Lead Application and Data Security Engineer at a insurance company with 5,001-10,000 employees
Real User
Top 10
Aug 1, 2022
Our use case is normal support on top of the WAF for protecting our environment. We have it on the development side and the production side. We're not using it much anymore because we had some performance issues.
Senior Customer Success Manager at a tech company with 201-500 employees
Real User
Feb 18, 2021
This typical use case was a situation where there are mature Java applications that will be replaced by a new system. However, the new apps will not be available for some time and the existing apps need to be secured until then. The customer deployed Protect with their current apps and Protect was able to detect attempted exploits and report the vulnerabilities and details of the attacks in real-time.
Find out what your peers are saying about Contrast Security, SonarSource Sàrl, Checkmarx and others in Application Security Tools. Updated: November 2025.
Application Security Tools are designed to ensure the security of applications by identifying vulnerabilities and potential threats during development and operation phases. They play a crucial role in safeguarding data integrity and user privacy.These tools provide comprehensive security assessments and support for applications, focusing on identifying weaknesses in code and preventing threats. Users share insights about their effectiveness in real-world environments, emphasizing their value...
We use the product for DevSecOps.
Our use case is normal support on top of the WAF for protecting our environment. We have it on the development side and the production side. We're not using it much anymore because we had some performance issues.
This typical use case was a situation where there are mature Java applications that will be replaced by a new system. However, the new apps will not be available for some time and the existing apps need to be secured until then. The customer deployed Protect with their current apps and Protect was able to detect attempted exploits and report the vulnerabilities and details of the attacks in real-time.