Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized as “Leader” in the Gartner Magic Quadrant for Application Security Testing for Third Consecutive Report

logo-veracode

BURLINGTON, MA–(Source: Marketwired – Jul 7, 2014) – Veracode, the application security company, today announced that it has been positioned in the “Leaders” quadrant of Gartner, Inc.’s 2014’s “Application Security Testing Magic Quadrant”. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision, and the 2014 Magic Quadrant marks the third consecutive report in which Veracode is recognized as a “Leader.” Veracode’s cloud-based service safeguards web, mobile and third-party applications for hundreds of organizations worldwide, including three of the top four banks in the Fortune 100 and more than 25 of the world’s top 100 brands. The company is widely viewed as having unique expertise in the domain of application security as well as a pioneer in binary static analysis and assessing the security of the software supply chain.

According to the Gartner report, “Global-scale scandals around critical applications’ breaches have highlighted the need for effective detection of exploitable application security vulnerabilities. Application security testing is the solution for web, cloud and mobile applications.” The report also states “through 2015, more than 75% of mobile applications will fail basic security tests.”

Mobile and cloud computing applications are dramatically changing the way enterprises deliver business innovation to customers and partners. At the same time, now that enterprises have effectively locked down their networks and endpoints with next-generation technologies, cyber criminals are increasingly targeting the application layer as the path of least resistance. As a result, more than half of all successful breaches are attributed to application-layer vulnerabilities — yet less than 10 percent of enterprises assess all their business-critical applications for critical security vulnerabilities, including the most commonly exploited vulnerabilities such as SQL Injection and Cross-Site Scripting.

The Gartner report also notes “to make adoption even easier and broader, many vendors now offer cloud-based security as a service. As a result, these technologies have reached the point where cost and risk of adoption are well-balanced.”

Every enterprise relies on software innovation to drive their business, but they need to speed their innovations to market while also being secure,” said Bob Brennan, Veracode CEO. “We view our placement in the ‘Leaders’ quadrant for the third consecutive year as a testament to how we are helping the world’s largest enterprises systematically reduce global application-layer risk.

To read the full report visit: https://info.veracode.com/analyst-report-gartner-application-security-testing-magic-quadrant.html

Gartner, Inc. 2014 “Magic Quadrant for Application Security Testing “by Neil MacDonald

Joseph Feiman. July 1, 2014

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.Veracode’s powerful cloud-based platform, deep security expertise and programmatic, best practices approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures.

Veracode secures hundreds of the world’s largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and more than 25 of the world’s top 100 brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio, Is Winning Big Contracts

Security Startup – Illumio A hot new security startup called Illumio has launched today with a repertoire of highly coveted businesses as part of their client portfolio. Illumio today publicly unveiled its Adaptive Security Platform (ASP), the first-ever software platform that provides granular visibility and security for all data center and cloud computing environments. Global