The Software Security Risk Report

Size: px
Start display at page:

Download "The Software Security Risk Report"

Transcription

1 A Forrester Consulting Thought Leadership Paper Commissioned By Coverity The Road To Application Security Begins In Development September 2012

2 Table Of Contents Executive Summary... 2 Application Security Incidents Are Common And Consequences Are Severe... 3 Organizations Must Take A Holistic Approach To Application Security... 7 App Development And Security Must Better Align For Optimized Results Key Recommendations Appendix A: Methodology Appendix B: Demographics Appendix C: Endnotes , Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. For additional information, go to [1-HMGX0Z] About Forrester Consulting Forrester Consulting provides independent and objective research-based consulting to help leaders succeed in their organizations. Ranging in scope from a short strategy session to custom projects, Forrester s Consulting services connect you directly with research analysts who apply expert insight to your specific business challenges. For more information, visit Page 1

3 Executive Summary In July 2012, Coverity commissioned Forrester Consulting to conduct a survey study of 240 North American and European software development and software security influencers. The purpose of the study is to understand the current application security practices and identify key trends and market directions across industries. Web applications, because of their external-facing nature, are some of the primary avenues for security attacks and data breaches. Breaches of customer data is can be detrimental to or costly for the company, but a breach of sensitive confidential corporate information or intellectual property can have devastating consequences. When that happens, it is no longer merely an exercise in cleanup, remediation, and public relations, but a potential blow to a firm s long-term competitiveness in the market. 1 Because of these reasons, building secure web applications resistant to attack is critical to a company s IT posture and the goal of protecting critical data and corporate information. Approximately half of the organizations we surveyed have experienced at least one web application security incident since the beginning of 2011 many of which resulted in severe negative financial consequences. Eighteen percent reported that the breaches cost their organization $500,000 or more. 51% of respondents have had at least one web application security incident since the beginning of % of those respondents experienced losses of at least $500,000. We also found that, when it comes to application security, most organizations employ tactical measures and point technologies. Few attempt to implement a holistic, prescriptive application security methodology. This is primarily due to time-to-market pressures, disconnects between developers and security professionals, and the lack of effective application security incentives. Seventy percent of our survey respondents do not measure developers with securityrelated metrics, and 57% do not send security requirements downstream to guide quality and security testing. Looking forward, as companies grapple with a more sophisticated and menacing threat landscape, growing sets of regulations and third-party requirements, and an unprecedented level of IT upheaval, they will have no choice but to improve their application security posture. If developers do not integrate security and privacy into their development practices from the earliest stages, addressing it later will not only be more expensive, but could be completely ineffective. In this case, companies may find that more things than just their applications are at risk. Key Findings In summary, Forrester s study yielded these key findings: Application security incidents are common and have severe consequences. Many organizations still struggle with the most basic security flaws. Most organizations do not have a holistic or strategic approach to application security. Application development and security teams and goals are often not aligned for optimized results. Page 2

4 Application Security Incidents Are Common And Consequences Are Severe To understand the current state of application security, we began by asking survey respondents whether their organization had experienced any security incidents due to application-level vulnerabilities since the beginning of (Respondents to our study included 240 North American and European software development influencers from companies that conduct web application development.) We found that: Web application security incidents have become far too common. Fifty-one percent of respondents reported having at least one such incident (see Figure 1). It s worth noting that within this group, 13% reported that they experienced five or more incidents. Forrester suspects that many of those who reported that they have had no breaches may have indeed suffered a breach they just don t know it. Today s cybercriminals target their attacks and do everything in their power to conceal their activity it s not unusual for an attack to go undetected for an extended period of time. These statistics should be a wakeup call to the entire industry: if 51% or more of randomly surveyed organizations have experienced at least one web app security incident in less than 24 months, it s clear that application security is in a dismal state. Figure 1 Frequency Of And Financial Losses From Web Security Incidents Since the beginning of 2011, how many times has your organization experienced a web application security breach or a security incident that was due to the exploitation of application-level vulnerabilities? Don t know, 13% More than 10, 4% Zero, 36% Approximately how much have the breaches your organization has encountered since the beginning of 2011 cost your organization? * More than $10 million $5 million to $10 million $1 million to $5 million 1% 1% 6% 18% suffered losses of at least $500, % don t know the cost of their breaches. $500,000 to $1 million 10% One to 10, 47% 51% had at least one security incident attributable to the exploitation of web application vulnerabilities. $100,000 to $500,000 Less than $100,000 Don t know 24% 29% 28% Base: 240 North American and European development and information security managers *Base: 153 North American and European development and information security managers who have experienced a breach (percentages may not total 100 because of rounding) The direct financial consequences of a web app security incident can be severe. When asked about financial consequences of these incidents, 18% reported experiencing losses of more than $500,000; nearly half of those saw losses greater than $1 million. Two respondents said that their losses exceeded $10 million. It s worthwhile to note that 28% of respondents who reported having suffered a breach don t know the direct financial cost of those Page 3

5 breaches. This reflects the fact that many organizations have not developed a good cost model to help track forensics, remediation, and incident response. If development and security leaders expect to increase funding for application security, they will need to address this to secure funding, you must understand the probability and the potential cost of specific risks to your organization to determine the appropriate level of expenditure for preventative measures. Web app security incidents affect the organization and the individual. We also asked respondents to rate the overall impact of web application security incidents. Surprisingly, they ranked damage to professional reputation or job as the top impact even ahead of damage to brand image, customer data loss, or loss of customer confidence (see Figure 2). Fifty-nine percent of respondents said that breaches had some negative impact on their professional reputation, while only 56% and 52% said that breaches negatively affected customer confidence and damage to brand, respectively. This is an interesting result, indicating that a significant percentage of application development and security professionals view security breaches in a somewhat personal light that breaches reflect negatively on their professional reputation. And a notable percentage of respondents simply said that they don t know what impact breaches have. To address this, organizations must develop better breach cost models that span damage to corporate image, customer confidence, and financial loss. Figure 2 The Overall Impact Of Web Application Security Breaches Please indicate how much of an impact all of the breaches your organization has encountered since the beginning of 2011 have had on each of the following. 100% 90% 80% 5% 5% 3% 3% 1% 7% 5% 9% 8% 10% 70% 60% 16% 12% 8% 14% 11% Severe impact 50% 40% 31% 25% 35% 26% 20% Significant impact Medium impact 30% 20% 10% 29% 41% 30% 35% 43% Some impact No impact 0% Damage to professional reputation/job Revenue loss or damage to the company bottom line Loss of customer confidence Damage to brand image Customer data loss Base: 153 North American and European development and information security managers who have experienced a breach ( Don t know/does not apply responses not shown) Page 4

6 Organizations That Struggle With App Security Maturity Experience More Incidents In our study, we found that respondents who believed that their application security programs were less mature or had problems were also more likely to have had security incidents (see Figure 3). Specifically, we found that many organizations: Can t keep pace with the volume of code they produce. Of the respondents who agreed or strongly agreed that they haven t found a scalable way to address security given the volume of code they are producing, 79% had experienced at least one breach. In a highly competitive global economy, the ability to deliver products, services, and new engagement models is critical to the success and profitability of businesses. Prolonging the time-tomarket is simply not acceptable for many organizations. As a result, app-dev teams are under intense pressure to increase their delivery speed. Couple this with the fact that today s applications are increasingly more complex, and it is no surprise that organizations can t scale up their application security practices. Struggle to build the business case for additional funding. It s often difficult to persuade management to invest in proactive and strategic security measures, because building the business case for investment is challenging. Investment in application security doesn t immediately increase top-line revenue or reduce costs. The case for investment is often about reducing risk and future cost avoidance: If something happens, you can protect top-line revenues. According to our study, 71% of the respondents that had suffered at least one breach believed that they did not have enough funding to invest in application security technologies and processes. Lack adequate tools. If you don t have enough funding, you can t invest in application security tools that are more advanced, automated, and tightly integrated into existing development tools and platforms. According to our study, 71% of the respondents that had suffered at least one breach believed that they did not have the right tools for application security. As we ll see later in this report, many development organizations rely heavily on manual code reviews (as opposed to automation) for web application security, and many developers feel that more advanced security tools require too much security expertise to be effective. Page 5

7 Figure 3 Application Security Maturity And The Frequency Of Security Incidents Tell us how strongly you agree and disagree with the state of application security adoption in your development processes. Experienced no incidents/breaches Experienced one or more incident(s)/breach(es) We haven t found a scalable way to address application security with the volume of code that we are generating on an ongoing basis We don t have enough funding to invest in application security technologies or processes We don t have the right application security tools and technologies to use during development Our management does not provide enough support for application security initiatives 21% 28% 29% 30% 79% 72% 71% 70% We don t have the right accountability and incentive structures to promote software security with developers We don t have enough customer demand for secure code to justify investing in application security processes and controls We don t have enough security skill and expertise to adopt application security measures pervasively throughout development We don t have the appropriate processes to ensure security is incorporated in the development life cycle 36% 38% 38% 42% 64% 63% 63% 58% Base: 208 North American and European development and information security managers who are aware of their breach status and responded agree or strongly agree to the state of application security adoption in their development processes (percentages may not total 100 because of rounding) Organizations Struggle To Address Basic Security Flaws We asked respondents to rank which categories of web application vulnerabilities present the biggest risk to their environments. Default account passwords, SQL injections, and security misconfigurations took the top spots (see Figure 4). In addition, default passwords and security misconfigurations featured prominently among those who experienced a high number of security incidents. More specifically, 66% of those who had more than 10 incidents reported that they had trouble with default accounts and passwords, while 55% said security misconfigurations. With 39% of respondents, SQL injection topped the list for those who had five to 10 incidents. As default passwords and security misconfigurations are typically considered low-hanging-fruit security vulnerabilities, it is clear that the industry has not yet matured to the degree that companies know how to efficiently detect and deal with basic security flaws in software implementations. Page 6

8 Figure 4 Web Application Security Flaws Which three of the following application security flaws present the greatest risks to web application security and ultimately to your organization? 0% 10% 20% 30% 40% 50% Default account passwords 17% 11% 13% Security misconfigurations 12% 10% 15% SQL injections 16% 10% 10% Rank 1 Broken authentication and session management Cross-site scripting 10% 8% 12% 13% 10% 9% Rank 2 Rank 3 Failure to restrict URL access 12% 10% 8% Insecure cryptographic storage 9% 7% 8% Unvalidated redirects and forwards 5% 8% 10% Insecure direct object references 2% 6% 8% Insufficient transport-layer protection 3% 7% 5% Cross-site request forgery (CSRF) 5% 4% 4% Base: 240 North American and European software development influencers and decision-makers Organizations Must Take A Holistic Approach To Application Security Organizations that want to improve their application security competency should take a strategic approach to application security. This means integrating security practices throughout the development life cycle, adopting industry-recognized methodologies, giving developers incentives to incorporate security and measuring their success, and tying application security maturity to the company s overall business objectives. However, for a number of reasons, including time-to-market pressure, deployment challenges, lack of developer skills, and misalignment between app dev and security, the life cycle approach is not yet the norm. The result? Too many organizations adopt tactical measures, mainly for compliance, but fail to elevate the state of their application security to combat increasingly sophisticated threats. Top Drivers For Preventive App Security: Compliance And Lower Costs When we asked our respondents what the top three business drivers for their organization to implement application security measures during development were, the top answer was to meet compliance requirements; 67% ranked compliance as one of the top three business drivers, followed by the 53% who chose it is cheaper to fix bugs earlier in the development life cycle (see Figure 5). More specifically: Page 7

9 Compliance continues to drive adoption but is no longer sufficient. It is not surprising that compliance is a big driver of security adoption: regulations like PCI, SOX, and HIPAA have requirements that call for the use of application security mechanisms, either specifically or indirectly through the mandate for vulnerability management. However, just meeting what regulations require is often not sufficient to withstand sophisticated attacks. The fact that compliance is by far the No. 1 driver is an indication that the industry as a whole does not treat application security as a strategic and proactive initiative. There is little disagreement that it s cheaper to eliminate security flaws earlier in the development life cycle. A number of industry studies have provided concrete evidence that it is often cheaper to fix security flaws earlier in the development life cycle rather than later. Respondents in our study agree; 53% say the top driver to implement application security measures earlier in the life cycle is because it s cheaper to fix bugs in the early stages. Figure 5 Top-Ranked Business Drivers For Preventive Application Security Adoption What are the top three business drivers for your organization to implement application security earlier in the development life cycle? To meet our compliance requirements We are risk-driven and don t want to end up as a security breach headline story 53% 57% It is cheaper to fix bugs earlier in the development life cycle The economic impact of security breaches and incidents justifies the investment We have a security-aware corporate culture Customers require us to demonstrate secure development practices 46% 42% 39% 36% It s a competitive differentiator for us 18% Base: 157 North American and European development and information security managers who indicated that their organizations have the right processes and controls in place to address web application security during development (multiple responses accepted) (Ranks of 1, 2, and 3 combined) Top Barriers To Preventive App Security: Time-To-Market, Resistance, And Lack Of Tools We asked survey respondents what consequences they would be most concerned with if application defects were found late in the development life cycle. Of all the choices presented, cost more to fix was by far the most popular answer: 66% of all respondents indicated that they believe finding defects late in the life cycle may result in higher remediation costs. However, when asked what the major barriers preventing them from addressing web application security earlier Page 8

10 in the life cycle are, 41% said that time-to-market pressure prevented them from pushing security upstream in development (see Figure 6). Specifically, we found that: There is strong time-to-market pressure. These answers suggest that, even though many understand the peril of addressing application security late in the life cycle especially as concerns increased remediation costs the pressure to bring new applications to market as quickly as possible often trumps concerns about security or dampens the will to change the status-quo approach to application security. There is resistance to additional development tasks. Development organizations often resist changes to existing development processes because of the tremendous time-to-market pressure and the disruption these changes entail. Without adopting application security as an explicit performance metric and providing support for appdev to take on additional tasks, it is difficult for development organization to align its goals with application security initiatives. Companies lack tools that integrate with the development environment and workflow. We asked those respondents (both development and security) who indicated that they had not found suitable application security tools and technologies to further elaborate on why that was the case. While application development pros and security pros both indicated that their existing legacy tools had integration issues (either with the development environment or development workflow) and high false positives, development professionals also called out issues such as tools are too complex and require too much security expertise, tools do not have enough actionable guidance to developers, and tools take too long to run. Figure 6 Top Barriers To Addressing Web Application Security Earlier In The Development Life Cycle Which of the following are the major barriers preventing you from addressing web application security earlier in the life cycle? Extremely true, couldn t agree more True some of the time, but not always Time-to-market pressure prevents us from adopting application security measures earlier in the dev life cycle 6% 35% Our development team resists the added tasks of addressing application security during active development We haven t found any suitable application security tools and technologies that work well with our development processes 4% 8% 27% 23% 41% said time-tomarket pressures prevented them from adopting application security earlier in the development lifecycle. Base: 240 North American and European software development influencers and decision-makers Organizations Must Adopt More Advanced Measures And Test Earlier In The Life Cycle Our study found that companies do put a strong emphasis on training and testing in application security (see Figure 7 and Figure 8). However, our study also revealed two issues: 1) developers are not performing testing early enough in the Page 9

11 development life cycle; and 2) there is little in the way of strategic application security measures, such as incorporating risk-based application security policies. More specifically, Forrester recommends that development organizations: Reduce reliance on manual code review with automated code analysis testing. Nearly 63% of the respondents reported that they use manual code reviews, while only 50% use static code analysis during development. The percentage was even lower when we asked specifically about web application security: Only 33% used static analysis during development (see Figure 8). Static analysis technologies inspect application code for potential security defects and help eliminate code flaws during development. Manual code reviews are useful, but they are hard to scale. Furthermore, manual code reviews should be conducted by someone other than the developer and they should focus on the security-sensitive parts of the code: storage and retrieval of secrets, authentication, authorization, logging, and user input validation. Use secure coding guidelines and libraries. Surprisingly, only 42% of respondents follow secure coding guidelines and only 28% use a library of approved or banned functions. Due to time-to-market pressures, developers code as quickly as they can and then hope that defects are caught by code reviews and testers. However, it would be much more proactive to follow a set of guidelines and best practices and much more efficient to avoid using banned functions right from the start. Incorporate architectural analysis and threat modeling. Only 26% of the survey respondents said that they utilize threat modeling in developing web applications (see Figure 8). Threat modeling and architectural analysis are an important component of application security strategies, because they help identify security design flaws that would otherwise evade code-level analysis. Work with management to change accountability and incentives for app-dev pros. In order to move from compliance-mandated tactical approaches to application security to a full life cycle approach, firms need to put in place an accountability structure and incentive measures that champion the cause of application security. Examples of accountability measures include evaluating developers with security metrics, establishing common bug criteria across development and testing, tracking vulnerability remediation performance, and rewarding collaboration between developers and security professionals. Test earlier in the life cycle. Despite the fact that here is little disagreement that it s cheaper to address issues earlier in the life cycle, only 17% of respondents said that they test during the development cycle (which we define as during development and/or unit testing). Additionally, the fact that more than half of the organizations do not audit their code before integration testing is troubling. That means many security flaws are left unaddressed until later stages of development, which translates to more hours in post-development bug-chasing and regression testing both efforts that could be avoided by strengthening testing efforts earlier in development (see Figure 9). Page 10

12 Figure 7 Adoption Of Application Security Measures Does your organization as a whole use any of the following application security measures in the development life cycle? Manual code reviews Security testing by testers (fuzzing, black-box scanning, penetration testing) Security testing by developers (fuzzing, black-box scanning) Static analysis tools and technologies 51% 50% 63% 62% Secure coding guidelines 42% A library of approved or banned functions Manual penetration testing by external resources 28% 28% Binary code analysis services 16% Base: 240 North American software development influencers and decision-makers Figure 8 Adoption Of Web Application Security Measures Which of the following measures do you employ for ensuring web application security in your organization? Developer and/or tester training 67% Quality or security gate in testing Prescriptive security incident response plan or operational security plan for production code Stringent security tests prior to acceptance of third-party code Risk- or policy-based security requirements definition Static analysis 40% 37% 37% 33% 50% Threat modeling and usage scenario review Accountability and incentive structures to promote software security practices Archive release environments and activities as part of a secure release process Don t know 5% 21% 26% 26% Other 1% Base: 240 North American software development influencers and decision-makers Page 11

13 Figure 9 Application Security Testing If you perform security audits and tests, such as penetration testing and code review, when in the development life cycle do you perform those audits? During quality testing During functional testing During integration testing 50% 48% 48% During development (before unit test) During developer unit test stage 40% 39% Just before application release 29% Don t know We don t perform security audits or tests 2% 4% Base: 240 North American software development influencers and decision-makers App Development And Security Must Better Align For Optimized Results Another thought-provoking fact that our study uncovered is the disparity between how developers and security professionals view the state of the world. Half of the security respondents said that their development counterparts resist the task of addressing application security during development. In contrast, only 28% of developers agreed (see Figure 10). Similarly, 32% of developers said they haven t found a suitable application security technology that works well with their development processes, while only 23% of the security respondents agreed with that statement. These results suggest that security professionals clearly don t understand the challenges that application development folks are faced with, such as requiring security expertise to use some of the legacy code analysis tools and the lack of actionable remediation guidance. If you don t understand the root cause of a particular behavior in this case, developers resistance to incorporating security efforts earlier in development you can t effect change. Organizations that can better bridge that divide will have a better chance of succeeding in their application security quest. Page 12

14 Figure 10 Application Development And Security Pros See Challenges Differently Which of the following are major barriers preventing you from addressing web application security earlier in the life cycle? (percentage answering true some or all of the time ) Development roles (N = 210) Security roles (N = 30) Our development team resists the added tasks of addressing application security during active development We haven t found any suitable application security tools and technologies that work well with our development processes 23% 28% 32% 50% Time-to-market pressure prevents us from adopting application security measures earlier in the dev life cycle 42% 40% Base: 240 North American software development influencers and decision-makers Security Pros Can t Expect Developers To Become Security Experts When asked to describe the level of security awareness and application security proficiency of developers in their organization, our respondents were somewhat reticent to give high marks: 40% said their developers are comfortable with certain application security measures, while 32% said that their developers are not really proficient in application security. Only 24% barely one in four respondents believed their developers are extremely security-aware (see Figure 11). Security professionals who want to improve application security should: Recognize that training and testing only go so far. Most developers today have not gone through training on secure programming, and security-savvy developers are few and far between. This isn t likely to change anytime soon; training isn t going to effect change overnight. In addition, while many organizations rely heavily on testing, they are not testing early enough in the development process. Given that training and testing are the primary application security techniques in use today and that more than 50% of organizations have experienced at least one security incident recently, it s clear that these techniques by themselves are not enough. Development organizations need to adopt other measures, such as static analysis, threat modeling, and secure-coding guidelines to support application security initiatives. Work closely with developers to select application security technologies. When we asked respondents why they hadn t found any suitable application security tools, some developers (although no security pros) indicated that tools were too complex, didn t provide actionable guidance, and didn t scale. When picking an application security tool, security pros must be sensitive to the fact that developers are not security experts. They must also consider the capabilities of the tool and how well it integrates with the development processes and technology platforms. More specifically, take into account six issues when building a requirements list: 1) language and platform support; 2) IDE and built-script integration needs; 3) vulnerability coverage; 4) analysis accuracy; 5) risk scoring; and 6) integration with remediation systems. Page 13

15 Advocate for a risk-based approach to app security. Most developers want to do the right thing; given enough time, they would like to produce quality, secure code. The vast majority of developers in our study believe that they should address every security issue only 20% think that developers should only address exploitable security defects (see Figure 11). However, if the organization is pushing you to release revenue-generating and customer-facing apps as quickly as possible, it s unrealistic to address every security defect. Take a risk-based approach: first determine the criticality of the app and the defect and address those that are the most critical. This is the only efficient and effective way to elevate the application security posture. Figure 11 Developers Lack Application Security Proficiency How would you describe the level of security awareness and application security proficiency of your developers as a whole? Our developers are are comfortable with certain app-sec measures and are involved in application security practices on a daily basis 40% Our developers have some knowledge of application security but are not really proficient in app-sec practices 32% Our developers are extremely security-aware; they're no app-sec experts but are as good as it gets in terms of dev pros 24% Our developers are not security-aware at all 3% Only one in four believes that developers at their company are extremely security-aware. Base: 240 North American software development influencers and decision-makers Page 14

16 Figure 12 Developers Struggle With Today s Security Tools What are the top three issues you encounter when working with web application security tools and technologies? Development roles (N = 59) Security roles (N = 15) The tool doesn t integrate well with the development environment 7 19 The workflow of the tool/technology does not integrate well with development workflow processes 5 10 High false-positive rates 3 11 Too complex or require too much security expertise to use 11 Lack of actionable guidance to developers for remediation 5 Tools take too long to run and don't scale 3 Base: 74 North American and European development and information security managers who have not found suitable application security tools for development Figure 13 Expectations That Developers Will Address All Defects Are Unrealistic How much do you agree with the following statements about web application security defects? Strongly disagree Disagree Somewhat agree Agree Strongly agree Developers should address all security defects during development as a best practice 1% 8% 14% 34% 41% Security defects should be treated differently from other classes of defects 6% 15% 18% 31% 28% Developers should only address exploitable security defects (i.e., exploitability is one measure of the criticality of a security flaw) 15% 39% 25% 13% 7% Base: 240 North American software development influencers and decision-makers ( Don t know/does not apply responses not shown) Page 15

17 KEY RECOMMENDATIONS This survey took an in-depth look at the current application security practices of more than 200 companies across different industries. The data in our study painted a picture of a software industry that on many fronts does not yet have mature security practices. In addition, many development pros feel that security tools don t work well in their environment, are too complex, and require too much security expertise challenges that their security counterparts don t always see. Based on the detailed findings in this report, it s clear that companies need to: Address essential application security with a life-cycle approach to secure development. An important insight from this study is that many organizations are still struggling with basic security flaws, such as default passwords, SQL injections, and security misconfigurations. A comprehensive secure development life-cycle (SDLC) approach will help you address these flaws effectively and elevate your application security maturity to a more prescriptive and strategic level. This includes the implementation of effective bug reporting and handling, better preventive security measures, and meaningful security metrics. Additionally, you must strengthen the alignment across development and security teams. Over time, these practices will effect changes beyond security such as expedited time-to-market, better code quality, and closer alignment between security and development across the development organization. Continue to drive awareness of the changing threat landscape. Concerns over cybersecurity and the changing threat landscape will drive demand for proactive measures and ultimately a more risk-centric approach to security. Driving awareness of cyberthreats will help application security professionals articulate business value alignment and counter some of the intense pressure to bring applications to market as quickly as possible at the expense of adequate security measures. If organizations don t improve their application security posture, they will continue to be plagued by security incidents that result in breaches of personal data and intellectual property, with significant business and financial consequences. 2 Change the discussion from cost to risk reduction and long-term business value. Instead of discussing only cost and cost avoidance, application development and security pros should focus on a how a secure application development process reduces risks and supports long-term business objectives. Rather than address every security defect, organizations need to adopt more strategic measures, such as testing earlier in the life cycle, focusing on flaws with a critical impact, and leveraging automated technologies. When it comes to understanding business objectives, security pros need to advocate a traceable alignment between high-level business objectives like global expansion, customer confidence, brand building, and investments in application security. Page 16

18 Appendix A: Methodology Application security refers to the mechanisms and processes that help identify and remediate security vulnerabilities in software applications. These include, but are not limited to, secure design, code-level analysis, code scanning, fuzzing, and penetration testing. In July 2012, Coverity commissioned Forrester Consulting to conduct a survey of 250 North American and European software development influencers. The purpose of the study was to understand how organizations in different industries implement application security during development and to identify key trends, challenges, and market directions for application security. Fifty-nine percent of respondents to Forrester s survey come from US; the rest are from Canada, France, Germany, and the UK. Most respondents have an enterprise background: 63% are from companies with 5,000 or more employees and the rest all come from companies with at least 500 employees. The software and finance and insurance industries are two of the largest verticals represented by the survey respondents: 20% software and 13% finance and insurance. The rest are fairly evenly distributed across industries like healthcare, government, utilities, transportation, and high-tech. All respondents are from companies that conduct software development and, more specifically, web application development. They use languages and development frameworks that include Java, HTML5,.NET, Flash, and PHP. Among the respondents, 79% develop software for in-house use, 53% are commercial ISVs, and another 12% are software outsourcers. To ensure quality answers to the survey, every respondent had to be either directly involved in software development, QA testing, or software security, or significantly influence software development, testing, or software security at their companies. More specifically, 13% are security professionals with application security responsibilities; the rest span development roles, such as development manager, senior developer, architect, and VP of engineering. Readers who are interested in a more detailed description of respondent profiles should refer to Appendix B. Page 17

19 Appendix B: Demographics Figure A Survey Respondent Demographic Information: Country Origins And Company Sizes In which country do you currently live? Approximately how many employees work for your firm/organization worldwide? Canada, 4% France, 12% 500 to 999, 12% Germany, 12% 20,000 or more, 38% 1,000 to 4,999, 24% United States, 59% United Kingdom, 12% 5,000 to 19,999, 25% Base: 240 North American software development influencers and decision-makers (percentages do not total 100 because of rounding) Figure B Industry Which of the following best describes the industry to which your company belongs? Software Financial services and insurance Government Healthcare Energy and utilities Transportation Communications, media, and entertainment Internet Wholesale trade Retail Other 6% 5% 5% 5% 4% 4% 8% 9% 13% 20% 21% Base: 240 North American software development influencers and decision-makers Page 18

20 Figure C Respondent Profile Does your organization develop web applications in any of the following languages or frameworks? Which of the following are true for your firm? Java 100% HTML5 55% We develop software applications for in house use 79%.NET Flash or other Rich Interactive Application capabilities. 50% 47% We develop commercial software products or services 53% PHP 38% We are a software outsourcer 12% Other 5% Base: 240 North American and European development and information security managers (multiple responses accepted) Appendix C: Endnotes 1 Source: Protect Your Competitive Advantage By Protecting Your Intellectual Property From Cybercriminals, Forrester Research, Inc., July 13, Source: Application Security: 2011 And Beyond, Forrester Research, Inc., April 12, Page 19

Software Integrity Risk Report

Software Integrity Risk Report A Forrester Consulting Thought Leadership Paper Commissioned By Coverity The Critical Link Between Business Risk And Development Risk April 2011 Table Of Contents Executive Summary... 2 Introduction And

More information

Executive Summary... 2. Introduction And Survey Methodology... 3. For Many, Application Security Is Not Yet A Mature Practice... 5

Executive Summary... 2. Introduction And Survey Methodology... 3. For Many, Application Security Is Not Yet A Mature Practice... 5 Executive Summary... 2 Introduction And Survey Methodology... 3 For Many, Application Security Is Not Yet A Mature Practice... 5 From Design To Production, Software Security Practices Need To Improve...

More information

Leverage Micro- Segmentation To Build A Zero Trust Network

Leverage Micro- Segmentation To Build A Zero Trust Network A Forrester Consulting Thought Leadership Paper Commissioned By VMware July 2015 Leverage Micro- Segmentation To Build A Zero Trust Network Table Of Contents Executive Summary... 1 Current Security Implementations

More information

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP How to start a software security initiative within your organization: a maturity based and metrics driven approach Marco Morana OWASP Lead/ TISO Citigroup OWASP Application Security For E-Government Copyright

More information

A Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience

A Forrester Consulting Thought Leadership Paper Commissioned By AT&T Collaboration Frontier: An Integrated Experience A Forrester Consulting Thought Leadership Paper Commissioned By AT&T August 2013 Table Of Contents Executive Summary... 2 The Profile Of Respondents Is Across The Board... 3 Investment In Collaboration

More information

Strategically Detecting And Mitigating Employee Fraud

Strategically Detecting And Mitigating Employee Fraud A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability A Custom Technology Adoption Profile Commissioned By BitSight Technologies Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability Introduction As concerns around

More information

Infrastructure As Code: Fueling The Fire For Faster Application Delivery

Infrastructure As Code: Fueling The Fire For Faster Application Delivery A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft March 2015 Infrastructure As Code: Fueling The Fire For Faster Application Delivery Table Of Contents Executive Summary... 1 Companies

More information

How To Get Started With Customer Success Management

How To Get Started With Customer Success Management A Forrester Consulting Thought Leadership Paper Commissioned By Gainsight April 2014 How To Get Started With Customer Success Management Table Of Contents Four Actionable Steps To Setting Up Your Customer

More information

Trends In Data Quality And Business Process Alignment

Trends In Data Quality And Business Process Alignment A Custom Technology Adoption Profile Commissioned by Trillium Software November, 2011 Introduction Enterprise organizations indicate that they place significant importance on data quality and make a strong

More information

Executive Summary... 2. Sales Reps And Operations Professionals Need Rich Customer Data To Meet Revenue Targets... 3

Executive Summary... 2. Sales Reps And Operations Professionals Need Rich Customer Data To Meet Revenue Targets... 3 Executive Summary... 2 Sales Reps And Operations Professionals Need Rich Customer Data To Meet Revenue Targets... 3 Lack Of Accurate, Timely, And Actionable Customer Data Makes Goal Attainment Difficult...

More information

The State Of Public Cloud Security Part One Of A Three-Part Series On Public Cloud Security

The State Of Public Cloud Security Part One Of A Three-Part Series On Public Cloud Security A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro September 2014 The State Of Public Cloud Security Part One Of A Three-Part Series On Public Cloud Security Table Of Contents

More information

An Executive Primer To Customer Success Management

An Executive Primer To Customer Success Management A Forrester Consulting Thought Leadership Paper Commissioned By Gainsight April 2014 An Executive Primer To Customer Success Management Table Of Contents We Live In A Subscription Economy Learn To Manage

More information

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring Organizations Find Real Value With Continuous Monitoring

Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring Organizations Find Real Value With Continuous Monitoring A Forrester Consulting Thought Leadership Paper Commissioned By Tenable Network Security February 2014 Close The Gaps Left By Traditional Vulnerability Management Through Continuous Monitoring Organizations

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table

More information

Best Practices For Public Cloud Security Part Three Of A Three-Part Series On Public Cloud Security

Best Practices For Public Cloud Security Part Three Of A Three-Part Series On Public Cloud Security A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro February 2015 Best Practices For Public Cloud Security Part Three Of A Three-Part Series On Public Cloud Security Table Of Contents

More information

Enterprise Application Security Program

Enterprise Application Security Program Enterprise Application Security Program GE s approach to solving the root cause and establishing a Center of Excellence Darren Challey GE Application Security Leader Agenda Why is AppSec important? Why

More information

Firms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats

Firms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats A Custom Technology Adoption Profile Commissioned By Fortinet April 2014 1 Firms Turn To Next- Generation Firewalls To Tackle Evolving IT Threats Introduction With the advancement of technology, IT security

More information

Be Direct: Why A Direct-To- Consumer Online Channel Is Right For Your Business

Be Direct: Why A Direct-To- Consumer Online Channel Is Right For Your Business A Forrester Consulting Thought Leadership Paper Commissioned By Digital River May 2014 Be Direct: Why A Direct-To- Consumer Online Channel Is Right For Your Business 1 Table Of Contents Executive Summary...2

More information

Key Strategies To Capture And Measure The Value Of Consumerization Of IT

Key Strategies To Capture And Measure The Value Of Consumerization Of IT A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying

More information

Development Processes (Lecture outline)

Development Processes (Lecture outline) Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development

More information

The Power Of Real-Time Insight How Better Visibility, Data Analytics, And Reporting Can Optimize Your T&E Spend

The Power Of Real-Time Insight How Better Visibility, Data Analytics, And Reporting Can Optimize Your T&E Spend A Forrester Consulting Thought Leadership Paper Commissioned By Concur May 2014 The Power Of Real-Time Insight How Better Visibility, Data Analytics, And Reporting Can Optimize Your T&E Spend Table Of

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

The Move Is On To Open Source Integration Software

The Move Is On To Open Source Integration Software A Custom Technology Adoption Profile Commissioned By Red Hat Forrester Surveys Show Adoption Of Open Source Integration On The Upswing The current economic environment has prompted firms to seek out low-cost

More information

Simplify And Innovate The Way You Consume Cloud

Simplify And Innovate The Way You Consume Cloud A Forrester Consulting October 2014 Thought Leadership Paper Commissioned By Infosys Simplify And Innovate The Way You Consume Cloud Table Of Contents Executive Summary... 1 Cloud Adoption Is Gaining Maturity

More information

The Era Of Intimate Customer Decisioning Is At Hand

The Era Of Intimate Customer Decisioning Is At Hand A Forrester Consulting Thought Leadership Paper Commissioned By FICO Decisions Based On An Informed, Intimate, And Immediate Understanding Of Customers Are the Next Normal January 2013 Table Of Contents

More information

Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice

Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice A Custom Technology Adoption Profile Commissioned By Dell November 2014 Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice Introduction With more and more business applications

More information

Digital Business Requires Application Performance Management

Digital Business Requires Application Performance Management A Custom Technology Adoption Profile Commissioned By BMC Software January 2015 Digital Business Requires Application Performance Management Introduction Digital is transforming the rules of business success.

More information

A Faster Pace For Retail Paid Search Real-Time Insights Are Critical To Competitive Advantage

A Faster Pace For Retail Paid Search Real-Time Insights Are Critical To Competitive Advantage A Forrester Consulting Thought Leadership Paper Commissioned By Google DoubleClick August 2014 A Faster Pace For Retail Paid Search Real-Time Insights Are Critical To Competitive Advantage Table Of Contents

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

Intent Data Can Sharpen Your Competitive Edge

Intent Data Can Sharpen Your Competitive Edge A Custom Technology Adoption Profile Commissioned By Magnetic May 2015 Intent Data Can Sharpen Your Competitive Edge Introduction Using intent data for customer acquisition and retention is important for

More information

Private Or Public Cloud Isn t The Right Question It s Going To Be A Hybrid World

Private Or Public Cloud Isn t The Right Question It s Going To Be A Hybrid World A Custom Technology Adoption Profile Commissioned By HP Private Or Public Cloud Isn t The Right Question It s Going To Be A Hybrid World April 2012 Setting The Stage: IT Must Get In Front Of Enterprise

More information

Delivering New Levels Of Personalization In Consumer Engagement

Delivering New Levels Of Personalization In Consumer Engagement A Forrester Consulting Thought Leadership Paper Commissioned By SAP Delivering New Levels Of Personalization In Consumer Engagement A Guide For Marketing Executives: Strategy, Capabilities, And Technologies

More information

A Forrester Consulting Thought Leadership Paper Commissioned By HP IT Operations Managers Must Rethink Their Approach To Private Cloud

A Forrester Consulting Thought Leadership Paper Commissioned By HP IT Operations Managers Must Rethink Their Approach To Private Cloud A Forrester Consulting Thought Leadership Paper Commissioned By HP IT Operations Managers Must Rethink Their Approach To Private Cloud September 2011 Table Of Contents Executive Summary... 2 Firms Are

More information

Pentests more than just using the proper tools

Pentests more than just using the proper tools Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security

More information

Web application security: automated scanning versus manual penetration testing.

Web application security: automated scanning versus manual penetration testing. Web application security White paper January 2008 Web application security: automated scanning versus manual penetration testing. Danny Allan, strategic research analyst, IBM Software Group Page 2 Contents

More information

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP Presentation Overview Basic Application Security (AppSec) Fundamentals Risks Associated With

More information

Zero Trust Requires Effective Business-Centric Application Segmentation

Zero Trust Requires Effective Business-Centric Application Segmentation Zero Trust Requires Effective Business-Centric Application Segmentation GET STARTED Zero Trust Requires Effective Business-Centric Application Segmentation To protect the network from today s sophisticated

More information

Development Testing: A New Era In Software Quality

Development Testing: A New Era In Software Quality A Forrester Consulting Thought Leadership Paper Commissioned By Coverity Demands For Speed And Innovation Are Driving Quality Earlier Into The Software Development Life Cycle November 2011 Table Of Contents

More information

A Forrester Total Economic Impact Study Prepared For Codenomicon The Total Economic Impact Of Codenomicon s Defensics Security Testing Suite

A Forrester Total Economic Impact Study Prepared For Codenomicon The Total Economic Impact Of Codenomicon s Defensics Security Testing Suite A Forrester Total Economic Impact Study Prepared For Codenomicon The Total Economic Impact Of Codenomicon s Defensics Security Testing Suite Project Director: Michael Speyer July 2012 TABLE OF CONTENTS

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

The Road To CrossChannel Maturity

The Road To CrossChannel Maturity A Forrester Consulting Thought Leadership Paper Commissioned By Experian Marketing Services The Road To CrossChannel Maturity Build On Skills And Established Digital Channels To Achieve Cross-Channel Mastery

More information

Pentests more than just using the proper tools

Pentests more than just using the proper tools Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Security testing 3. Penetration testing Introduction Evaluation scheme Security Analyses of web applications

More information

IBM Rational AppScan: Application security and risk management

IBM Rational AppScan: Application security and risk management IBM Software Security November 2011 IBM Rational AppScan: Application security and risk management Identify, prioritize, track and remediate critical security vulnerabilities and compliance demands 2 IBM

More information

The Cloud Manager s Balancing Act Balancing Security And Cost Without Sacrificing Time-To-Value

The Cloud Manager s Balancing Act Balancing Security And Cost Without Sacrificing Time-To-Value A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro November 2014 The Cloud Manager s Balancing Act Balancing Security And Cost Without Sacrificing Time-To-Value Part Two Of A Three

More information

File Sync And Share And The Future Of Work

File Sync And Share And The Future Of Work A Forrester Consulting Thought Leadership Paper Commissioned By Dropbox March 2014 File Sync And Share And The Future Of Work Table Of Contents Executive Summary...1 Workers Are Embracing Sync And Share

More information

Consumer Web Portals: Platforms At Significant Security Risk

Consumer Web Portals: Platforms At Significant Security Risk A Custom Technology Adoption Profile Commissioned By RSA December 2013 Consumer Web Portals: Platforms At Significant Security Risk 1 Introduction The increasing number of digital identities, prevalence

More information

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier

More information

Is It Time To Refresh Your Wireless Infrastructure?

Is It Time To Refresh Your Wireless Infrastructure? A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies October 2015 Is It Time To Refresh Your Wireless Infrastructure? Table Of Contents Executive Summary... 1 The Age Of The

More information

Governance Takes A Central Role As Enterprises Shift To Mobile

Governance Takes A Central Role As Enterprises Shift To Mobile A Forrester Consulting Thought Leadership Paper Commissioned By Druva October 2014 Governance Takes A Central Role As Enterprises Shift To Mobile Table Of Contents Executive Summary... 1 Mobility Adds

More information

IT Security & Compliance. On Time. On Budget. On Demand.

IT Security & Compliance. On Time. On Budget. On Demand. IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount

More information

DAM 2020: Expectations From Digital Asset Management Of The Future

DAM 2020: Expectations From Digital Asset Management Of The Future A Forrester Consulting Thought Leadership Paper Commissioned By Cognizant assetserv March 2016 DAM 2020: Expectations From Digital Asset Management Of The Future Table Of Contents Executive Summary...

More information

How To Adopt Cloud Based Disaster Recovery

How To Adopt Cloud Based Disaster Recovery A Custom Technology Adoption Profile Commissioned By IBM Cloud-Based Disaster Recovery Barriers And Drivers In The Enterprise March 2012 Introduction Enterprise IT professionals today face a serious challenge:

More information

Enterprises Shift To Smart Process Apps To Engage Customers

Enterprises Shift To Smart Process Apps To Engage Customers A Custom Technology Adoption Profile Commissioned By Kofax Executive Summary Historically, companies have invested in systems that make the business more efficient systems like customer relationship management

More information

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction

More information

Integrating Security Testing into Quality Control

Integrating Security Testing into Quality Control Integrating Security Testing into Quality Control Executive Summary At a time when 82% of all application vulnerabilities are found in web applications 1, CIOs are looking for traditional and non-traditional

More information

Cloud Backup And Disaster Recovery Meets Next-Generation Database Demands Public Cloud Can Lower Cost, Improve SLAs And Deliver On- Demand Scale

Cloud Backup And Disaster Recovery Meets Next-Generation Database Demands Public Cloud Can Lower Cost, Improve SLAs And Deliver On- Demand Scale A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft March 2014 Cloud Backup And Disaster Recovery Meets Next-Generation Database Demands Public Cloud Can Lower Cost, Improve SLAs

More information

Cyber Security & Data Privacy. January 22, 2014

Cyber Security & Data Privacy. January 22, 2014 Cyber Security & Data Privacy January 22, 2014 Today s Presenters Bob DiBella Director of Product Management Aclara Technologies Srinivasalu Ambati Application Architect, Consumer Engagement Aclara Technologies

More information

Build Exceptional Customer Experiences With IT Agility

Build Exceptional Customer Experiences With IT Agility A Forrester Consulting July 2014 Thought Leadership Paper Commissioned By CenturyLink Technology Solutions Build Exceptional Customer Experiences With Agility Table Of Contents Executive Summary... 1 Providing

More information

Big Data Ups The Customer Analytics Game

Big Data Ups The Customer Analytics Game A Custom Technology Adoption Profile Commissioned By IBM February 2014 Big Data Ups The Customer Analytics Game Introduction In the age of the customer, enterprises invest in creating actionable customer

More information

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation) It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The

More information

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis Document Scope This document aims to assist organizations comply with PCI DSS 3 when it comes to Application Security best practices.

More information

Application Security Center overview

Application Security Center overview Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &

More information

Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific Firms

Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific Firms A Forrester Consulting Thought Leadership Paper Commissioned By Digital Realty July 2014 Strategically Source Your Next Data Centre Data Centre Purchasing Drivers, Priorities, and Barriers for Asia-Pacific

More information

Interactive Application Security Testing (IAST)

Interactive Application Security Testing (IAST) WHITEPAPER Interactive Application Security Testing (IAST) The World s Fastest Application Security Software Software affects virtually every aspect of an individual s finances, safety, government, communication,

More information

How To Get Cloud Erp For A Small Business

How To Get Cloud Erp For A Small Business A Custom Technology Adoption Profile Commissioned By Acumatica Cloud ERP: An Adaptable, Consumable, And Flexible Option For Medium-Size Businesses March 2013 Introduction And Key Findings In recent years,

More information

Refresh Your Approach To 1:1 Marketing How Real-Time Automation Elevates Personalization

Refresh Your Approach To 1:1 Marketing How Real-Time Automation Elevates Personalization A Forrester Consulting Thought Leadership Paper Commissioned By Salesforce ExactTarget Marketing Cloud August 2014 Refresh Your Approach To 1:1 Marketing How Real-Time Automation Elevates Personalization

More information

Database-As-A-Service Saves Money, Improves IT Productivity, And Speeds Application Development

Database-As-A-Service Saves Money, Improves IT Productivity, And Speeds Application Development A Forrester Consulting Thought Leadership Paper Commissioned By VMware Database-As-A-Service Saves Money, Improves IT Productivity, And Speeds Application Development October 2012 Table Of Contents Executive

More information

Cross-Channel Attribution Is Needed to Drive Marketing Effectiveness

Cross-Channel Attribution Is Needed to Drive Marketing Effectiveness A Forrester Consulting Thought Leadership Paper Commissioned By Google May 2014 Cross-Channel Attribution Is Needed to Drive Marketing Effectiveness Table of Contents Executive Summary...1 Advanced Measurement

More information

Hybrid Cloud Places New Demands On The Network

Hybrid Cloud Places New Demands On The Network A Custom Technology Adoption Profile Commissioned By Juniper Networks April 2014 Hybrid Cloud Places New Demands On The Network Introduction Today s business pressures require IT resources to be a cost-effective

More information

74% 2014 SIEM Efficiency Survey Report. Hunting out IT changes with SIEM

74% 2014 SIEM Efficiency Survey Report. Hunting out IT changes with SIEM 2014 SIEM Efficiency Survey Report Hunting out IT changes with SIEM 74% OF USERS ADMITTED THAT DEPLOYING A SIEM SOLUTION DIDN T PREVENT SECURITY BREACHES FROM HAPPENING Contents Introduction 4 Survey Highlights

More information

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations

Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations A Custom Technology Adoption Profile Commissioned By VeliQ & SAP January 2014 Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations 1 Introduction The mobile mind shift resulted

More information

The Move Toward Modern Application Platforms

The Move Toward Modern Application Platforms A Custom Technology Adoption Profile Commissioned By Appian December 2014 The Move Toward Modern Application Platforms Introduction Most businesses urgently need to deliver custom applications and lots

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

Web Application Penetration Testing

Web Application Penetration Testing Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel William.Bechtel@att.com

More information

Application security testing: Protecting your application and data

Application security testing: Protecting your application and data E-Book Application security testing: Protecting your application and data Application security testing is critical in ensuring your data and application is safe from security attack. This ebook offers

More information

A Forrester Consulting Thought Leadership Paper Commissioned By Brother. December 2014

A Forrester Consulting Thought Leadership Paper Commissioned By Brother. December 2014 A Forrester Consulting Thought Leadership Paper Commissioned By Brother December 2014 Strategies And Solutions For Secure Webconferencing Choose Deployment Models And Products To Suit Security And Performance

More information

VOLUME 3. State of Software Security Report. The Intractable Problem of Insecure Software

VOLUME 3. State of Software Security Report. The Intractable Problem of Insecure Software VOLUME 3 State of Software Security Report The Intractable Problem of Insecure Software Executive Summary April 19, 2011 Executive Summary The following are some of the most significant findings in the

More information

Accelerate BI Initiatives With Self-Service Data Discovery And Integration

Accelerate BI Initiatives With Self-Service Data Discovery And Integration A Custom Technology Adoption Profile Commissioned By Attivio June 2015 Accelerate BI Initiatives With Self-Service Data Discovery And Integration Introduction The rapid advancement of technology has ushered

More information

Digital Video Advertising - Advantages and Disadvantages

Digital Video Advertising - Advantages and Disadvantages A Forrester Consulting Thought Leadership Paper Commissioned By Teads June 2015 Solving Digital Video Advertising s Premium Dilemma Table Of Contents Executive Summary... 1 Digital Video Advertising Is

More information

A Tidal Wave of Dynamic Web Content Is Coming How Will You Respond?

A Tidal Wave of Dynamic Web Content Is Coming How Will You Respond? A Custom Technology Adoption Profile Commissioned by Riverbed A Tidal Wave of Dynamic Web Content Is Coming How Will You Respond? March 2012 Introduction As enterprises shift from desktop apps to web and

More information

Operationalizing Application Security & Compliance

Operationalizing Application Security & Compliance IBM Software Group Operationalizing Application Security & Compliance 2007 IBM Corporation What is the cost of a defect? 80% of development costs are spent identifying and correcting defects! During the

More information

Cloud Change Agents Drive Business Transformation

Cloud Change Agents Drive Business Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft The Status Of Cloud Computing As A Business Transformation Tool In The UK December 2012 Table Of Contents Executive Summary...

More information

Executive Summary... 2. OpenEdge Streamlines Development and Support... 2. Factors Affecting Benefits And Costs... 3. Disclosures...

Executive Summary... 2. OpenEdge Streamlines Development and Support... 2. Factors Affecting Benefits And Costs... 3. Disclosures... TABLE OF CONTENTS Executive Summary... 2 OpenEdge Streamlines Development and Support... 2 Factors Affecting Benefits And Costs... 3 Disclosures... 3 TEI Framework And Methodology... 5 Analysis... 7 Interview

More information

Customer Cloud Adoption: From Development To The Data Center

Customer Cloud Adoption: From Development To The Data Center A Custom Technology Adoption Profile Commissioned By Dell Customer Cloud Adoption: From Development To The Data Center September 2013 Introduction Where are customers today on their cloud journeys, and

More information

ALERT LOGIC FOR HIPAA COMPLIANCE

ALERT LOGIC FOR HIPAA COMPLIANCE SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare

More information

Capacity Management Benefits For The Cloud

Capacity Management Benefits For The Cloud A Custom Technology Adoption Profile Commissioned By BMC Software November 2014 Capacity Management Benefits For The Cloud Introduction There are many benefits that enterprises can realize by moving workloads

More information

How Organizations Are Improving Business Resiliency With Continuous IT Availability

How Organizations Are Improving Business Resiliency With Continuous IT Availability A Custom Technology Adoption Profile Commissioned By EMC Corporation How Organizations Are Improving Business Resiliency With Continuous IT Availability February 2013 Introduction: Business Stakeholders

More information

Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges

Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges A Custom Technology Adoption Profile Commissioned By Cisco Systems Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges January 2013 Introduction About half of US and European

More information

Future IT Capacity Planning Depends On Flexibility

Future IT Capacity Planning Depends On Flexibility A Custom Technology Adoption Profile Commissioned By HP July 2014 Future IT Capacity Planning Depends On Flexibility Introduction Businesses today depend more than ever on technology systems for both internal

More information

Listening And Engaging In The Digital Marketing Age

Listening And Engaging In The Digital Marketing Age A Forrester Consulting Thought Leadership Paper Commissioned By Dell Companies Progress Their Customer-Centric Approaches And See Positive Business Outcomes July 2011 Table Of Contents Executive Summary...

More information

Fortify. Securing Your Entire Software Portfolio

Fortify. Securing Your Entire Software Portfolio Fortify 360 Securing Your Entire Software Portfolio Fortify Fortify s holistic approach to application security truly safeguards our enterprise against today s ever-changing security threats. Craig Schumard,

More information

Application Security 101. A primer on Application Security best practices

Application Security 101. A primer on Application Security best practices Application Security 101 A primer on Application Security best practices Table of Contents Introduction...1 Defining Application Security...1 Managing Risk...2 Weighing AppSec Technology Options...3 Penetration

More information

A Forrester Consulting Thought Leadership Paper Commissioned By MetaPack. September 2014

A Forrester Consulting Thought Leadership Paper Commissioned By MetaPack. September 2014 A Forrester Consulting Thought Leadership Paper Commissioned By MetaPack September 2014 Boost ecommerce Revenue By Enhancing Delivery Capabilities Retailers Leverage A Multicarrier Strategy To Offer Consumers

More information