SECURITY INFLUENCERS BLOG

Security Influencers provides real-world insight and “in-the-trenches” experiences on topics ranging from software application security to DevOps and cloud security.

START FREE TRIAL

Vote Now for Contrast Security in the 2017 Cybersecurity Excellence Awards

The annual Cybersecurity Excellence Awards honor individuals and companies that demonstrate excellence, innovation and leadership in information security.

cybersecurity-excellence-awards-2017-contrast.png

We are proud to announce that we have been nominated for two categories this year in the 2017 Cybersecurity Excellence Awards. Contrast Security itself is nominated for best "," while Co-Founder and CTO, Jeff Williams has been nominated for "."

While the number of votes is only one factor in determining finalists and award winners, the more votes a nomination receives, the better the odds of receiving an award. If you like what we are doing at Contrast, please take a moment to read what we have been up to and vote for us.

Note: Voting does indeed require registration and account activation, but we have made that easy for you here:

Cybersecurity Excellence Award Voting Instructions:


Interested in Why?

Startling Results Reveal Significant Static and Dynamic Weaknesses

Contrast is truly different in both philosophy and technology from any existing application security technology. When it comes to accuracy, Contrast scores a perfect 100% against the 21,000 test cases in the OWASP Benchmark Project, while the top legacy tools scored only 33%. When it comes to speed, Contrast works in real time so developers and testers get instant results. Meanwhile, legacy solutions took hours or days to complete the OWASP Benchmark.

See how, by downloading our executive brief on the OWASP Benchmark Project:
false-sense-of-application-security

Mark Hodgson, Vice President of Marketing

Mark Hodgson, Vice President of Marketing

Mark's extensive experience spans over 28 years in marketing high-tech products and services to consumers and corporations. Specific area of expertise is application security and mobile application security.

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook