The Forrester Wave : Application Security, Q4 2014

Size: px
Start display at page:

Download "The Forrester Wave : Application Security, Q4 2014"

Transcription

1 For: Security & Risk Professionals The Forrester Wave : Application Security, Q by Tyler Shields, December 23,2014 Key Takeaways HP, IBM, Veracode, WhiteHat, Contrast Security, Quotium, And Checkmarx Lead Forrester analyzed the application security testing market (static analysis, dynamic analysis, and instrumented/interactive technologies). The results of the analysis find that HP Fortify, IBM, Veracode, WhiteHat Security, Contrast Security, Quotium, and Checkmarx lead the field. Beyond Security, Coverity, Qualys, and Virtual Forge offer competitive options, while Trend Micro lags behind. S&R Pros Look For Solutions That Emphasize Accuracy, Integration, And Scalability The application security testing market is steadily growing because S&R pros increasingly trust application security testing providers to act as strategic partners, advising them on top app security decisions. Solutions with the highest accuracy of results, best integration points, and the capability to grow and scale will continue to find success. Combining Assessment Methods Provides Differentiation In The Market By combining static, dynamic, and instrumented assessment technologies, vendors are creating a platform-based application security assessment model. Each individual assessment technology contains delivery weaknesses when compared with the others. Access The Forrester Wave Model For Deeper Insight Use the detailed Forrester Wave model to view every piece of data used to score participating vendors and create a custom vendor shortlist. Access the report online and download the Excel tool using the link in the right-hand column under Tools & Templates. Alter Forrester s weightings to tailor the Forrester Wave model to your specifications. Forrester Research, Inc., 60 Acorn Park Drive, Cambridge, MA USA Tel: Fax:

2 December 23, 2014 Why Read This Report The Forrester Wave : Application Security, Q Tools And Technology: The Security Architecture And Operations Playbook by Tyler Shields with Stephanie Balaouras and Jennie Duong In Forrester s 82-criteria evaluation of application security vendors, we identified the 12 most significant service providers in the category Beyond Security, Checkmarx, Contrast Security, Coverity, HP Fortify, IBM, Qualys, Quotium, Trend Micro, Veracode, Virtual Forge, and WhiteHat Security and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help security and risk professionals select the right partner for their application security requirements. Table Of Contents 2 S&R Pros Must Build Security Into The Application Layer 2 Selection Criteria Target Functional Security Capabilities And Strategy Vendors Offer Application Assessment Using Multiple Technologies Notes & Resources Forrester conducted product evaluations in April 2014 and interviewed 12 vendor and user companies: Beyond Security, Checkmarx, Contrast Security, Coverity, HP Fortify, IBM, Qualys, Quotium, Trend Micro, Veracode, Virtual Forge, and WhiteHat Security The Application Security Market Uncovered Vendor Profiles Leaders Strong Performers Contenders Supplemental Material Related Research Documents TechRadar : Enterprise Mobile Security, Q November 3, 2014 It s Time To Level Up Your Mobile Application Security Program August 26, 2014 Address The Top 10 Nontechnical Security Issues In Mobile App Development April 30, , Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView, TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective companies. To purchase reprints of this document, please [email protected]. For additional information, go to

3 The Forrester Wave : Application Security, Q S&R Pros Must Build Security Into The Application Layer Application security remains a crucial component in keeping enterprise servers and data secure. Many firms have rushed to bring applications online, building out consumer-facing websites, buying commercial off-the-shelf (COTS) products, and developing mobile applications to enable and engage with their customers and partners without thinking about the security of the application itself. As a consequence, businesses are exposing their most sensitive corporate and customer data to possible external threats and breaches. Selection Criteria Target Functional Security Capabilities And Strategy S&R pros are looking to work with vendors to detect vulnerabilities more efficiently and effectively, to avoid exposing business-critical security issues, as well as to improve overall business and development efficiency. The vendors assessed meet the growing demand across all businesses without compromising the security needs of their clients operations. After examining the current trends in the market, user needs assessments, and vendor and expert interviews, we developed a comprehensive set of evaluation criteria for application security. We evaluated vendors against 82 criteria, grouped into three high-level categories: Current offering. The vertical axis of the Forrester Wave graphic reflects the strength of each vendor s product offering, including its capabilities in general features (e.g., deployment model, scalability, targeted scanning), static application security testing features, dynamic applications security testing features, instrumented analysis features, reporting features and workflows (e.g., flaw descriptions, centralized policies, and workflow and remediation tracking), developer education and training, integrations (e.g., IDE integration, API access, patches, WAFs, and MDMs), remediation instructions, and customer references. Strategy. The horizontal axis measures the viability and execution of each vendor s strategy, which includes planned enhancements, key technology partners, product focus, target market, cost, average sales prices, maintenance costs, and pricing structure. Market presence. The size of each vendor s bubble on the Forrester Wave graphic represents each vendor s presence in the application security market, based on its installed customer and product base, revenue, systems integrators, services, number of employees, and key technology partners. Vendors Offer Application Assessment Using Multiple Technologies Forrester included 12 vendors in the assessment: Beyond Security, Checkmarx, Contrast Security, Coverity, HP Fortify, IBM, Qualys, Quotium, Trend Micro, Veracode, Virtual Forge, and WhiteHat Security. Each of these vendors has (see Figure 1):

4 The Forrester Wave : Application Security, Q Mindshare with Forrester s clients. Vendors included are frequently mentioned in Forrester client inquiries and other forms of client engagement relating to application security. Ability to offer SAST, DAST, and/or IAST capabilities. The vendors evaluated offer comprehensive approaches in static analysis (SAST), dynamic analysis (DAST), and instrumented/ interactive technologies (IAST) techniques in order to detect weaknesses and vulnerabilities in general code, web applications, mobile applications, and COTS product offerings. Ability to provide easy deployment and integration for its customers. All vendors evaluated could deploy either a scalable on-premises or cloud-based service to their customers. Vendors were focused on improving the security development life cycle for the enterprise buyer by creating a solution that integrated into existing models of analysis and third-party development tools. Relevance to the application security market. Inclusion in this Forrester Wave means that the vendor actively competes in the application security market, showing up in competitive use cases and discussions among experts and Forrester clients.

5 The Forrester Wave : Application Security, Q Figure 1 Evaluated Vendors: Product Information And Selection Criteria Evaluated vendors Product evaluated Product version Beyond Security AVDS 4.00 build 307 Checkmarx Contrast Security Coverity HP Fortify IBM Qualys Quotium CxSuite Contrast Enterprise* 3.1 Code Advisor 7.5 HP Applications Security Portfolio (includes: HP Fortify Software Security Center, HP Fortify Static Code Analyzer, HP WebInspect, HP Fortify on Demand, and HP Application Defender)* IBM Security AppScan Standard, Enterprise, and Source N/A Qualys Web Application Scanning 3.2 Seeker 3.0 Trend Micro Veracode Deep Security for Web Apps* Veracode Platform* N/A N/A Virtual Forge WhiteHat Security CodeProfiler 3.5 WhiteHat Sentinel WhiteHat Sentinel Source* N/A Vendor selection criteria Mindshare with Forrester s clients. Vendors included are frequently mentioned in Forrester client inquiries and other forms of client engagement relating to application security. Ability to offer SAST, DAST, and/or IAST capabilities. The vendors evaluated, offer comprehensive approaches in SAST, DAST, or IAST techniques in order to detect weakness and vulnerabilities in general code, web applications, mobile applications, and COTS product offerings. Ability to provide easy deployment and integration for its customers. All vendors evaluated could deploy either a scalable on-premises or cloud-based service to their customers. Vendors were focused on improving the security development life cycle for the enterprise buyer by creating a solution that integrated into existing models of analysis and third party development tools. Relevance to the application security market. Inclusion in this Forrester Wave means that the vendor actively competes in the application security market, showing up in competitive use cases and discussions among experts and Forrester clients. Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited.

6 The Forrester Wave : Application Security, Q The Application Security Market Uncovered The evaluation uncovered a market in which a platform approach strengthens the limitations of each assessment model, raising the importance of a multitechnology approach. Vendors that built a platform leveraging DAST, SAST, and even IAST saw higher marks than those vendors that focus on one or two technology sets (see Figure 2): HP, IBM, Veracode, WhiteHat, Contrast Security, Quotium, and Checkmarx lead. While each vendor designed and built its original solution from a different technology starting point, the end result for each of these vendors is a cross-technology solution. When sorted by technology cut, each vendor in this section excels at more than one solution, giving it the ability to increase the accuracy of its results. Beyond Security, Coverity, Qualys, and Virtual Forge offer competitive options. Competitive offerings from these vendors tended to focus on one specific area (DAST, SAST, or IAST) of the cross-platform solution. These vendors are working toward building an integrated platform but have yet to improve their nondominant offerings to the strength level that puts them in the upper echelon. These vendors should be chosen specifically if their dominant technology area is of a stronger concern to the buyer than the nondominant technologies. Trend Micro is building up momentum from a late market entry. As a late market entry, Trend Micro is lagging behind the other vendors in the space. Focused predominantly on DAST assessments from the cloud, Trend Micro must expand beyond a single technology-based solution in order to remain relevant to the enterprise buyer. The level of resources available for continued innovation keeps Trend Micro in the picture if it can maintain its current pace of advancement. This evaluation of the application security market is intended to be a starting point only. We encourage clients to view detailed product evaluations and adapt criteria weightings to fit their individual needs through the Forrester Wave Excel-based vendor comparison tool.

7 The Forrester Wave : Application Security, Q Figure 2 Forrester Wave : Application Security, Q Strong Current offering Risky Strong bets Contenders performers Leaders IBM HP Fortify Contrast Security Veracode WhiteHat Security Quotium Checkmarx Virtual Forge Beyond Security Qualys Go to Forrester.com to download the Forrester Wave tool for more detailed product evaluations, feature comparisons, and customizable rankings. Trend Micro Coverity Market presence Weak Weak Strategy Strong Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited.

8 The Forrester Wave : Application Security, Q Figure 2 Forrester Wave : Application Security, Q (Cont.) Forrester s weighting Beyond Security Checkmarx Contrast Security Coverity HP Fortify IBM Qualys Quotium Trend Micro Veracode Virtual Forge WhiteHat Security CURRENT OFFERING General features Static analysis features Dynamic analysis features Instrumented analysis features Reporting features and workflow Developer education and training Integrations Remediation instructions Customer references STRATEGY Product strategy Corporate strategy Cost MARKET PRESENCE Installed base Revenue growth quarter over quarter Revenue growth year over year Systems integrators Services Employees Technology partners 50% 21% 22% 22% 5% 10% 5% 5% 10% 0% 50% 50% 50% 0% 0% 40% 0% 0% 15% 15% 15% 15% All scores are based on a scale of 0 (weak) to 5 (strong). Source: Forrester Research, Inc. Unauthorized reproduction or distribution prohibited. Vendor Profiles Leaders HP Fortify offers an extensive application security solution. HP Fortify displayed strong capabilities across the majority of our criteria in both static and dynamic analysis. Its product combines comprehensive static and dynamic testing and management across a multitude of languages and frameworks that allow customers to deploy and scale quickly. Customer

9 The Forrester Wave : Application Security, Q references were satisfied with the vendor s ease of installation, ease of use, configurable scans, and administration; one customer reference was very happy with the SDLC-based dynamic application security program built around HP WebInspect and would recommend it to any other organization, even those with rapid development/agile life cycles. Although HP Fortify has more than 4,000 customers of its application security products (on-premises and cloudbased), we noted that fewer than 500 customers were added in the past year. IBM s focus on the developer integration leads to exceptional results. The IBM product offering provides extensive general features on both on-premises and on-demand application security solutions, depending on customer needs. The solution offers limited static analysis features, for data identification, and runtime data tracking. The DAST offering is wellpositioned for web application discovery, Internet-sourced scanning, internal network scanning, and large-scale assessment. IBM has a long lineage in development and has one of the strongest integrations with other product lines and third-party development tools and services. IBM approaches the security market with a developer-centric message and product strategy focus. Veracode unifies the SAST and DAST platform with accurate and timely results. Veracode offers a unified cloud-based security SAST and DAST platform that includes capabilities for developer workflow integration, central policy management, security analytics and benchmarking, compliance reporting, and workflow management; differentiators include mobile behavioral analysis and third-party assessments. Veracode has the capability to simultaneously scan thousands of websites through its web perimeter monitoring scanning service while providing high scalability for static binary assessments. With strong results in both SAST and DAST segments, Veracode delivers a high level of accuracy in its technical findings while embracing a customer-centric approach to integration into the greater development workflow WhiteHat Security, although smaller than its competitors, innovates well. Although this vendor s dedicated research team is somewhat smaller than those of the other Leaders, the vendor s overall SAST and DAST capabilities, coupled with its unified SaaS platform, has gained a large customer base ranging from startups to large enterprise companies. WhiteHat Security provides efficient deployment and scalability, frequent scanning updates, and configurable rules and scanning capabilities. While WhiteHat Security offers both SAST and DAST services, its DAST capabilities are more comprehensive and can conduct continuous concurrent scanning of tens of thousands of web applications. Contrast Security is a small vendor making big advancements in application security. Although this vendor doesn t neatly fall into either the static or dynamic categories, as outlined in our application security evaluation, Contrast Security provides an up-and-coming offering that makes it a new and innovative contender (since 2012) to the application security space. The Contrast Security solution is instrumented via HTTP requests and responses like a dynamic tool; contains source code and binary code analysis like a static tool; and has an on-server agent like an

10 The Forrester Wave : Application Security, Q interactive tool. The vendor uses a combination of techniques to provide an effective and detailed analysis for its customers. Contrast Security can autodiscover applications located on a specific server and continually assess the security of these applications in real time. Since the technology is young, there are a few minor configuration options that are lacking; however, the assessment technique is unique enough to warrant interest from forward-thinking enterprise buyers. Quotium innovating in the area of instrumented assessment results in a unique approach. Another vendor innovating in the space of application security, Quotium has created a solution that doesn t cleanly fit into the SAST and DAST models of assessment, instead targeting a runtime continuous assessment model by using instrumented analysis. The product s runtime analysis technology hooks into the application processes and monitors all code execution, while simulating user, and hacker, traffic to the application. Quotium is an ideal product for enterprises looking for simultaneous testing across a multitude of users and servers, with a centralized repository in various test environments (e.g., AWS, Microsoft Azure, and Rackspace). Customers looking into this solution should note that while Quotium s Seeker is not a DAST or SAST solution, it does have several unique capabilities that accomplish reasonable dynamic and static results using a unique methodology. Checkmarx delivers SAST directly while offering DAST through partners. Checkmarx s solution has strong functional capabilities in deployment, concurrent use, scanning automation, configurable rules and scans, targeted scanning, and multiple user support. General features that the vendor must continue to improve upon include scalability, false positive elimination, and flexible scanning functionality. The Checkmarx offering has strong static analysis features around source code scanning, varied language and framework support, analysis levels, and custom static analysis rules. However, the solution is limited due to an inability to deliver dynamic assessment directly. Instead, Checkmarx looks to partners to deliver the DAST section of its product suite. Strong Performers Beyond Security offers a competitive hybrid option/deployment for its customers. Customers that require easy deployment across multiple environments should consider looking into Beyond Security as a viable dynamic assessment option. Not only is Beyond Security s solution available as a self-contained appliance and hosted (cloud) solution, but it also has a hybrid offering (on-site scanner managed by a cloud-based management system) for its customers. Beyond Security s solution offers competitive dynamic analysis features that support application discovery, Internet-sourced scanning, and internal scanning with either an appliance or VM. However, the solution does not support custom dynamic analysis rules or private data identification. Beyond Security does not offer SAST capabilities in its product suite.

11 The Forrester Wave : Application Security, Q Coverity has a general platform for SAST code analysis but lacks dynamic capabilities. Coverity s strength lies in its general features including scanning automation, targeted scanning, multiclass administration, and false positive elimination. Coverity static analysis can analyze byte code for data analysis in Java applications but has little to no functionality in binary scanning and static interactive testing (e.g., code behavior testing and runtime data tracking). Coverity does not support any features to run dynamic analysis. Qualys gets aggressive in product strategy and expands into application security market. Qualys has traditionally been considered a strong vulnerability assessment vendor, providing continuous security assessment for network-based attacks. Qualys has augmented its technology by moving up the stack into the application assessment realm. The solution offers dynamic analysis features such as application discovery, Internet-sourced scanning, high scalability, and appliance/virtual machine support. Although Qualys solution does not support static code analysis, its solution is ideal for customers looking to automate continuous dynamic assessments of target environments. Qualys is gaining in market share and was one of the few vendors to show a significant amount of new enterprise customer growth in the past year. Forrester expects that with new enhancements in its security portfolio, Qualys may become a more direct force in the DAST space in Virtual Forge extensively secures SAP-specific content but is limited in other features. Virtual Forge s application security solution contains both a cloud-based and on-premises deployment model that has capabilities including concurrent use and configurable rules for source code scanning. Virtual Forge s solution has limited features available for static analysis testing. The solution analyzes the source code of SAP applications only, limiting the product s marketability. The offering is unable to fully support static binary scanning, business logic flaws, and interactive testing. Virtual Forge s product uses open penetration testing frameworks (Metasploit) to do dynamic analysis and scanning, and SAP-specific content is layered on top of these open source tools. Virtual Forge has the most comprehensive product in the space for securing SAP source code; however, you will have to look elsewhere for other languages and features. Contenders Trend Micro is a new entrant to the market and has some catching up to do. Trend Micro is a new vendor to the application security market. In Forrester s evaluation, Trend Micro was one of a few vendors that did not support any SAST capabilities whatsoever, instead focusing only on DAST support from a cloud-only offering. Trend Micro is still developing its product capabilities and strategies and has a robust team with over 1,000 dedicated researchers (including global application security experts) focused on emerging threats and vulnerabilities. The Trend Micro offering is a cloud-based service that can dynamically scale to meet enterpriselevel demands but requires some more time in the market before it gains significant traction.

12 The Forrester Wave : Application Security, Q Supplemental Material Online Resource The online version of Figure 2 is an Excel-based vendor comparison tool that provides detailed product evaluations and customizable rankings. Data Sources Used In This Forrester Wave Forrester used a combination of three data sources to assess the strengths and weaknesses of each solution: Vendor surveys. Forrester surveyed vendors on their capabilities as they relate to the evaluation criteria. Once we analyzed the completed vendor surveys, we conducted vendor calls where necessary to gather details of vendor qualifications. Product demos. We asked vendors to conduct demonstrations of their product s functionality. We used findings from these product demos to validate details of each vendor s product capabilities. Customer reference calls. To validate product and vendor qualifications, Forrester also conducted reference calls with three of each vendor s current customers. The Forrester Wave Methodology We conduct primary research to develop a list of vendors that meet our criteria to be evaluated in this market. From that initial pool of vendors, we then narrow our final list. We choose these vendors based on: 1) product fit; 2) customer success; and 3) Forrester client demand. We eliminate vendors that have limited customer references and products that don t fit the scope of our evaluation. After examining past research, user need assessments, and vendor and expert interviews, we develop the initial evaluation criteria. To evaluate the vendors and their products against our set of criteria, we gather details of product qualifications through a combination of lab evaluations, questionnaires, demos, and/or discussions with client references. We send evaluations to the vendors for their review, and we adjust the evaluations to provide the most accurate view of vendor offerings and strategies. We set default weightings to reflect our analysis of the needs of large user companies and/or other scenarios as outlined in the Forrester Wave document and then score the vendors based on a clearly defined scale. These default weightings are intended only as a starting point, and we encourage readers to adapt the weightings to fit their individual needs through the Excel-based tool. The final scores generate the graphical depiction of the market based on current offering, strategy, and market presence. Forrester intends to update vendor evaluations regularly as product

13 The Forrester Wave : Application Security, Q capabilities and vendor strategies evolve. For more information on the methodology that every Forrester Wave follows, go to Integrity Policy All of Forrester s research, including Waves, is conducted according to our Integrity Policy. For more information, go to Endnotes 1 Source: Qualys Announces Third Quarter 2014 Financial Results, Qualys press release, November 3, 2014 (

14 About Forrester A global research and advisory firm, Forrester inspires leaders, informs better decisions, and helps the world s top companies turn the complexity of change into business advantage. Our researchbased insight and objective advice enable IT professionals to lead more successfully within IT and extend their impact beyond the traditional IT organization. Tailored to your individual role, our resources allow you to focus on important business issues margin, speed, growth first, technology second. for more information To find out how Forrester Research can help you be successful every day, please contact the office nearest you, or visit us at For a complete list of worldwide locations, visit Client support For information on hard-copy or electronic reprints, please contact Client Support at , , or [email protected]. We offer quantity discounts and special pricing for academic and nonprofit institutions. Forrester Focuses On Security & Risk Professionals To help your firm capitalize on new business opportunities safely, you must ensure proper governance oversight to manage risk while optimizing security processes and technologies for future flexibility. Forrester s subject-matter expertise and deep understanding of your role will help you create forward-thinking strategies; weigh opportunity against risk; justify decisions; and optimize your individual, team, and corporate performance. «Sean Rhodes, client persona representing Security & Risk Professionals Forrester Research (Nasdaq: FORR) is a global research and advisory firm serving professionals in 13 key roles across three distinct client segments. Our clients face progressively complex business and technology decisions every day. To help them understand, strategize, and act upon opportunities brought by change, Forrester provides proprietary research, consumer and business data, custom consulting, events and online communities, and peer-to-peer executive programs. We guide leaders in business technology, marketing and strategy, and the technology industry through independent fact-based insight, ensuring their business success today and tomorrow

The Forrester Wave : Application Release Automation, Q2 2015

The Forrester Wave : Application Release Automation, Q2 2015 For: Infrastructure & Operations Professionals The Forrester Wave : Application Release Automation, Q2 2015 by Amy DeMartine and Kurt Bittner, April 14, 2015 Key Takeaways I&O Pros Are Turning Toward Release

More information

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015

The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 For: Marketing Leadership Professionals The Forrester Wave : Digital Agencies In China Strategy And Execution, Q1 2015 by Xiaofeng Wang, January 27, 2015 Key Takeaways OgilvyOne, Isobar, And Razorfish

More information

The Forrester Wave : Bid Management Software Providers, Q4 2012

The Forrester Wave : Bid Management Software Providers, Q4 2012 FOR: Interactive Marketing Professionals The Forrester Wave : Bid Management Software Providers, Q4 2012 by shar VanBoskirk, november 16, 2012 Key TaKeaWays software solutions exist To help scale paid

More information

The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014

The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014 For: Infrastructure & Operations Professionals The Forrester Wave : Traditional Disaster Recovery Service Providers, Q1 2014 by Rachel A. Dines, January 17, 2014 Key Takeaways Firms Look To Outsourced

More information

The Forrester Wave : Loyalty Program Service Providers, Q4 2013

The Forrester Wave : Loyalty Program Service Providers, Q4 2013 For: Customer Insights Professionals The Forrester Wave : Loyalty Program Service Providers, Q4 2013 by Emily Collins, October 30, 2013 Key Takeaways Loyalty Service Providers Don t Just Support Points

More information

The Forrester Wave : SEO Platforms, Q4 2012

The Forrester Wave : SEO Platforms, Q4 2012 FOR: Interactive Marketing Professionals The Forrester Wave : SEO Platforms, Q4 2012 by shar VanBoskirk, October 31, 2012 key TakeaWays seo isn t Just about agencies anymore Search marketers have traditionally

More information

The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals

The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals December 1, 2011 The Forrester Wave : IT Governance, Risk, And Compliance Platforms, Q4 2011 by Chris McClean for Security & Risk Professionals Making Leaders Successful Every Day December 1, 2011 The

More information

The Forrester Wave : Web Analytics, Q2 2014

The Forrester Wave : Web Analytics, Q2 2014 For: Customer Insights Professionals The Forrester Wave : Web Analytics, Q2 2014 by James McCormick, May 13, 2014 Key Takeaways Adobe, AT Internet, IBM, And Webtrends Are Leaders In Enterprise Web Analytics

More information

How To Choose An Itsm Software As A Service (Saas) From A List Of Vendors

How To Choose An Itsm Software As A Service (Saas) From A List Of Vendors For: Infrastructure & Operations Professionals The Forrester Wave : ITSM SaaS Delivery Capabilities, Q3 2014 by Amy DeMartine, July 28, 2014 Key Takeaways The ITSM SaaS Market Is Growing, But Delivery

More information

The Forrester Wave : Customer Analytics Solutions, Q4 2012

The Forrester Wave : Customer Analytics Solutions, Q4 2012 FOR: Customer Intelligence Professionals The Forrester Wave : Customer Analytics Solutions, Q4 2012 by srividya sridharan, October 26, 2012 key TakeaWays Customer analytics Users Want help across The analytics

More information

The Forrester Wave : Online Video Platforms, Q1 2013

The Forrester Wave : Online Video Platforms, Q1 2013 For: Application Development & Delivery professionals The Forrester Wave : Online Video Platforms, Q1 2013 by philipp Karcher, march 8, 2013 key TakeaWays Businesses use Video platforms To Manage Their

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals NetQoS Offers An Experience Monitoring Solution For Global Performance Management The Forrester Wave Vendor Summary, Q2 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D., and Reedwan Iqbal EXECUTIVE

More information

The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013

The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013 For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Backup And Recovery Software, Q2 2013 by Rachel A. Dines, June 28, 2013 KEY TAKEAWAYS Plagued By Age-Old Backup And Recovery

More information

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011

May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 May 6, 2011 The Forrester Wave : Database Auditing And Real-Time Protection, Q2 2011 by Noel Yuhanna for Application Development & Delivery Professionals Making Leaders Successful Every Day May 6, 2011

More information

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007

September 27, 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 PremiTech s Passive End User Experience Monitoring Agent Is Performance-Oriented The Forrester Wave Vendor Summary, Q3 2007 by Jean-Pierre Garbani with Thomas Mendel, Ph.D. and Reedwan Iqbal EXECUTIVE

More information

ebay Enterprise Is A Strong Performer Among Omnichannel Order

ebay Enterprise Is A Strong Performer Among Omnichannel Order For ebusiness & Channel Strategy Professionals July 29, 2014 ebay Enterprise Is A Performer Among Omnichannel Order Management Vendors Excerpted From The Forrester Wave : Omnichannel Order Management,

More information

The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015

The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015 For: Enterprise Architecture Professionals The Forrester Wave : Enterprise Architecture Service Providers, Q1 2015 by Henry Peyret and Gordon Barnett, March 19, 2015 Key Takeaways The EA Service Provider

More information

The Forrester Wave : Enterprise Mobile Management, Q3 2014

The Forrester Wave : Enterprise Mobile Management, Q3 2014 For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Mobile Management, Q3 2014 by Christian Kane, Tyler Shields, September 30, 2014 Key Takeaways IBM, Citrix, MobileIron, AirWatch

More information

April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008. by Evelyn Hubbert for IT Infrastructure & Operations Professionals

April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008. by Evelyn Hubbert for IT Infrastructure & Operations Professionals April 15, 2008 The Forrester Wave : Data Center Automation, Q2 2008 by Evelyn Hubbert for IT Infrastructure & Operations Professionals Making Leaders Successful Every Day Includes a Forrester Wave April

More information

The Forrester Wave : SaaS HR Management Systems, Q4 2014

The Forrester Wave : SaaS HR Management Systems, Q4 2014 For: Applications Development & Delivery Professionals The Forrester Wave : SaaS HR Management Systems, Q4 2014 by Paul D. Hamerman, October 1, 2014 Key Takeaways SaaS HRMS Is Growing Rapidly As A Migration

More information

The Forrester Wave : Cross-Channel Campaign Management, Q3 2014

The Forrester Wave : Cross-Channel Campaign Management, Q3 2014 For: Customer Insights Professionals The Forrester Wave : Cross-Channel Campaign Management, Q3 2014 by Jason McNellis, August 28, 2014 Key Takeaways The Cross-Channel Campaign Market Is Complex The campaign

More information

The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014

The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014 For: Customer Insights Professionals The Forrester Wave : Cross-Channel Attribution Providers, Q4 2014 by Tina Moffett, November 7, 2014 Key Takeaways AOL/Convertro, Google, And Visual IQ Lead The Pack

More information

The Forrester Wave : Enterprise Mobile Management, Q4 2015

The Forrester Wave : Enterprise Mobile Management, Q4 2015 The Forrester Wave : Enterprise Mobile Management, Q4 2015 by Christian Kane Why Read This Report In Forrester s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the

More information

The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014

The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014 For: Security & Risk Professionals The Forrester Wave : Governance, Risk, And Compliance Platforms, Q1 2014 by Christopher McClean, Nick Hayes, and Renee Murphy, January 27, 2014 Key Takeaways It s No

More information

The Enterprise Information Management Barbell Strengthens Your Information Value

The Enterprise Information Management Barbell Strengthens Your Information Value July 15, 2013 The Enterprise Information Management Barbell Strengthens Your Information Value by Alan Weintraub with Leslie Owens and Emily Jedinak Why Read This Report Businesses increasingly rely on

More information

The Forrester Wave : API Management Solutions, Q3 2014

The Forrester Wave : API Management Solutions, Q3 2014 For: Application Development & Delivery Professionals The Forrester Wave : API Management Solutions, Q3 2014 by Randy Heffner, September 29, 2014 Key Takeaways CA Technologies, SOA Software, And Apigee

More information

The Forrester Wave : VMS, Q1 2014

The Forrester Wave : VMS, Q1 2014 For: Sourcing & Vendor Management Professionals The Forrester Wave : VMS, Q1 2014 by Christine Ferrusi Ross, February 10, 2014 Key Takeaways A Maturing Market Means Running Faster To Stay In Place This

More information

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals

EXECUTIVE SUMMARY. For IT Infrastructure & Operations Professionals Blue Coat Systems Adds Security And Control To WAN Optimization Appliances The Forrester Wave Vendor Summary, Q3 2007 by Robert Whiteley with Simon Yates and Rachel Batiancila EXECUTIVE SUMMARY Blue Coat

More information

The Business Impact Of Customer Experience, 2014

The Business Impact Of Customer Experience, 2014 For: Customer Experience Professionals The Business Impact Of Customer Experience, 2014 by Maxie Schmidt-Subramanian, March 27, 2014 Key Takeaways Customer Experience Correlates To Loyalty Forrester once

More information

The Forrester Wave : Innovation Agencies, Q4 2014

The Forrester Wave : Innovation Agencies, Q4 2014 For: CMOs The Forrester Wave : Innovation Agencies, Q4 2014 by Sarah Sikowitz, December 8, 2014 Key Takeaways SapientNitro, R/GA, And Frog Lead The Pack Forrester s research uncovered a market in which

More information

The Forrester Wave : Enterprise Listening Platforms, Q1 2014

The Forrester Wave : Enterprise Listening Platforms, Q1 2014 For: Customer Insights Professionals The Forrester Wave : Enterprise Listening Platforms, Q1 2014 by Allison Smith, January 22, 2014 Key Takeaways Listening Platforms Have Expanded Their Capabilities Enterprise

More information

March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals

March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals March 4, 2011 The Forrester Wave : Message Archiving Software, Q1 2011 by Brian W. Hill for Content & Collaboration Professionals Making Leaders Successful Every Day March 4, 2011 The Forrester Wave :

More information

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester)

How To Compare The Profit From Aaas To Onpremise On A Computer Or A Server Or Server (Forrester) September 20, 2006 Comparing The ROI Of SaaS Versus On-Premise Using Forrester s TEI Approach by R Ray Wang TECH CHOICES Helping Business Thrive On Technology Change TECH CHOICES Includes a TEI model and

More information

The Forrester Wave : Identity And Access Management Suites, Q3 2013

The Forrester Wave : Identity And Access Management Suites, Q3 2013 For: Security & Risk Professionals The Forrester Wave : Identity And Access Management Suites, Q3 2013 by Andras Cser and Eve Maler, September 4, 2013 KEY TAKEAWAYS The Old Boundaries Are Gone -- Enterprise

More information

The Forrester Wave : Social Advertising Platforms, Q4 2013

The Forrester Wave : Social Advertising Platforms, Q4 2013 For: Marketing Leadership Professionals The Forrester Wave : Social Advertising Platforms, Q4 2013 by Zachary Reiss-Davis, December 17, 2013 Key Takeaways Marketers Spend On Social Ads But Need Third-Party

More information

Which Managed Hosting And Private Hosted Cloud Option Is Right For You?

Which Managed Hosting And Private Hosted Cloud Option Is Right For You? A Forrester Consulting June 2014 Thought Leadership Paper Commissioned By AT&T Which Managed Hosting And Private Hosted Cloud Option Is Right For You? Table Of Contents Executive Summary... 1 Select The

More information

The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014

The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014 For: Infrastructure & Operations Professionals The Forrester Wave : On-Premises Unified Communications And Collaboration, Q2 2014 by Christopher Voce and Art Schoeller, June 26, 2014 Key Takeaways System

More information

The Forrester Wave : Financial Performance Management, Q3 2013

The Forrester Wave : Financial Performance Management, Q3 2013 For: Application Development & Delivery Professionals The Forrester Wave : Financial Performance Management, Q3 2013 by Paul D. Hamerman, September 11, 2013 Key Takeaways FPM Solutions Boost Forecasting

More information

May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008

May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008 May 30, 2008 The Forrester Wave : Requirements Management, Q2 2008 by Carey Schwaber and Mary Gerush for Application Development & Program Management Professionals Making Leaders Successful Every Day Includes

More information

April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011

April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011 April 25, 2011 The Forrester Wave : Enterprise Service Bus, Q2 2011 by Ken Vollmer for Application Development & Delivery Professionals Making Leaders Successful Every Day April 25, 2011 The Forrester

More information

Benefits Of Leveraging The Cloud Extend To Master Data Management

Benefits Of Leveraging The Cloud Extend To Master Data Management A Custom Technology Adoption Profile Commissioned By Liaison Technologies April 2014 Benefits Of Leveraging The Cloud Extend To Master Data Management Introduction It is extremely difficult to imagine

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day October 6, 2008 The Forrester Wave : Integration-Centric Business Process Management Suites, Q4 2008 by Ken Vollmer for Enterprise Architecture Professionals Making Leaders Successful Every Day Includes

More information

The Forrester Wave : Master Data Management Solutions, Q1 2014

The Forrester Wave : Master Data Management Solutions, Q1 2014 For: Enterprise Architecture Professionals The Forrester Wave : Master Data Management Solutions, Q1 2014 by Michele Goetz, February 3, 2014 Key Takeaways Multiplatform MDM Conducts The Data Orchestra

More information

The Forrester Wave : Enterprise File Sync And Share Platforms, Hybrid Solutions, Q2 2016

The Forrester Wave : Enterprise File Sync And Share Platforms, Hybrid Solutions, Q2 2016 The Forrester Wave : Enterprise File Sync And Share Platforms, Hybrid Solutions, Q2 2016 by Cheryl McKinnon Why Read This Report In our 37-criteria evaluation of enterprise file sync and share (EFSS) providers

More information

The Forrester Wave : Real-Time Interaction Management, Q3 2015

The Forrester Wave : Real-Time Interaction Management, Q3 2015 The Forrester Wave : Real-Time Interaction Management, Q3 2015 by Rusty Warner Why Read This Report In Forrester s 35-criteria evaluation of real-time interaction management (RTIM) vendors, we identified

More information

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors

Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors January 13, 2015 Accenture Is A Leader Among Global Infrastructure Outsourcing Vendors Excerpted From The Forrester Wave : Global Infrastructure Outsourcing, Q1 2015 by William Martorelli and Wolfgang

More information

Endpoint Security Trends, Q2 2013 To Q4 2014

Endpoint Security Trends, Q2 2013 To Q4 2014 For: Security & Risk Professionals Endpoint Security Trends, Q2 2013 To Q4 2014 by Chris Sherman, November 7, 2013 KEY TAKEAWAYS Organizations Spend 9% Of Their IT Budget On Endpoint Security SMBs and

More information

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009

December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 December 23, 2009 The Forrester Wave : Email Marketing Service Providers, Q4 2009 by Carlton A. Doty and Julie M. Katz for Interactive Marketing Professionals Making Leaders Successful Every Day Includes

More information

April 4, 2008 The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington

April 4, 2008 The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington The Five Essential Metrics For Managing IT by Craig Symons with Alexander Peters, Alex Cullen, and Brandy Worthington EXECUTIVE SUMMARY CIOs frequently ask what IT should measure and report to business

More information

The Forrester Wave : Enterprise Marketing Software Suites, Q4 2014

The Forrester Wave : Enterprise Marketing Software Suites, Q4 2014 For: Customer Insights Professionals The Forrester Wave : Enterprise Marketing Software Suites, Q4 2014 by Cory Munchbach and Rusty Warner, October 21, 2014 Key Takeaways Adobe And Salesforce.com Take

More information

Understand Communication Channel Needs To Craft Your Customer Service Strategy

Understand Communication Channel Needs To Craft Your Customer Service Strategy For: ebusiness and Channel strategy Professionals Understand Communication Channel Needs To Craft Your Customer Service Strategy by Kate leggett, march 11, 2013 Key TaKeaWays The Majority of Consumers

More information

October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals

October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals October 6, 2011 The Forrester Wave : Web Analytics, Q4 2011 by Joe Stanhope for Customer Intelligence Professionals Making Leaders Successful Every Day October 6, 2011 The Forrester Wave : Web Analytics,

More information

Making Leaders Successful Every Day

Making Leaders Successful Every Day July 8, 2008 The Forrester Wave : Functional Testing Solutions, Q3 2008 by Carey Schwaber and Mike Gualtieri for Application Development & Program Management Professionals Making Leaders Successful Every

More information

The Forrester Wave : Service Virtualization And Testing Solutions, Q1 2014

The Forrester Wave : Service Virtualization And Testing Solutions, Q1 2014 For: Application Development & Delivery Professionals The Forrester Wave : Service Virtualization And Testing Solutions, Q1 2014 by Diego Lo Giudice, January 27, 2014 Key Takeaways SVT Tools Can Make Developers

More information

Capacity Management Benefits For The Cloud

Capacity Management Benefits For The Cloud A Custom Technology Adoption Profile Commissioned By BMC Software November 2014 Capacity Management Benefits For The Cloud Introduction There are many benefits that enterprises can realize by moving workloads

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals

September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals September 21, 2011 The Forrester Wave : Marketing Mix Modeling, Q3 2011 by Luca S. Paderni for CMO & Marketing Leadership Professionals Making Leaders Successful Every Day September 21, 2011 The Forrester

More information

A Forrester Consulting Thought Leadership Paper Commissioned By Brother. December 2014

A Forrester Consulting Thought Leadership Paper Commissioned By Brother. December 2014 A Forrester Consulting Thought Leadership Paper Commissioned By Brother December 2014 Strategies And Solutions For Secure Webconferencing Choose Deployment Models And Products To Suit Security And Performance

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

The Forrester Wave : Endpoint Security, Q1 2013

The Forrester Wave : Endpoint Security, Q1 2013 For: Security & risk Professionals The Forrester Wave : Endpoint Security, Q1 2013 by chenxi Wang, Ph.D. and chris Sherman, January 4, 2013 key TakeaWays endpoint security competency is crucial To your

More information

Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations

Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations A Custom Technology Adoption Profile Commissioned By VeliQ & SAP January 2014 Managed Mobility Cloud Services Gain Momentum With European Midmarket Organizations 1 Introduction The mobile mind shift resulted

More information

The Forrester Wave : Mobile Front-End Test Automation Tools, Q2 2016

The Forrester Wave : Mobile Front-End Test Automation Tools, Q2 2016 The Forrester Wave : Mobile Front-End Test Automation Tools, Q2 2016 by John M. Wargo and Diego Lo Giudice Why Read This Report In our 40-criteria evaluation of mobile front-end test automation tools,

More information

Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges

Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges A Custom Technology Adoption Profile Commissioned By Cisco Systems Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges January 2013 Introduction About half of US and European

More information

The Forrester Wave : B2E Cloud IAM, Q2 2015

The Forrester Wave : B2E Cloud IAM, Q2 2015 For: Security & Risk Professionals The Forrester Wave : B2E Cloud IAM, Q2 2015 by Andras Cser and Merritt Maxim, June 29, 2015 Key Takeaways OneLogin And Okta Lead The Pack Forrester s research uncovered

More information

Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice

Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice A Custom Technology Adoption Profile Commissioned By Dell November 2014 Cloud Without Limits: How To Deliver Hybrid Cloud With Agility, Governance, And Choice Introduction With more and more business applications

More information

The Forrester Wave : Emerging Managed Security Service Providers, Q1 2013

The Forrester Wave : Emerging Managed Security Service Providers, Q1 2013 FOR: Security & Risk Professionals The Forrester Wave : Emerging Managed Security Service Providers, Q1 2013 by Ed Ferrara and nick Hayes, January 8, 2013 Key TaKeaWays emerging Mssps have laudable Capabilities,

More information

Records Management And Hybrid Cloud Computing: Transforming Information Governance

Records Management And Hybrid Cloud Computing: Transforming Information Governance A Custom Technology Adoption Profile Commissioned By April 2014 Records Management And Hybrid Cloud Computing: Transforming Information Governance 1 Introduction Organizations are under extreme pressure

More information

How To Evaluate Human Resource Management Systems

How To Evaluate Human Resource Management Systems January 25, 2012 The Forrester Wave : Human Resource Management Systems, Q1 2012 by Paul D. Hamerman for Business Process Professionals Making Leaders Successful Every Day January 25, 2012 The Forrester

More information

Safeguarding the cloud with IBM Dynamic Cloud Security

Safeguarding the cloud with IBM Dynamic Cloud Security Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from

More information

The Forrester Wave : Managed Security Services: North America, Q1 2012

The Forrester Wave : Managed Security Services: North America, Q1 2012 FOR: Security & Risk Professionals The Wave : Managed Security Services: North America, Q1 2012 by Ed Ferrara, March 26, 2012 key TakeaWays Mssps don t simply Cut Costs, They Can enhance your security

More information

The Business Impact Of Customer Experience, 2013

The Business Impact Of Customer Experience, 2013 For: Customer Experience Professionals The Business Impact Of Customer Experience, 2013 by Maxie Schmidt-Subramanian, June 10, 2013 Key Takeaways Customer Experience Correlates To Loyalty Forrester once

More information

Case Study: Beefing Up Software Developer Skills How Maritz Solved The Developer Skills Problem

Case Study: Beefing Up Software Developer Skills How Maritz Solved The Developer Skills Problem Case Study: Beefing Up Software Developer Skills How Maritz Solved The Developer Skills Problem by Dave West with Mike Gilpin and David D Silva Executive Summary The skills of the software development

More information

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares

Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Market Analysis Worldwide Security and Vulnerability Management 2014 2018 Forecast and 2013 Vendor Shares Charles J. Kolodgy IN THIS EXCERPT The content for this excerpt was taken directly from IDC Market

More information