Three minutes and twenty-seven seconds
That's how long the average application security attack lasts. During that time, attackers send HTTP requests designed to trick your application into doing things that it shouldn't, such as serving up sensitive files, running commands on your server's operating system, screwing with your database, and much more. They're targeting both your custom code as well as all the libraries and frameworks that you're using to build your applications. If you're interested in the details, check out Contrast's January 2018 Threat Intelligence Report.
Note that every application Contrast protects was attacked at least once in January, and more than half were hit with XSS, Path Traversal, SQL Injection, and Method Tampering. Many of these attacks are buried in complex data formats that hide them from traditional network security devices, like firewalls, IDS, and even WAF.
If you'd like to get high resolution visibility and protection for application attacks on your web applications and APIs, all you need to do is add Contrast to your application server. Contrast works like an APM tool for security, using binary instrumentation to protect from within. This approach is scalable, accurate, and high-performance. Contrast adds only 50 microseconds (1 millionths of a second) to a round-trip request. And it works with Java, .NET, node.js, Ruby, and Python.
If you have any questions, let me know in the comments!
Board Member | Interim Director | Mentor | Business Advisor | Fractional Roles | Sales Negotiation Training | Structuring & Closing Complex Deals | Visionary Leadership | Builds Strong Global Teams | Business Minded
7 年Jeff that is a surprisingly short window.
Highly Experienced Information Security Leader
7 年Does it proxy inbound requests? Where does it shim in?