Amy   DeMartine

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Application Security Market Will Exceed $7 Billion By 2023

    Security Scanning Tools Will Continue To Lead As Total Spending More Than Doubles

    October 4, 2018Amy DeMartine, Jennifer Adams

    Applications are critical touchpoints for your customers but, when it comes to external attacks, also your weakest link. Application security tools identify and remediate vulnerabilities during development and protect live applications in production. Security leaders must balance spending between the two. This report divides the application security market into seven technology categories and projects five-year global spending patterns to help you benchmark your spending.

  • For Security & Risk Professionals

    REPORT: Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers

    October 3, 2018Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use Forrester's Now Tech report to understand the value they can expect from a container security provider and select vendors based on size and functionality.

  • For CIO Professionals

    REPORT: Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

    Intermediate Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018 Jeff Pollard, Stephanie Balaouras, Amy DeMartine

    CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as competitive differentiators. Firms in this phase must move to proactively protect customers from complex privacy abuses and cybercriminals. This report — the second of three in the technology competency of the cybersecurity and privacy playbook — helps CIOs meet the challenges of the intermediate phase.

  • For CIO Professionals

    REPORT: Drive Growth With Customer Trust And Build Brand Resilience

    Advanced Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018Amy DeMartine, Jeff Pollard, Stephanie Balaouras

    When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report — the third of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies CIOs, CISOs, and other technology leaders should prioritize in the advanced phase to leave competitors behind.

  • For CIO Professionals

    REPORT: Lay Your Security Tech Foundation

    Beginner Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018 Stephanie Balaouras, Amy DeMartine, Jeff Pollard

    This report — the first of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies that CIOs and other technology leaders should prioritize to move to a data-centric Zero Trust security strategy. This strategy establishes the foundation your firm needs to mature its cybersecurity and privacy efforts, focusing on four key areas: 1) data governance; 2) data security; 3) cloud governance; and 4) technology innovation.

View all of Amy DeMartine's Research

Clients Who Work With Amy DeMartine Also Work With:

View all related analysts