Application Security & Online Fraud , Black Hat , Events

Closing the Gap: Why ADR Is Crucial for Application Security

Jeff Williams of Contrast Security on the Need to Defend Apps and APIs With Application Detection and Response
Jeff Williams, founder and CTO, Contrast Security

Security operations teams struggle with a visibility gap in the application layer, where much of the risk resides. That's why Contrast Security built a new solution called Application Detection and Response, or ADR. According to Jeff Williams, founder and CTO of Contrast Security, ADR gives security teams detailed insights into application behavior and how to defend against complex threats.

See Also: Corelight's Brian Dye on NDR's Role in Defeating Ransomware

"We trust everything that's valuable in our lives to software, but we're not doing much to protect it. ADR is attempting to fill that gap," he explained. ADR embeds agents directly into applications to monitor and analyze activity in development, pre-production, and production.

"Organizations have EDR products to protect endpoints and CDR to protect the cloud, but there's no ADR," Williams said. "ADR reports unwanted behavior to your SIEM or your XDR or CNAPP and gives you control back over something that has been invisible."

In this video interview with Information Security Media Group at Black Hat 2024, Williams also discussed:

  • The evolution of attacks on applications and how exploits go undetected until it’s too late;
  • Key features of ADR including security observability and detailed, context-rich reporting;
  • The importance of blocking, not just detecting, threats to mitigate attacks.

Jeff Williams has worked in application security for more than 25 years. Before he founded Contrast Security, he founded Aspect Security and was the Global Chairman for OWASP, where he created the original OWASP Top 10. To learn more about Contrast Security, click here.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.