Contrast Security Recognized as the only “Visionary” in the Gartner Magic Quadrant for Application Security Testing for 2019

Gartner just released its new Magic Quadrant (MQ) for Application Security Testing (AST) for 2019. Gartner evaluates companies based on “Completeness of Vision” and “Ability to Execute” criteria and determines how vendors are positioned within the MQ. Contrast Security, the pioneer in embedding vulnerability analysis and exploit prevention directly into modern software, has been identified by Gartner as the only vendor in the “Visionary” Quadrant for the 4thconsecutive year.


We believe that as the only company in Gartner’s MQ “Visionary” quadrant, Contrast
Security has earned this designation for having exceedingly strong “Completeness of Vision.” 

Contrast Security considers this continued recognition by Gartner as sustained validation
of its strategic vision and track record and our ability to execute. Business success depends on rapidly developing the best modern software – Contrast Security is advancing software security innovation from traditional legacy application security products in order to meet the increased rapid business demands to secure today’s modern software.

Contrast Security is honored to be named the only Gartner Magic Quadrant AST “Visionary”.
We continue to disrupt the Application Security Testing marketplace and are changing the
way software is used by development and security practitioners in development, QA/test and operational environments. Developers are continually adopting rapid DevOps processes
in order to implement their organizations’ digital transformation more efficiently. Our commitment is to empower developers to weave security into their code and help security teams so that they can rapidly test, deploy and run code much more efficiently and securely.

Contrast Security is perfectly positioned as a transformational company delivering a modern software platform. We help organizations that need rapid software development and release processes to secure their code. Businesses today are developing software at high speeds fueled by modern approaches and processes such as Agile, DevOps, Microservices, cloud-native apps and APIs. This creates a gap between the demands for faster software development and the challenges brought about by legacy software security tools.

We have created an innovative modern software approach. We can protect the integrity of the business with innovative security safeguards built directly into the software as they are developed and deployed. Our leading Interactive Application Security Testing (IAST) and Runtime Application Self-Protection (RASP) solutions are used throughout the entire Software Development Life Cycle (SDLC) process. This allows organizations to release secure applications faster and more completely, as well as differentiate their product and service offerings.

Contrast Security is transforming the Application Security Testing market by delivering a modern software security model that provides an optimal fit with high-velocity software development processes found in Agile and DevSecOps environments.

A full complimentary copy of the Gartner’s 2019 Magic Quadrant for Application Security Testing can be viewed here.

Gartner, Magic Quadrant for Application Security Testing, Ayal Tirosh, Dionisio Zumerle, Mark Horvath,
April 18, 2019,
ID: G00346593).

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.The Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Contrast Security.

*** This is a Security Bloggers Network syndicated blog from Security Influencers Blog authored by Surag Patel, Chief Strategy Officer. Read the original post at: