Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast's patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production. More information can be found at www.contrastsecurity.com or by following Contrast on Twitter at @ContrastSec.


  • Contrast Assess is a revolutionary application security testing solution that infuses software with vulnerability assessment capabilities so that security flaws are automatically identified.
  • Contrast Protect gives applications the ability to self-report the following about an attack at a minimum – the attacker, method of attack, which applications, frequency, volume, and level of compromise. In addition, Contrast Protect also provides specific guidance to engineering teams on where applications were attacked and how threats can be remediated.


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


Archived Events



We reject the old paradigm of periodic and serial scanning, hacking, and patching, which has proven expensive and ineffective. Instead, Continuous Application Security (CAS) relies on security instrumentation in every application. This instrumentation provides security visibility, assessment, and pr...

Removing a False Sense of (Open Source) Security

Get informed with Contrast Security Resources, including:Executive and Technical BriefsWhitepapers and Case StudiesThought Leadership InterviewsProduct Videos, Webinars, & Conference Presentations


Contrast Assess infuses software with vulnerability assessment capabilities that uniquely combine runtime data and control flow analyses with static, dynamic, configuration and software composition analysis techniques in a single solution.