Lead Application and Data Security Engineer at a insurance company with 5,001-10,000 employees
Real User
Top 10
Aug 1, 2022
Our use case is normal support on top of the WAF for protecting our environment. We have it on the development side and the production side. We're not using it much anymore because we had some performance issues.
Senior Customer Success Manager at a tech company with 201-500 employees
Real User
Feb 18, 2021
This typical use case was a situation where there are mature Java applications that will be replaced by a new system. However, the new apps will not be available for some time and the existing apps need to be secured until then. The customer deployed Protect with their current apps and Protect was able to detect attempted exploits and report the vulnerabilities and details of the attacks in real-time.
Find out what your peers are saying about Contrast Security, SonarSource SĂ rl, Checkmarx and others in Application Security Tools. Updated: February 2026.
Application Security Tools are essential for organizations looking to protect their software applications from vulnerabilities that could lead to breaches or exploits. These tools provide automated solutions for identifying, managing, and mitigating risks associated with application vulnerabilities.These tools have gained recognition for their ability to integrate seamlessly into development pipelines, providing security teams with real-time data on potential risks. They support multiple...
We use the product for DevSecOps.
Our use case is normal support on top of the WAF for protecting our environment. We have it on the development side and the production side. We're not using it much anymore because we had some performance issues.
This typical use case was a situation where there are mature Java applications that will be replaced by a new system. However, the new apps will not be available for some time and the existing apps need to be secured until then. The customer deployed Protect with their current apps and Protect was able to detect attempted exploits and report the vulnerabilities and details of the attacks in real-time.