Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

04:00 PM
Dark Reading
Dark Reading
Products and Releases

Contrast Security Launches Platform Delivering Comprehensive Security Observability to Secure Web Apps Across SDLC

Contrast continuously observes and secures software from IDE to runtime, cutting vulnerability and threat remediation time by up to 17x.

Los Altos, CA– Contrast, the leading developer-centric application security software company, today launched the industry’s first security observability platform that provides comprehensive application protection across the entire software development life cycle. The only application security solution offering always-on analysis, reporting, and remediation, Contrast cuts application vulnerability and threat remediation time to resolve by up to 17x.*

Today, application data flows in and out of disparate systems, in the cloud and on-premises, and through a multitude of application programming interfaces (APIs) with varying dependencies and integrations. The complexity of what causes an intended application outcome can be immense. In the case the outcome is   a vulnerability or threat, one must have comprehensive visibility and the ability to successfully stitch the patchwork of information across these complex interactions together. This is enabled through security observability.

Security observability observes data from within running applications or APIs, across distributed systems, in a format that can be easily analyzed to expose hidden security attributes. This insight empowers developers to ask the right questions, get the right answers, and prioritize remediation. As a result, enterprises can better address security issues and improve business outcomes.

“This is the first application security platform using the power of instrumentation that delivers observability that covers the needs of both developers and security teams,” said Alan Naumann, Chairman of the Board, CEO, and President of Contrast. “Simply put, if security is not embedded into the application, you will forever miss what you’re trying to see. By instrumenting applications with security sensors, Contrast is able to observe applications continuously at development, testing, and production—allowing developers to focus on writing and releasing code and using open-source libraries without increasing risk to the business.”

Core business value outcomes customers can see from security observability include:

  • Enterprises with 100 applications can realize up to $10.7 million in annual DevSecOps savings. 
  • Customers can remediate up to 90% of their vulnerabilities in less than 15 days as compared to traditional approaches that can take more than a year to address 70% of vulnerabilities. This greatly reduces the business exposure to risk.
  • By using an instrumentation approach, Contrast customers can secure more applications faster, onboarding up to thousands of applications in only a few months.
  • The Contrast Application Security Platform can eliminate silos resulting from separate application security testing (AST), software composition analysis (SCA) for open-source security, and runtime application self-protection (RASP) tools, with up to $590,000 in savings for enterprises with 100 applications.
  • Contrast enables a 50% decrease in time spent by developers remediating vulnerabilities, thereby drastically increasing developer productivity and the rate at which developers release code. This ultimately drives a competitive advantage through accelerated digital transformation.

Contrast has been developing this platform with its customers for several years. Today, the culmination of the following key technical advancements uniquely positions Contrast to drive tremendous business value for its customers as they look to increase the velocity of their digital innovation. These key technical advancements include:

  • Expanded language, framework, and environment support, including Java, Python, .NET Core, and Ruby, among others, as well as many cloud services across AWS, Azure, Google Cloud Platform, IBM, and Red Hat.
  • Continuous advanced application risk visibility provides insights into the entire application attack surface through Route Intelligence™ and automated application architectural visualization.
  • Simplified platform deployment through automation and deployment options enables scalable enterprisewide deployment of agents in line with DevOps processes and toolchains.
  • Open-source library security and compliance capabilities through SCA is integrated into the platform, providing open-source library Common Vulnerabilities and Exposures (CVE) vulnerability identification, licensing compliance, and runtime protection from zero-day attacks.
  • Multi-technique runtime exploit prevention adds more layers of protection against the exploitation of known and unknown vulnerabilities in applications running in production.

Added Naumann, “Our customers report that this always-on security posture allows for far more secure applications in any environment. With the rapid acceleration of digital transformation initiatives, it is essential to simultaneously protect applications from attack and thereby secure the enterprise.”

The Contrast Application Security Platform is available today. For more information, read our solution brief

About Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improves efficiencies and cost, and enables rapid scale while protecting applications from known and unknown threats.


* “2020 Application Security Observability Report,” Contrast Security, July 2020.



Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.