Introducing G2.ai, the future of software buying.Try now

Best Interactive Application Security Testing (IAST) Software - Page 2

Lauren Worth
LW
Researched and written by Lauren Worth

Interactive application security testing (IAST) software inspects and analyzes an application’s code from within to discover security vulnerabilities while the application is running. This testing method differs from both static application security testing (SAST), which runs without actually executing an application’s code, and dynamic application security testing (DAST), which uses a black-box testing method to perform tests from outside the application. IAST is a faster method for testing code than SAST, which can make it more desirable for teams looking to enhance their continuous delivery practices. However, IAST software’s real-time speed comes with a comparatively less thorough scanning technique. Unlike SAST software, which analyzes the entire codebase, IAST only executes at specific tester-defined points. IAST software notifies testers when vulnerabilities are discovered and offers remediation suggestions to help teams resolve the issue.

To qualify for inclusion in the interactive application security testing (IAST) category, a product must:

Test applications as they are running
Perform predefined tests from within the application
Notify teams of vulnerabilities in real time and offer remediation suggestions
Show More
Show Less

Best Interactive Application Security Testing (IAST) Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Interactive Application Security Testing (IAST) Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
18 Listings in Interactive Application Security Testing (IAST) Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Designed for app development, Q-mast embeds security directly into your workflow to identify security, privacy, and compliance risks before the mobile app is released. With a design tailored for DevSe

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quokka Q-mast features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Designed for app development, Q-mast embeds security directly into your workflow to identify security, privacy, and compliance risks before the mobile app is released. With a design tailored for DevSe

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Quokka Q-mast features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2011
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Seamlessly integrate into CI/CD and can be applied in both appli

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroDay features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroDay
    Year Founded
    2013
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

An advanced interactive application security tool identifying vulnerabilities in both self-developed code and open-source dependencies. Seamlessly integrate into CI/CD and can be applied in both appli

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ZeroDay features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ZeroDay
Year Founded
2013
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroThreat is a cloud-based automated pentesting platform built for modern web apps and APIs. It empowers developers and security teams to detect, prioritize, and remediate over 40,000 vulnerabilities

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroThreat Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Results
    3
    Automation
    3
    Ease of Use
    3
    Easy Setup
    3
    Setup Ease
    3
    Cons
    Excessive Alerts
    1
    False Positives
    1
    Lack of Detail
    1
    Lack of Guidance
    1
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroThreat features and usability ratings that predict user satisfaction
    9.7
    Ease of Use
    Average: 8.5
    9.7
    Quality of Support
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Ease of Admin
    Average: 8.6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Delaware, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroThreat is a cloud-based automated pentesting platform built for modern web apps and APIs. It empowers developers and security teams to detect, prioritize, and remediate over 40,000 vulnerabilities

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 27% Mid-Market
ZeroThreat Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Results
3
Automation
3
Ease of Use
3
Easy Setup
3
Setup Ease
3
Cons
Excessive Alerts
1
False Positives
1
Lack of Detail
1
Lack of Guidance
1
Lack of Information
1
ZeroThreat features and usability ratings that predict user satisfaction
9.7
Ease of Use
Average: 8.5
9.7
Quality of Support
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.4
Ease of Admin
Average: 8.6
Seller Details
HQ Location
Delaware, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®