Amy   DeMartine

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine

Principal Analyst Serving Security & Risk Professionals

Amy helps security and risk professionals transform their current software and application security practices to support continuous delivery and improvement, focusing on strong partnerships with application development, operations, and business teams. Her research covers topics such as proactive security design, security testing in the software delivery life cycle, protection of applications in production environments, and remediation of hardware and software flaws.

Previous Work Experience

In her previous role at Forrester, Amy served infrastructure and operations professionals, covering the strategy, design, organization, and implementation of modern service delivery, including continuous delivery, DevOps, and SecureOps. She has more than 20 years of experience in product management, product and technical marketing, development, and operations roles. Her previous experience includes positions at BMC and HP, where she was responsible for driving IT management software products from conception through the product life cycle, all with the purpose of enabling technology professionals to solve their most pressing issues.

Education

Amy holds a master's degree in telecommunications and a bachelor's degree in electrical and computer engineering from the University of Colorado.

Amy DeMartine's Research

Most RecentMost Popular
  • For Security & Risk Professionals

    REPORT: Predictions 2019: Cybersecurity

    The US-China Trade War Will Revive Corporate Espionage Attacks Around The World

    November 5, 2018Amy DeMartine, Jeff Pollard, Heidi Shey, Claire O'Malley, Salvatore Schiano, Merritt Maxim, Renee Murphy

    The race to improve customer engagement compels companies to collect volumes of personal data, and this puts enormous pressure on security teams to protect customers from fraud, privacy abuses, and other breaches of trust. Unfortunately, the combination of data hoarding, consolidated data stores, and interconnectedness makes it easy for attackers to steal valuable data. In the next 12 months, attackers will target specific industries and use automation to enhance their effectiveness. This report guides security and risk (S&R) pros through five predictions for 2019.

  • For Security & Risk Professionals

    REPORT: Application Security Market Will Exceed $7 Billion By 2023

    Security Scanning Tools Will Continue To Lead As Total Spending More Than Doubles

    October 4, 2018Amy DeMartine, Jennifer Adams

    Applications are critical touchpoints for your customers but, when it comes to external attacks, also your weakest link. Application security tools identify and remediate vulnerabilities during development and protect live applications in production. Security leaders must balance spending between the two. This report divides the application security market into seven technology categories and projects five-year global spending patterns to help you benchmark your spending.

  • For Security & Risk Professionals

    REPORT: Now Tech: Container Security, Q4 2018

    Forrester's Overview Of 24 Container Security Providers

    October 3, 2018Amy DeMartine

    You can use container security tools to secure critical applications, speed development efforts, and tamperproof your containers. But to access these benefits, you'll first have to select from a diverse set of vendors — vendors that vary by size, functionality, geography, and vertical market focus. Security pros should use Forrester's Now Tech report to understand the value they can expect from a container security provider and select vendors based on size and functionality.

  • For CIO Professionals

    REPORT: Proactively Protect Customers From Fraud, Cybercrime, And Privacy Abuses

    Intermediate Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018 Jeff Pollard, Stephanie Balaouras, Amy DeMartine

    CIOs and technology leaders in the intermediate phase of the journey to cybersecurity and privacy maturity must ensure that security travels with the data and position data security and privacy as competitive differentiators. Firms in this phase must move to proactively protect customers from complex privacy abuses and cybercriminals. This report — the second of three in the technology competency of the cybersecurity and privacy playbook — helps CIOs meet the challenges of the intermediate phase.

  • For CIO Professionals

    REPORT: Drive Growth With Customer Trust And Build Brand Resilience

    Advanced Level: Technology Practices For Cybersecurity And Privacy

    September 25, 2018Amy DeMartine, Jeff Pollard, Stephanie Balaouras

    When customers trust you, they want to do more business with you. They're also willing to share more personal data with you and, often, to pay a premium for your products and services. This report — the third of three in the technology competency of the cybersecurity and privacy playbook — outlines the technologies CIOs, CISOs, and other technology leaders should prioritize in the advanced phase to leave competitors behind.

View all of Amy DeMartine's Research

Clients Who Work With Amy DeMartine Also Work With:

View all related analysts