LOS ALTOS, CA --- Contrast Security announces that Contrast Protect now supports Microsoft .NET applications. Contrast Protect uses runtime application self-protection (RASP) technology to empower applications to automatically detect and fix vulnerabilities, identify attacks and defend themselves. Microsoft .NET remains one of the top three enterprise application development environments. As a result, more enterprise applications can be self-protecting than ever before.
Web applications have become a rich target for attackers seeking ways to penetrate organizations' networks. In fact, according to the 2016 Verizon Data Breach Investigations Report, attacks on web applications accounted for over 40 percent of incidents resulting in a data breach, and were the single biggest source of data loss. However, traditional network security tools lack the application understanding needed to accurately identify and block attacks on applications.
"Today, many businesses rely on legacy solutions that are difficult to manage, inaccurate, and do not fit in with modern software environments," said Raphael Reich, director of product marketing and management at Contrast Security. "However, there is a rapidly emerging alternative: making applications self-protecting by infusing new security capabilities directly into the software. Self-protection has a significant advantage by being embedded inside the software itself, making it inherently accurate and scalable. Contrast is empowering a new era of self-protecting software with solutions like Contrast Protect for .NET environments."
Key benefits of Contrast Protect include:
•Leading Protection: Contrast Protect includes attack blocking to stop custom attacks, CVE shields to block attacks on known vulnerabilities, bot blocking to prevent automated attacks, virtual patches to protect against custom attacks and zero-touch logging to enhance the security logging of any application. This enables highly agile software by removing the need to "re-train" security defenses with every software release.
•Unprecedented Accuracy: Using an intelligent agent inside – as part of the application – allows Contrast Protect to have full visibility into running code, which makes the product uncannily accurate. Not only does Contrast eliminate false alarms, but it also pinpoints risks in application code so developers can accelerate code fixes and resolve problems faster.
•Scalable Cloud Security: As applications move to the cloud and into containers, Contrast Protect is an ideal solution to ensure application security. No matter where applications are deployed or how they scale, Contrast Protect builds in security as part of the application itself.
•Proven Technology: Contrast's patented deep security instrumentation technology has been used within almost 10,000 applications across a wide variety of operating systems, web servers, language platforms, application servers, frameworks, libraries and custom coding styles.
•Unified Platform: Contrast eliminates security flaws in applications during development and protects them in production, all from a single platform, to provide a simple, single, centralized installation and management process.
Commonly used for in-house, enterprise-level deployments, the Microsoft .NET ecosystem is rich with existing libraries that provide developers with resources to build applications. Contrast Protect uses deep security instrumentation to gain insight into exactly how attacks behave. Now available for .NET, these applications are able to employ RASP to protect themselves by monitoring threats from within, with more accurate visibility and blocking. Contrast Protect is far more effective than legacy Web Application Firewalls (WAF), Intrusion Protection Systems (IPS) and Intrusion Detection Systems (IDS).
Contrast Protect is part of the Contrast technology platform, which also includes an interactive application security testing (IAST) solution that finds and fixes vulnerabilities during development and testing. Together, these two solutions make .NET applications self-protecting where they are vulnerable and defend themselves against attacks.
More information can be found at http://www.contrastsecurity.com