<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=113894&amp;fmt=gif">

SECURITY INFLUENCERS BLOG

Security influencers provide real-world insight and “in-the-trenches” experiences on topics ranging from application security to DevOps and risk management

Unify Security Across Teams – See How Contrast Does it in a 60-Minute Product Demonstration

More than ever before, the security of running enterprise applications is a shared responsibility between security, operations, development and engineering teams. However, all these groups are running blind when it comes to understanding the security of those running applications.

demo-amoroso1117.png

A unified approach to software security is now a reality and can easily be achieved with Contrast. See how we do it in this 60-minute demonstrationpresented by Jeff Williams, Contrast CTO & Co-founder in conversation with Ed Amoroso, former CISO of AT&T and Founder of TAG Cyber. Jeff presents a "live" demo of both Contrast  Assess (IAST) and Contrast Protect (RASP), all from within the product environment. 

Below are some highlights in the 60-minute demo (in order of appearance). 

Jeff and Ed reveal how Contrast: 

3:44  Quickly and easily make applications "self-protecting"
5:30 – Inventories and analyzes open source software (OSS)
16:32 – Combines the best of static, dynamic and interactive testing: 
     
               – Evaluates every line of code 
               – Analyzes all configurations files
               – Evaluates http traffic
               – 
Performs data- and control-flow analysis in the running application
20:47 – Alerts you of an issue in real-time

34:20 – Identifies and blocks attacks

36:09 – Works inside the application and provides context of an attack 
                   
49:40 – Empowers development teams to fix problems early

 Continuous Application Security Testing with Contrast

 

Christine Carrig, Director of Marketing

Christine Carrig, Director of Marketing

Christine’s wide breadth of marketing experience has been focused on driving revenue, building brand recognition, and creating demand-generation programs in technology organizations. For the past 11 years, her deep understanding of marketing principles, coupled with forward thinking, has been instrumental in transforming application security start-ups into successful, profitable companies.

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook