Web application security testing products and services generally fall into one of two categories—static application security testing (SAST) or dynamic application security testing (DAST)—but some vendors have begun to offer integrated suites of both sets of tools. While some IT and security professionals are quite interested in purchasing SAST and DAST from a single vendor, others purposefully avoid doing so. This brief investigates the interest levels in single-sourcing SAST and DAST, as well as the drivers and inhibitors to this approach.
Basic communications and safeguards are often overlooked.
Mobility and consumerization are having a hard and fast impact on IT. We are no longer in a “command and control” world in which IT dictates which tools employees use (hardware as well as software): More end-users are choosing their own hardware platforms and software applications in lieu of the IT-sanctioned business tools provided by their companies, and IT is sprinting to catch up. These end-users are looking to tackle issues like data sharing, portability, and access from multiple intelligent endpoint devices, creating a conundrum for IT as it needs to balance business enablement, ease of access, and collaborative capacity with the need to maintain control and security of information assets.
Enhances enterprise architecture and adds anti-malware, security intelligence, and forensics.
Technology and skills are there but private sector affinity is still lacking.
New security and mobility requirements will make EVAS a network requirement.
Network access control has been around for a decade, and the global recession and years of vendor consolidation certainly took a toll on NAC solutions. But NAC is not fading away. Instead, NAC has evolved into a new and stronger market segment called EVAS (Endpoint Visibility, Access, and Security). CISOs should place NAC in their legacy file and begin to assess EVAS as part of their security strategies.
Over the last few years, security professionals continue to fall farther and farther behind with security controls and incident detection. Why? Many organizations approach cybersecurity with an array of signature-based tools, perimeter gateways, disjointed processes, and limited security resources/skills. These legacy tactics can no longer keep up with increasingly dangerous threats. CISOs can improve situational awareness with the right big data security analytics to help with controls adjustments, incident detection, problem isolation, and remediation. EnCase Analytics, with all the requirements of a big data security analytics solution, will provide built-in algorithms, ad-hoc query capabilities, and security technology integration in order to help organizations accelerate, automate, and streamline overall cybersecurity operations. Additionally, by focusing on the often neglected area of endpoint artifacts, EnCase Analytics can help security-conscious organizations benefit from proactive assessment of the security risks and gain complete visibility into their security posture.
Many enterprise organizations claim that they already consider security data collection and analysis as “big data,” but they don’t have security analytics solutions capable of addressing their scalability, performance, or operational needs. ESG believes that tactical security analytics solutions and compliance-centric SIEM tools are no match for today’s big data security analytics needs. Leading vendors are addressing this gap with real-time and asymmetric big data security analytics systems built for scale and intelligence. IBM is one of few vendors offering an integrated approach that spans the entire continuum of enterprise security analytics needs.
Synergistic acquisition will complement existing RSA business and open new doors.
Organizations may use static, dynamic, or other types of testing tools to validate the security of their web applications, but does all that testing really make a difference? According to ESG research, it does. This research brief looks at the relationship between the use of application security testing tools and the confidence levels that organizations report about the security of their web applications.
Best solutions will collect, process, analyze, and correlate data in three key areas.
Jon Oltsik is an ESG senior principal analyst and the founder of the firm’s cybersecurity service. With almost 30 years of technology industry experience, Jon is widely recognized as an expert in all aspects of cybersecurity and is often called upon to help customers understand a CISO's perspective and strategies.
© 2015 by The Enterprise Strategy Group, 20 Asylum Street, Milford, MA 01757 508.482.0188