Archives

Contrast Security ADR Lauded for Cyber Defense Impact

Contrast Security

Cybersecurity industry analysts are praising Contrast Security’s newly launched Application Detection and Response platform saying it addresses a gap in security defenses.

Contrast Security officially announced Application Detection and Response (ADR) at Black Hat USA 2024 last week. ADR empowers security teams to identify vulnerabilities, detect threats, and stop attacks that target custom applications and application programming interfaces (APIs). Uniquely, ADR positions defenses inside the running application, enabling security from within.

Contrast Security research shows that thousands of attacks bypass web application firewalls (WAFs) daily. Organizations need detection and response inside their apps and APIs to identify and block those attacks: a problem also identified by information security analyst firm IDC.

Also Read: Commvault Expands Cybersecurity with Top Integration Partners 

“IDC research finds that organizations face significant challenges with application security in production environments. While traditional tools, like a WAF, are valuable for providing a first line of defense against many common web threats, their lack of application context limits their effectiveness,” stated Katie Norton, IDC’s Research Manager for DevSecOps and Software Supply Chain Security. “Contrast’s Application Detection and Response solution is designed to fill this gap, offering the visibility and context essential for preventing sophisticated attacks on applications and APIs.”

Norton appeared with Contrast Security Founder and Chief Technology Officer Jeff Williams on a TechStrong TV interview to underscore the importance of adding applications to the detection and response stack.

“If you think about how other parts of cybersecurity have evolved into endpoint detection and response or cloud detection and response, there’s a big gap at the application layer. ADR fixes that blindspot, watching for attacks in production, providing the telemetry and full context to then prevent exploits from harming applications and APIs,” said Williams.

SOURCE: Businesswire