Amy   DeMartine

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Forrester New Wave™: Bot Management, Q3 2018

    The 12 Providers That Matter Most And How They Stack Up

    September 20, 2018Amy DeMartine

    In Forrester's evaluation of the emerging bot management market, we identified the 12 most significant providers — Akamai Technologies, Alibaba Cloud, Cloudflare, DataDome, Distil Networks, Oracle Dyn, PerimeterX, Reblaze, ShieldSquare, Stealth Security, Unbotify, and White Ops — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Security pros can use this review to select the right partner for their bot management needs.

  • For Security & Risk Professionals

    REPORT: Stop Bad Bots From Killing Customer Experience

    Strengthen Engagement And Budget By Securing Web Traffic

    September 6, 2018Amy DeMartine, Joseph Blankenship, Susan Bidel

    Automated internet traffic is on the rise, largely due to software programs called bots. Although some bots facilitate data sharing and customer engagement, many are tools that malicious attackers use to break into your apps, steal millions of dollars, and expose intellectual property. If that wasn't enough, bad-bot traffic is degrading app performance and corrupting data used to make critical customer engagement decisions. Read this report to understand common attack patterns and the best methods to make sure bad bots don't ruin your business.

  • For Security & Risk Professionals

    REPORT: New Tech: Bot Management, Q3 2018

    Forrester's Landscape Overview Of 15 Providers

    September 6, 2018Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated, broad or targeted, and they're often difficult to distinguish from legitimate traffic. Bot management tools are emerging to combat this threat, determining which automated traffic is good or bad and thwarting the bad. Security pros should use this report to understand the capabilities in different bot management market segments and to inform their technology strategies.

  • For Security & Risk Professionals

    REPORT: Forrester Analytics: Application Security Solutions Forecast, 2017 To 2023 (Global)

    ForecastView Document

    August 7, 2018 Jennifer Adams, Amy DeMartine

    As business shifts to digital, web applications are mission-critical, yet applications are highly vulnerable to external attacks. Application security tools identify and remediate vulnerabilities during development and protect live applications. This data-driven report gives a five-year view of growth for bot management, dynamic application security testing, interactive application security testing, static application security testing, runtime application self-protection, software composition analysis, and web application firewalls.

  • For Security & Risk Professionals

    REPORT: The Forrester Tech Tide™: Zero Trust Threat Prevention, Q3 2018

    25 Technologies Underpin Zero Trust Threat Prevention

    July 12, 2018Amy DeMartine, Chase Cunningham, Joseph Blankenship, Josh Zelonis

    Zero Trust (ZT) threat prevention is increasingly critical to deny malicious attackers' access to enterprise assets. To accelerate their performance in ZT threat prevention, companies are evaluating and adopting a range of contributing technologies. This Forrester Tech Tide report presents an analysis of the maturity and business value of the 25 technology categories that support ZT threat prevention. Security pros should read this report to shape their firm's investment approach to these technologies.

View all of Amy DeMartine's Research

Clients Who Work With Amy DeMartine Also Work With:

View all related analysts