Targeted Defense: The Future of Defending Applications in Production

Presented by

Mahesh Babu, General manager, Runtime Protection, at Contrast Security

About this talk

Raise your hand if this is you: - Our development teams have a massive security backlog and can’t fix everything in code - We need to protect legacy applications with no build pipeline or no dev team support them - Struts 2 made us realize we need better production controls and faster zero-day response - Our SOC has alert fatigue and has no visibility or context regarding production applications - RASP is interesting technology – we are curious to see how we would use it At Contrast Security, we have been hearing this from our customers and have been hard at work to solve these problems. We are proud to announce the release of the Contrast Targeted Defense Platform, the next generation of runtime protection. Join Mahesh Babu (General Manager, Runtime Protection) to learn more about Contrast’s new Targeted Defense Platform and its new capabilities that include, but are not limited to: - Intelligent, multi-technique detection - Advanced attack response that goes beyond monitoring and blocking - Language agnostic protection - Simple deployment

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (25)
Subscribers (5103)
Contrast Security is the leader in next-generation application security, embedding code vulnerability analysis and attack prevention directly into software through instrumentation. Contrast’s patented deep security instrumentation completely disrupts traditional application security approaches with integrated, comprehensive security observability that delivers highly accurate assessment and continuous protection of an entire application portfolio. This eliminates the need for disruptive scanning, expensive infrastructure workloads, and specialized security experts. The Contrast Application Security Platform accelerates development cycles, improving efficiencies and cost, and enabling rapid scale while protecting applications from known and unknown threats.