July 7, 2014 By Neil Jones 2 min read

The 2015 report is now available – and IBM is still a leader.

On July 1, 2014 Gartner released its annual update to the Gartner Magic Quadrant for Application Security Testing (AST), which was published by its analysts Joseph Feiman and Neil MacDonald. We’re pleased to announce that IBM maintained its position in the “Leaders” Quadrant for Application Security Testing in a report that spanned 17 total vendors.

For those of you who may not be familiar with the Magic Quadrant, Gartner performs extensive research to determine which vendors will be positioned in the Leaders, Challengers, Visionaries and Niche Players quadrants in its reports.

Big-picture, vendors are evaluated on their Ability to Execute and Completeness of Vision.

**UPDATED** 2015 Gartner Magic Quadrant for Application Security Testing (AST)

“Ability to Execute” Evaluation Criteria in Magic Quadrant Report

When evaluating Application Security Testing (AST) vendors on their Ability to Execute, Gartner analyzed the following criteria in this report:

  • Product(s) and/or Service(s) Capabilities
  • Overall Viability, from Business Unit, Financial, Strategy and Organizational perspectives
  • Sales Execution and Pricing
  • Market Responsiveness and (Track) Record
  • Customer Experience

The following “Ability to Execute” criteria weren’t evaluated by Gartner in this review cycle: Marketing Execution and Operations.

“Completeness of Vision” Evaluation Criteria in Magic Quadrant Report

When evaluating vendors on their Completeness of Vision, the following evaluation criteria were utilized:

  • Market Understanding
  • Sales Strategy
  • Offering and Product Strategy
  • Innovation
  • Geographic Strategy

The following “Completeness of Vision” criteria weren’t evaluated by Gartner in this review cycle: Vertical/Industry Strategy, Business Model and Marketing Strategy.

Characteristics of “Leaders” in Gartner Magic Quadrant for Application Security Testing

Leaders provide mature offerings that meet market demand. They’ve demonstrated the vision necessary to sustain their market positioning, especially as technology requirements evolve. The hallmark of Leaders is that they focus on and invest in their technology offerings to lead the market and affect its overall direction.

Leaders can be the vendors to watch as you try to understand how new offerings might evolve. Leaders typically possess a significant, satisfied customer base and enjoy high market visibility. Their size and maturity enable them to remain viable under constantly evolving market conditions. Leaders typically respond to a wide market audience by supporting broad market requirements. However, they may fail to meet the specific needs of vertical markets or other more specialized segments.

For a complete copy of the Gartner Magic Quadrant report for Application Security Testing, which provides an overview of all Application Security Testing vendors in the report (including IBM) and outlines their Strengths and Cautions, click on the box below:

**UPDATED** 2015 Gartner Magic Quadrant for Application Security Testing (AST)


The above graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM (link above). Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today