Skip to main content
Amy   DeMartine

Amy DeMartine

VP, Research Director Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine

VP, Research Director Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: The Forrester Wave™: Web Application Firewalls, Q1 2020

    The 10 Providers That Matter Most And How They Stack Up

    February 26, 2020 Sandy Carielli, Amy DeMartine

    In our 33-criterion evaluation of web application firewall (WAF) providers, we identified the 10 most significant ones — Akamai Technologies, Alibaba Cloud, Amazon Web Services, Barracuda Networks, Cloudflare, F5 Networks, Imperva, Microsoft, Radware, and Rohde & Schwarz Cybersecurity — and researched, analyzed, and scored them. This report shows how each provider measures up and helps security professionals select the right one for their needs.

  • For Security & Risk Professionals

    REPORT: The Forrester New Wave™: Bot Management, Q1 2020

    The 13 Providers That Matter Most And How They Stack Up

    January 29, 2020 Sandy Carielli, Amy DeMartine

    In Forrester's evaluation of the emerging market for bot management, we identified the 13 most significant providers in the category — Akamai Technologies, Alibaba Cloud, AppsFlyer, Cloudflare, DataDome, Imperva, Instart, Netacea, PerimeterX, Radware, Reblaze, Shape Security, and White Ops — and evaluated them. This report details our findings about how well each vendor scored against 10 criteria and where they stand in relation to each other. Security pros can use this review to select the right partner for their bot management needs.

  • For Security & Risk Professionals

    REPORT: The State Of Government Application Security, 2020

    Government Must Invest Aggressively In Application Security To Protect Citizen Data

    January 7, 2020 Sandy Carielli, Amy DeMartine

    Confidence in the ability of government to keep citizen data safe is low, and with good reason: Malicious attackers stand ready to target government agencies and their treasure trove of data. Applications remain the biggest external attack method, and government entities must aggressively protect applications to secure the data these apps create and access. Governments are far behind all industries in key areas of application protection. Security pros at government agencies should use this report to target crucial application security improvements.

  • For Security & Risk Professionals

    REPORT: Now Tech: Web Application Firewalls, Q4 2019

    Forrester's Overview Of 31 WAF Providers

    December 20, 2019 Sandy Carielli, Amy DeMartine

    You can use web application firewalls (WAFs) to protect applications, apply consistent and global security policies, and comply with regulations. But to realize these benefits, you'll first have to select from a diverse set of vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use this report to understand the value they can expect from a WAF provider and to select one based on size and functionality.

  • For Security & Risk Professionals

    REPORT: New Tech: Bot Management, Q4 2019

    Forrester's Landscape Overview Of 22 Providers

    December 13, 2019 Sandy Carielli, Amy DeMartine

    Software programs make attacking applications easy. Malicious hackers use these programs — called "bots" — to quickly develop, launch, and evolve attacks. These can be simplistic or sophisticated, broad or targeted, and they're often difficult to distinguish from legitimate traffic. Bot management tools are emerging to combat this threat, determining which automated traffic is good or bad and thwarting the bad. Security pros should use this report to understand the capabilities in different bot management market segments and to inform their technology strategies.

View all of Amy DeMartine's Research

Clients Who Work With Amy DeMartine Also Work With:

View all related analysts