Latka logo

Top 9 Interactive Application Security Testing (IAST) Software SaaS Companies in May 2026

As of May 2026, there are 9 SaaS companies in Interactive Application Security Testing (IAST) Software. They have combined revenues of $264.4M and employ 1.7K people. They have raised $245M and serve 2.8M customers combined.

Interactive Application Security Testing (IAST) Software is a security testing methodology designed to identify vulnerabilities within applications in real time. By monitoring application behavior during various testing processes, such as quality assurance (QA) or automated testing, IAST tools analyze code execution, data flow, and system responses, providing immediate feedback on security issues. The primary use cases of IAST include vulnerability detection during the application development cycle, production monitoring, and integration with continuous integration/continuous deployment (CI/CD) pipelines. Typical features include automated scanning, real-time risk assessment, and reporting capabilities that assist development and security teams in ensuring the security posture of applications. Common buyer personas include security analysts, application developers, and quality assurance professionals who seek to enhance application security measures throughout the software development lifecycle.

Companies
9
Revenue
$264.4M
Funding
$245M
Employees
1.7K

Filters

Sorting: Highest -> Lowest

Filters

Top Interactive Application Security Testing (IAST) Software Companies

Showing 10 of 0 companies ranked by annual revenue.

Inclusion Criteria

- The software must provide real-time monitoring of applications to identify vulnerabilities during runtime. - It should integrate with existing development workflows and tools, such as CI/CD pipelines. - The product must offer automated scanning capabilities to assess application security continuously. - It should provide detailed reporting on vulnerabilities and security risks discovered. - The tool must support both static and dynamic analysis techniques, not just one method exclusively. - It must cater to software development teams, including application developers and security analysts.