM?
APM (application performance monitoring) measures latency, error rate, and throughput. ASM measures intent — is this request legitimate, abusive, or malicious? Modern tools blur the line because the underlying telemetry (traces, spans, logs) is the same. The difference is what you do with it: APM alerts on p99 latency spikes; ASM alerts on a 4xx-rate spike from a single ASN, or a sudden flood of /admin probes.
Is ASM the same as a WAF?
No. A WAF (web application firewall) sits in the request path and blocks. ASM is observational — it watches everything, classifies, and lets you decide whether to block. Most teams need both: a WAF or IP firewall for known-bad traffic, and ASM for the long tail of behavior that doesn't have a pre-existing rule.
What does ASM actually catch that other tools miss?
Slow-rolling credential stuffing (under WAF rate limits), API scraping with rotating IPs, business-logic abuse (cart cycling, free-tier abuse, model-training scrapers), zero-day probes within hours of a CVE drop, account-takeover patterns, and SOC noise that traditional SIEMs miss because the signal is in the application layer, not the network.
What should I look for when picking a tool?
Five things: (1) does it use OpenTelemetry under the hood — if not, you'll be locked in; (2) does it correlate logs, traces, and IP intelligence in one place — fragmented tools mean fragmented investigations; (3) is enforcement (blocklist/allowlist) part of the same product or a separate add-on; (4) AI assistance for forensics — humans can't read every span; (5) per-TB or usage-based pricing so the bill matches the value, not the host count.
How long does it take to deploy?
Best-in-class tools: under 10 minutes from `npm install` to first detected event. Anything longer than an afternoon means the tool was built for enterprise procurement, not for the engineer who has to actually use it.
Try ASM with the engineer-friendly tool.
Free tier, no credit card, 1 GB/month. Five-minute setup. We'll show you the attacks your APM has been hiding from you.