Contrast Security Features
What are the features of Contrast Security?
Administration
- API / Integrations
- Extensibility
Analysis
- Reporting and Analytics
- Issue Tracking
- Vulnerability Scan
- Code Analysis
Testing
- Compliance Testing
- Detection Rate
- False Positives
Functionality - Software Composition Analysis
- Language Support
- Integration
- Transparency
Effectiveness - Software Composition Analysis
- Remediation Suggestions
- Continuous Monitoring
- Thorough Detection
Contrast Security Categories on G2
Filter for Features
Administration
API / Integrations | Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities | Not enough data | |
API / Integrations | Based on 14 Contrast Security reviews. Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications. | 87% (Based on 14 reviews) | |
Extensibility | Provides the ability to extend the platform to include additional features and functionalities 13 reviewers of Contrast Security have provided feedback on this feature. | 85% (Based on 13 reviews) |
Analysis
Reporting and Analytics | Based on 10 Contrast Security reviews. Tools to visualize and analyze data. | 90% (Based on 10 reviews) | |
Issue Tracking | Based on 10 Contrast Security reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 88% (Based on 10 reviews) | |
Static Code Analysis | Based on 10 Contrast Security reviews. Examines application source code for security flaws without executing it. | 88% (Based on 10 reviews) | |
Code Analysis | As reported in 10 Contrast Security reviews. Scans application source code for security flaws without executing it. | 87% (Based on 10 reviews) | |
Reporting and Analytics | Tools to visualize and analyze data. 15 reviewers of Contrast Security have provided feedback on this feature. | 89% (Based on 15 reviews) | |
Issue Tracking | As reported in 15 Contrast Security reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | 81% (Based on 15 reviews) | |
Static Code Analysis | As reported in 12 Contrast Security reviews. Examines application source code for security flaws without executing it. | 85% (Based on 12 reviews) | |
Vulnerability Scan | Scans applications and networks for known vulnerabilities, holes and exploits. This feature was mentioned in 15 Contrast Security reviews. | 88% (Based on 15 reviews) | |
Code Analysis | Based on 14 Contrast Security reviews. Scans application source code for security flaws without executing it. | 86% (Based on 14 reviews) |
Testing
Command-Line Tools | Allows users to access a terminal host system and input command sequences. | Not enough data | |
Manual Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Test Automation | Runs pre-scripted security tests without requiring manual work. | Not enough data | |
Compliance Testing | Allows users to test applications for specific compliance requirements. | Not enough data | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. This feature was mentioned in 10 Contrast Security reviews. | 75% (Based on 10 reviews) | |
Manual Testing | Based on 12 Contrast Security reviews. Allows users to perfrom hands-on live simulations and penetration tests. | 79% (Based on 12 reviews) | |
Test Automation | Based on 10 Contrast Security reviews. Runs pre-scripted security tests without requiring manual work. | 83% (Based on 10 reviews) | |
Compliance Testing | Allows users to test applications for specific compliance requirements. 13 reviewers of Contrast Security have provided feedback on this feature. | 81% (Based on 13 reviews) | |
Black-Box Scanning | Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 12 Contrast Security reviews. | 81% (Based on 12 reviews) | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. 15 reviewers of Contrast Security have provided feedback on this feature. | 82% (Based on 15 reviews) | |
False Positives | Based on 15 Contrast Security reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | 70% (Based on 15 reviews) |
Performance
Issue Tracking | Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process. | Not enough data | |
Detection Rate | The rate at which scans accurately detect all vulnerabilities associated with the target. | Not enough data | |
False Positives | The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. | Not enough data | |
Automated Scans | Runs pre-scripted vulnerability scans without requiring manual work. | Not enough data |
Network
Compliance Testing | Allows users to scan applications and networks for specific compliance requirements. | Not enough data | |
Perimeter Scanning | Analyzes network devices, servers and operating systems for vulnerabilities. | Not enough data | |
Configuration Monitoring | Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance. | Not enough data |
Application
Manual Application Testing | Allows users to perfrom hands-on live simulations and penetration tests. | Not enough data | |
Static Code Analysis | Scans application source code for security flaws without executing it. | Not enough data | |
Black Box Testing | Scans functional applications externally for vulnerabilities like SQL injection or XSS. | Not enough data |
Functionality - Software Composition Analysis
Language Support | Based on 16 Contrast Security reviews. Supports a useful and wide variety of programming languages. | 81% (Based on 16 reviews) | |
Integration | Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 16 reviewers of Contrast Security have provided feedback on this feature. | 88% (Based on 16 reviews) | |
Transparency | Based on 15 Contrast Security reviews. Grants comprehensive user-friendly insight into all open source components. | 91% (Based on 15 reviews) |
Effectiveness - Software Composition Analysis
Remediation Suggestions | Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 16 Contrast Security reviews. | 83% (Based on 16 reviews) | |
Continuous Monitoring | Monitors open source components proactively and continuously. 16 reviewers of Contrast Security have provided feedback on this feature. | 90% (Based on 16 reviews) | |
Thorough Detection | As reported in 16 Contrast Security reviews. Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues. | 89% (Based on 16 reviews) |
Threat Detection & Response - Runtime Application Self-Protection (RASP)
Threat Remediation | Automates threat remediation and blocks common attacks such as SQL injections. | Not enough data | |
Threat Detection | Able to detect threats in the runtime environment in real-time. | Not enough data | |
Application Behavior Monitoring | Monitors application in normal environments to detect patterns that deviate from expected behaviors. | Not enough data | |
Intelligence and Reporting | Provides reports on detected threats. | Not enough data |
Agentic AI - Vulnerability Scanner
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |
Agentic AI - Static Application Security Testing (SAST)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data |
Agentic AI - Interactive Application Security Testing (IAST)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data |