Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized As “Leader” In The Gartner Magic Quadrant

Veracode Recognized as “Leader” in the Gartner Magic Quadrant for Application Security Testing for Third Consecutive Report

logo-veracode

BURLINGTON, MA–(Source: Marketwired – Jul 7, 2014) – Veracode, the application security company, today announced that it has been positioned in the “Leaders” quadrant of Gartner, Inc.’s 2014’s “Application Security Testing Magic Quadrant”. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision, and the 2014 Magic Quadrant marks the third consecutive report in which Veracode is recognized as a “Leader.” Veracode’s cloud-based service safeguards web, mobile and third-party applications for hundreds of organizations worldwide, including three of the top four banks in the Fortune 100 and more than 25 of the world’s top 100 brands. The company is widely viewed as having unique expertise in the domain of application security as well as a pioneer in binary static analysis and assessing the security of the software supply chain.

According to the Gartner report, “Global-scale scandals around critical applications’ breaches have highlighted the need for effective detection of exploitable application security vulnerabilities. Application security testing is the solution for web, cloud and mobile applications.” The report also states “through 2015, more than 75% of mobile applications will fail basic security tests.”

Mobile and cloud computing applications are dramatically changing the way enterprises deliver business innovation to customers and partners. At the same time, now that enterprises have effectively locked down their networks and endpoints with next-generation technologies, cyber criminals are increasingly targeting the application layer as the path of least resistance. As a result, more than half of all successful breaches are attributed to application-layer vulnerabilities — yet less than 10 percent of enterprises assess all their business-critical applications for critical security vulnerabilities, including the most commonly exploited vulnerabilities such as SQL Injection and Cross-Site Scripting.

The Gartner report also notes “to make adoption even easier and broader, many vendors now offer cloud-based security as a service. As a result, these technologies have reached the point where cost and risk of adoption are well-balanced.”

Every enterprise relies on software innovation to drive their business, but they need to speed their innovations to market while also being secure,” said Bob Brennan, Veracode CEO. “We view our placement in the ‘Leaders’ quadrant for the third consecutive year as a testament to how we are helping the world’s largest enterprises systematically reduce global application-layer risk.

To read the full report visit: https://info.veracode.com/analyst-report-gartner-application-security-testing-magic-quadrant.html

Gartner, Inc. 2014 “Magic Quadrant for Application Security Testing “by Neil MacDonald

Joseph Feiman. July 1, 2014

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Veracode

Veracode delivers the most widely used cloud-based platform for securing web, mobile, legacy and third-party enterprise applications. By identifying critical application-layer threats before cyber-criminals can find and exploit them, Veracode helps enterprises deliver innovation to market faster — without sacrificing security.Veracode’s powerful cloud-based platform, deep security expertise and programmatic, best practices approach provide enterprises with a simpler and more scalable way to reduce application-layer risk across their global software infrastructures.

Veracode secures hundreds of the world’s largest global enterprises, including 3 of the top 4 banks in the Fortune 100 and more than 25 of the world’s top 100 brands. Learn more at www.veracode.com, on the Veracode blog and on Twitter.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…