Amy   DeMartine

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Throw Away Your Current Application Security Metrics

    Match Application Security Metrics To Developer Speed

    March 1, 2019Amy DeMartine, Jeff Pollard

    Applications underpin customer engagement, but they also are the top external attack method for breaches. To avoid launching efforts that waste time, effort, and money, security leaders need application security metrics that generate insights and help decision making. Security pros should use this report to define application security metrics that are traceable to business objectives and understand what decisions to make, how to make them, and what the consequences are.

  • For Security & Risk Professionals

    REPORT: The State Of Application Security, 2019

    Organizations Are Rushing To Protect Their Applications With Automation

    February 27, 2019Amy DeMartine

    Application weaknesses and software vulnerabilities continue to be the most common means by which cybercriminals carry out external attacks. Given this has been the case for years, how can security leaders better thwart malicious attackers targeting applications? Many organizations are planning major investments in prerelease testing tools and solutions to protect apps in production. Security leaders should read this report to understand how their peers approach application security and use it to help guide improvements in their own programs.

  • For Security & Risk Professionals

    REPORT: Now Tech: Software Composition Analysis, Q1 2019

    Forrester's Overview Of 17 Software Composition Analysis Providers

    January 24, 2019Amy DeMartine

    You can use software composition analysis (SCA) to eliminate vulnerable components, reduce license risk, and apply consistent policies during the software development life cycle (SDLC). But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security professionals should use Forrester's Now Tech report to understand the value they can expect from an SCA provider and select vendors based on size and functionality.

  • For Security & Risk Professionals

    REPORT: Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World

    November 5, 2018Amy DeMartine, Jeff Pollard, Heidi Shey, Claire O'Malley, Salvatore Schiano, Merritt Maxim, Renee Murphy

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and other breaches of trust. Unfortunately, the combination of data hoarding, consolidated data stores, and interconnectedness makes it easy for attackers to steal valuable data. In the next 12 months, attackers will target specific industries and use automation to enhance their effectiveness. This report guides security and risk (S&R) pros through five predictions for 2019.

  • For Security & Risk Professionals

    REPORT: Application Security Market Will Exceed $7 Billion By 2023

    Security Scanning Tools Will Continue To Lead As Total Spending More Than Doubles

    October 4, 2018Amy DeMartine, Jennifer Adams

    Applications are critical touchpoints for your customers but, when it comes to external attacks, also your weakest link. Application security tools identify and remediate vulnerabilities during development and protect live applications in production. Security leaders must balance spending between the two. This report divides the application security market into seven technology categories and projects five-year global spending patterns to help you benchmark your spending.

View all of Amy DeMartine's Research

Clients Who Work With Amy DeMartine Also Work With:

View all related analysts