Contrast Security References Capped?

Access even more references from these marketplace competitors

  • 4.8 / 5.0 (953)
    25+ References
  • 4.8 / 5.0 (2000)
    Premium93+ References
  • 4.8 / 5.0 (778)
    Verified29+ References

Contrast Security Case Studies

  • How Kaizen Gaming shifted application security left to improve risk while driving efficiencies for development and security teams

  • How CM.com is leveraging Contrast to improve its efficiencies while reducing the risk posed by its applications

  • currently locked
  • Reference Rating
    4.7 / 5.0
    Customer References25 total
    About

    APIsec is a security testing platform that discovers the most serious API vulnerabilities that lead to data theft and compromise. APIsec automatically creates and runs thousands of attack playbooks, custom-generated for each unique API, to find security vulnerabilities and data logic flaws Before production. The zero-touch deployment model requires no source code access, no agents, and nothing inline. APIsec runs at the speed of DevOps, alerting security teams and developers immediately of new vulnerabilities in the CI/CD pipeline, ensuring all API code is continuously validated.

  • Reference Rating
    4.7 / 5.0
    Customer References93 total
    About

    Orca Security was founded on the belief that cloud security visibility solutions need to provide full-stack visibility into all organizational assets, including the cloud infrastructure level, operating systems, applications, and data, with no risk or per-asset integration cost. The Orca Cloud Visibility Platform utilizes its unique SideScanning technology to seamlessly deliver "deep cloud inspection"​ comprehensive full-stack visibility into all of your entire cloud infrastructure and assets in a fraction of the time and cost of alternative approaches.

  • Reference Rating
    4.7 / 5.0
    Customer References29 total
    About

    Meet the Industry’s Context-Aware API Security Platform Traceable identifies all of your APIs, and evaluates your API risk posture, stops API attacks that lead to incidents such as data exfiltration, and provides analytics for threat hunting and forensic research. With our solution, you can confidently discover, manage and secure all of your APIs, quickly deploy, and easily scale to meet the ongoing needs of your organization.

  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked
  • currently locked