About
A new kind of security designed for the way software is created. Resolve security issues minutes after installation by integrating security into your toolchain. Because Contrast agents monitor code and report from inside the application, developers can finally find and fix vulnerabilities without requiring security experts. That frees up security teams to focus on providing governance. Contrast Assess deploys an intelligent agent that instruments the application with smart sensors. The code is analyzed in real time from within the application. Instrumentation minimizes the false positives that slow down developers and security teams. Resolve security issues minutes after installation by integrating security into your toolchain. Contrast Assess integrates seamlessly into the software life cycle and into the tool sets that development and operations teams are already using, including native integration with ChatOps, ticketing systems and CI/CD tools, and a RESTful API.
|
About
Modern software development must match the speed of the business. But the modern AppSec tool soup lacks integration and creates complexity that slows software development life cycles. Contrast simplifies the complexity that impedes today’s development teams. Legacy AppSec employs a one-size-fits-all vulnerability detection and remediation approach that is inefficient and costly. Contrast automatically applies the best analysis and remediation technique, dramatically improving efficiencies and efficacy. Separate AppSec tools create silos that obfuscate the gathering of actionable intelligence across the application attack surface. Contrast delivers centralized observability that is critical to managing risks and capitalizing on operational efficiencies, both for security and development teams. Contrast Scan is pipeline native and delivers the speed, accuracy, and integration demanded by modern software development.
|
About
Inventory your apps, APIs, and shadow assets across your global, multi-cloud environment. Establish custom policies for different types of asset groups, automate attack tools, and assess vulnerabilities. Fix security issues before going into production, making sure application and cloud data is compliant. Auto-remediation of vulnerabilities with rollback options to stop leaky data. Good security finds problems fast, but great security makes problems disappear. Data Theorem strives to make great products that automate the most challenging areas of modern application security. The core of Data Theorem is its Analyzer Engine. Utilize the Data Theorem analyzer engine & proprietary attack tools to hack and exploit application weaknesses continuously. Data Theorem has built the top open source SDK called TrustKit, used by thousands of developers. Our technology ecosystem continues to grow so that customers can continue to secure their entire Appsec stack with ease.
|
About
python-sql is a library to write SQL queries in a pythonic way. Simple selects, select with where condition. Select with join or select with multiple joins. Select with group_by and select with output name. Select with order_by, or select with sub-select. Select on other schema and insert query with default values. Insert query with values, and insert query with query. Update query with values. Update query with where condition. Update query with from the list. Delete query with where condition, and delete query with sub-query. Provides limit style, qmark style, and numeric style.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Development teams interested in a Interactive Application Security Testing (IAST) solution
|
Audience
Digital businesses looking for a platform to secure their software development life cycle
|
Audience
Development teams looking for a modern application security solution
|
Audience
Developers searching for a solution offering a library to write SQL queries
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$0
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationContrast Security
Founded: 2014
United States
www.contrastsecurity.com/interactive-application-security-testing-iast
|
Company InformationContrast Security
Founded: 2012
United States
www.contrastsecurity.com/platform
|
Company InformationData Theorem
Founded: 2013
United States
www.datatheorem.com
|
Company InformationPython Software Foundation
United States
pypi.org/project/python-sql/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
Application Security Features
Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation
Automated Testing Features
Hierarchical View
Move & Copy
Parameterized Testing
Requirements-Based Testing
Security Testing
Supports Parallel Execution
Test Script Reviews
Unicode Compliance
Cloud Workload Protection Features
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Static Application Security Testing (SAST) Features
Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning
|
||||||
Integrations
.NET
5X
Amazon Web Services (AWS)
Axonius
Brinqa
Contrast Assess
Contrast Security
Domino Enterprise MLOps Platform
Eclipse IDE
Enso
|
Integrations
.NET
5X
Amazon Web Services (AWS)
Axonius
Brinqa
Contrast Assess
Contrast Security
Domino Enterprise MLOps Platform
Eclipse IDE
Enso
|
Integrations
.NET
5X
Amazon Web Services (AWS)
Axonius
Brinqa
Contrast Assess
Contrast Security
Domino Enterprise MLOps Platform
Eclipse IDE
Enso
|
Integrations
.NET
5X
Amazon Web Services (AWS)
Axonius
Brinqa
Contrast Assess
Contrast Security
Domino Enterprise MLOps Platform
Eclipse IDE
Enso
|
|||
|
|
|
|
|