Skip to content

First-of-its-kind Cyber Security Product Unifies Vulnerability Detection & Attack Protection

    

Contrast Introduces Continuous Application Security

Contrast Security, the next generation leader in finding vulnerabilities and blocking attacks on software applications, today announced Contrast Enterprise as the first and only enterprise security software product that fully integrates the ability to find and fix application vulnerabilities during development, and monitor and block application attacks in production, all within one unified environment. The result is continuous application security that provides security visibility, assessment and protection in real-time and in parallel across the entire application portfolio.

Contrast uses patented deep security instrumentation to automatically weave vulnerability detection, threat visibility and attack protection directly into applications, without requiring any application changes or security experts. While these applications are running, highly accurate context is instantly generated about where applications are vulnerable and under attack.

Before Contrast, these two capabilities were only available in separate, siloed products from different vendors. Even when vendors have partnered and integrated application security testing tools with attack protection products, the joint solutions have been too complicated and woefully inaccurate to deliver on the vision. These partially integrated solutions do not enable organizations to effectively practice Continuous Application Security.

Unique Technology Delivers Accuracy, Insight & Speed   

Contrast’s patented deep security instrumentation technology adds “sensors” and “actuators” into applications at runtime. Deep security instrumentation does not require organizations to re-code their applications, or modify them in any way. Instrumentation produces application security data which, when analyzed and transformed by Contrast Enterprise, enables teams across the enterprise to manage and control application security.

Sensors collect telemetry from the running application and are totally passive. They form the basis of Contrast Enterprise with Interactive Application Security Testing (IAST). Actuators collect information necessary to detect attacks, can block attacks, and are the basis of Contrast Enterprise with Runtime Application Self-Protection (RASP).

Continuous Protection for All Applications

“Contrast Enterprise is a breakthrough in enterprise application security management,” says Alan Naumann, Contrast Security Chief Executive Officer. “Now, with a single product, organizations can protect their entire application portfolio continuously, from development through production. This is a revolution in application security for both traditional development approaches, as well as for Agile and DevOps methodologies.”

The RASP and IAST capabilities of Contrast Enterprise leverage a single agent to instrument applications and deliver accurate, automated and continuous application security. Contrast Enterprise also provides a unified user interface for both IAST and RASP. This allows administrators to visualize both halves of the application lifecycle, knowing where they are vulnerable and where they are being attacked.

Contrast Enterprise delivers application security at the speed and scale that modern application environments require.

 

About Contrast Security

Software applications are the number one vulnerability and attack vector for global enterprises. Contrast Security is the world’s only application security software that quickly and accurately stops hackers from stealing data via web applications. Industry research shows that application security flaws are the leading source of successful data breaches, yet more than 90% of applications are not secure. Unlike legacy security products that do not defend applications, Contrast employs patented, deep security instrumentation to strengthen applications before they’re deployed, protect them in production and provide visibility throughout the application lifecycle. As a result, organizations can act faster against threats and immediately improve the security of their enterprise. More information on Contrast Security can be found at: www.contrastsecurity.com.

# # #

For more information on Contrast Security:

Mark Hodgson
Contrast Security, Inc.
mark.hodgson@contrastsecurity.com
+1-650-270-4426 

Contrast Marketing

Contrast Marketing