Introducing G2.ai, the future of software buying.Try now

Contrast Security Features

What are the features of Contrast Security?

Administration

  • API / Integrations
  • Extensibility

Analysis

  • Reporting and Analytics
  • Issue Tracking
  • Vulnerability Scan
  • Code Analysis

Testing

  • Compliance Testing
  • Detection Rate
  • False Positives

Functionality - Software Composition Analysis

  • Language Support
  • Integration
  • Transparency

Effectiveness - Software Composition Analysis

  • Remediation Suggestions
  • Continuous Monitoring
  • Thorough Detection

Top Rated Contrast Security Alternatives

Wiz
(702)
4.7 out of 5
GitHub
(2,211)
4.7 out of 5
GitLab
(837)
4.5 out of 5

Filter for Features

Administration

API / Integrations

Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Extensibility

Provides the ability to extend the platform to include additional features and functionalities

Not enough data

API / Integrations

Based on 14 Contrast Security reviews. Application Programming Interface Specification for how the application communicates with other software. APIs typically enable integration of data, logic, objects, etc. with other software applications.
87%
(Based on 14 reviews)

Extensibility

Provides the ability to extend the platform to include additional features and functionalities 13 reviewers of Contrast Security have provided feedback on this feature.
85%
(Based on 13 reviews)

Analysis

Reporting and Analytics

Based on 10 Contrast Security reviews. Tools to visualize and analyze data.
90%
(Based on 10 reviews)

Issue Tracking

Based on 10 Contrast Security reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
88%
(Based on 10 reviews)

Static Code Analysis

Based on 10 Contrast Security reviews. Examines application source code for security flaws without executing it.
88%
(Based on 10 reviews)

Code Analysis

As reported in 10 Contrast Security reviews. Scans application source code for security flaws without executing it.
87%
(Based on 10 reviews)

Reporting and Analytics

Tools to visualize and analyze data. 15 reviewers of Contrast Security have provided feedback on this feature.
89%
(Based on 15 reviews)

Issue Tracking

As reported in 15 Contrast Security reviews. Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
81%
(Based on 15 reviews)

Static Code Analysis

As reported in 12 Contrast Security reviews. Examines application source code for security flaws without executing it.
85%
(Based on 12 reviews)

Vulnerability Scan

Scans applications and networks for known vulnerabilities, holes and exploits. This feature was mentioned in 15 Contrast Security reviews.
88%
(Based on 15 reviews)

Code Analysis

Based on 14 Contrast Security reviews. Scans application source code for security flaws without executing it.
86%
(Based on 14 reviews)

Testing

Command-Line Tools

Allows users to access a terminal host system and input command sequences.

Not enough data

Manual Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Test Automation

Runs pre-scripted security tests without requiring manual work.

Not enough data

Compliance Testing

Allows users to test applications for specific compliance requirements.

Not enough data

Black-Box Scanning

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists. This feature was mentioned in 10 Contrast Security reviews.
75%
(Based on 10 reviews)

Manual Testing

Based on 12 Contrast Security reviews. Allows users to perfrom hands-on live simulations and penetration tests.
79%
(Based on 12 reviews)

Test Automation

Based on 10 Contrast Security reviews. Runs pre-scripted security tests without requiring manual work.
83%
(Based on 10 reviews)

Compliance Testing

Allows users to test applications for specific compliance requirements. 13 reviewers of Contrast Security have provided feedback on this feature.
81%
(Based on 13 reviews)

Black-Box Scanning

Scans functional applications externally for vulnerabilities like SQL injection or XSS. This feature was mentioned in 12 Contrast Security reviews.
81%
(Based on 12 reviews)

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target. 15 reviewers of Contrast Security have provided feedback on this feature.
82%
(Based on 15 reviews)

False Positives

Based on 15 Contrast Security reviews. The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
70%
(Based on 15 reviews)

Performance

Issue Tracking

Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.

Not enough data

Detection Rate

The rate at which scans accurately detect all vulnerabilities associated with the target.

Not enough data

False Positives

The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.

Not enough data

Automated Scans

Runs pre-scripted vulnerability scans without requiring manual work.

Not enough data

Network

Compliance Testing

Allows users to scan applications and networks for specific compliance requirements.

Not enough data

Perimeter Scanning

Analyzes network devices, servers and operating systems for vulnerabilities.

Not enough data

Configuration Monitoring

Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.

Not enough data

Application

Manual Application Testing

Allows users to perfrom hands-on live simulations and penetration tests.

Not enough data

Static Code Analysis

Scans application source code for security flaws without executing it.

Not enough data

Black Box Testing

Scans functional applications externally for vulnerabilities like SQL injection or XSS.

Not enough data

Functionality - Software Composition Analysis

Language Support

Based on 16 Contrast Security reviews. Supports a useful and wide variety of programming languages.
81%
(Based on 16 reviews)

Integration

Integrates seamlessly with the build environment and development tools like repositories, package managers, etc. 16 reviewers of Contrast Security have provided feedback on this feature.
88%
(Based on 16 reviews)

Transparency

Based on 15 Contrast Security reviews. Grants comprehensive user-friendly insight into all open source components.
91%
(Based on 15 reviews)

Effectiveness - Software Composition Analysis

Remediation Suggestions

Provides relevant and helpful suggestions for vulnerability remediation upon detection. This feature was mentioned in 16 Contrast Security reviews.
83%
(Based on 16 reviews)

Continuous Monitoring

Monitors open source components proactively and continuously. 16 reviewers of Contrast Security have provided feedback on this feature.
90%
(Based on 16 reviews)

Thorough Detection

As reported in 16 Contrast Security reviews. Comprehensively identifies all open source version updates, vulnerabilities, and compliance issues.
89%
(Based on 16 reviews)

Threat Detection & Response - Runtime Application Self-Protection (RASP)

Threat Remediation

Automates threat remediation and blocks common attacks such as SQL injections.

Not enough data

Threat Detection

Able to detect threats in the runtime environment in real-time.

Not enough data

Application Behavior Monitoring

Monitors application in normal environments to detect patterns that deviate from expected behaviors.

Not enough data

Intelligence and Reporting

Provides reports on detected threats.

Not enough data

Agentic AI - Vulnerability Scanner

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Proactive Assistance

Anticipates needs and offers suggestions without prompting

Not enough data

Agentic AI - Static Application Security Testing (SAST)

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Agentic AI - Interactive Application Security Testing (IAST)

Autonomous Task Execution

Capability to perform complex tasks without constant human input

Not enough data

Contrast Security