Three minutes and twenty-seven seconds

Three minutes and twenty-seven seconds

That's how long the average application security attack lasts. During that time, attackers send HTTP requests designed to trick your application into doing things that it shouldn't, such as serving up sensitive files, running commands on your server's operating system, screwing with your database, and much more. They're targeting both your custom code as well as all the libraries and frameworks that you're using to build your applications. If you're interested in the details, check out Contrast's January 2018 Threat Intelligence Report.  

Note that every application Contrast protects was attacked at least once in January, and more than half were hit with XSS, Path Traversal, SQL Injection, and Method Tampering. Many of these attacks are buried in complex data formats that hide them from traditional network security devices, like firewalls, IDS, and even WAF.

If you'd like to get high resolution visibility and protection for application attacks on your web applications and APIs, all you need to do is add Contrast to your application server. Contrast works like an APM tool for security, using binary instrumentation to protect from within. This approach is scalable, accurate, and high-performance. Contrast adds only 50 microseconds (1 millionths of a second) to a round-trip request. And it works with Java, .NET, node.js, Ruby, and Python.

If you have any questions, let me know in the comments!


Laura Jones

Board Member | Interim Director | Mentor | Business Advisor | Fractional Roles | Sales Negotiation Training | Structuring & Closing Complex Deals | Visionary Leadership | Builds Strong Global Teams | Business Minded

7 年

Jeff that is a surprisingly short window.

Derek Schatz

Highly Experienced Information Security Leader

7 年

Does it proxy inbound requests? Where does it shim in?

要查看或添加评论,请登录

Jeff Williams的更多文章

社区洞察

其他会员也浏览了