Save or Share this Report

For Security & Risk Professionals

Vendor Landscape: Runtime Application Self-Protection

Protect Your Imperfect Code Until It Can Be Fixed

September 29, 2017

Primary author headshot

Authors

Why Read This Report

Even with the best prerelease security testing, developers will never write perfectly secure code. Zero-day attacks will continue to target vulnerable open source components, third-party applications, and internally developed code. Web application firewalls provide a helpful protection against such attacks; however, they can only analyze input and output data. Used as a deeper layer of application defense, runtime application self-protection (RASP) tools use insider info of the applications they protect to help security pros more effectively detect and deflect malicious attacks.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($2495 USD).

Purchase

Table of Contents

  • Developers Are Imperfect, So Use Of RASP Tools Will Rise
  • Choose A RASP Tool That Protects Your Apps And Guides Developers
  • What It Means

  • Don't Replace Your Web Application Firewall With RASP . . . Yet
  • Supplemental Material
  • Related Research Documents

Recommended Research