Contrast Security Features
What are the features of Contrast Security?
Administration
- API / Integrations
- Extensibility
Analysis
- Reporting and Analytics
- Issue Tracking
- Vulnerability Scan
- Code Analysis
Testing
- Compliance Testing
- Detection Rate
- False Positives
Functionality - Software Composition Analysis
- Language Support
- Integration
- Transparency
Effectiveness - Software Composition Analysis
- Remediation Suggestions
- Continuous Monitoring
- Thorough Detection
Top Rated Contrast Security Alternatives
Contrast Security Categories on G2
Filter for Features
Administration
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data | |
API / Integrations | Based on 14 Contrast Security reviews. Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | 87% (Based on 14 reviews) | |
Extensibility | As reported in 13 Contrast Security reviews. Provides the ability to extend the platform to include additional features and functionalities | 85% (Based on 13 reviews) |
Analysis
Reporting and Analytics | As reported in 10 Contrast Security reviews. Tools to visualize and analyze data. | 90% (Based on 10 reviews) | |
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. This feature was mentioned in 10 Contrast Security reviews. | 88% (Based on 10 reviews) | |
Static Code Analysis | Examines application source code for security flaws without executing it. This feature was mentioned in 10 Contrast Security reviews. | 88% (Based on 10 reviews) | |
Code Analysis | Scans application source code for security flaws without executing it. 10 reviewers of Contrast Security have provided feedback on this feature. | 87% (Based on 10 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. This feature was mentioned in 15 Contrast Security reviews. | 89% (Based on 15 reviews) | |
Issue Tracking | As reported in 15 Contrast Security reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 81% (Based on 15 reviews) | |
Static Code Analysis | As reported in 12 Contrast Security reviews. Examines application source code for security flaws without executing it. | 85% (Based on 12 reviews) | |
Vulnerability Scan | As reported in 15 Contrast Security reviews. Scans applications and networks for known vulnerabilities, holes and exploits. | 88% (Based on 15 reviews) | |
Code Analysis | Scans application source code for security flaws without executing it. This feature was mentioned in 14 Contrast Security reviews. | 86% (Based on 14 reviews) |
Testing
Command-Line Tools | Allows users to access a terminal host system and input command sequences. | Not enough data | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted security tests without requiring manual work. | Not enough data | |
Compliance Testing | Allows users to test applications for specific compliance requirements. | Not enough data | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | As reported in 10 Contrast Security reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 75% (Based on 10 reviews) | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. This feature was mentioned in 12 Contrast Security reviews. | 79% (Based on 12 reviews) | |
Test Automation | As reported in 10 Contrast Security reviews. Runs pre-scripted security tests without requiring manual work. | 83% (Based on 10 reviews) | |
Compliance Testing | Based on 13 Contrast Security reviews. Allows users to test applications for specific compliance requirements. | 81% (Based on 13 reviews) | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 12 Contrast Security reviews. | 81% (Based on 12 reviews) | |
Detection Rate | As reported in 15 Contrast Security reviews. The rate at which scans accurately detect all vulnerabilities associated with the target. | 82% (Based on 15 reviews) | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. This feature was mentioned in 15 Contrast Security reviews. | 70% (Based on 15 reviews) |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. | Not enough data |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. | Not enough data | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data |
Application
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Static Code Analysis | Scans application source code for security flaws without executing it. | Not enough data | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data |
Functionality - Software Composition Analysis
Language Support | As reported in 16 Contrast Security reviews. Supports a useful and wide variety of programming languages. | 81% (Based on 16 reviews) | |
Integration | Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 16 reviewers of Contrast Security have provided feedback on this feature. | 88% (Based on 16 reviews) | |
Transparency | Grants comprehensive user-friendly insight into all open source components. 15 reviewers of Contrast Security have provided feedback on this feature. | 91% (Based on 15 reviews) |
Effectiveness - Software Composition Analysis
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 16 Contrast Security reviews. | 83% (Based on 16 reviews) | |
Continuous Monitoring | As reported in 16 Contrast Security reviews. Monitors open source components proactively and continuously. | 90% (Based on 16 reviews) | |
Thorough Detection | Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. This feature was mentioned in 16 Contrast Security reviews. | 89% (Based on 16 reviews) |
Threat Detection & Response - Runtime Application Self-Protection (RASP)
Threat Remediation | Automates threat remediation and blocks common attacks such as SQL injections. | Not enough data | |
Threat Detection | Able to detect threats in the runtime environment in real-time. | Not enough data | |
Application Behavior Monitoring | Monitors application in normal environments to detect patterns that deviate from expected behaviors. | Not enough data | |
Intelligence and Reporting | Provides reports on detected threats. | Not enough data |