Vendor Comparison in Mobile Application Security, 2015: MnM DIVE Matrix
MarketsandMarkets Vendor DIVE report on mobile application security covers a detailed study of the major players offering mobile application security solutions. The major 10 vendors in mobile application security were analyzed on the basis of their product offering and business strategy. The vendors were shortlisted based on their solution capabilities, technology innovations, and breadth of product offering.
The report will help the stakeholders such as application security vendors, technology partners, system integrators, distributors, and value added resellers to make business strategies and decisions on the deployment of mobile application security solutions.
Mobile application security involves scanning the mobile applications for vulnerabilities and identifying and preventing gaps in the security policy of the applications. This includes source code review, behavioral analysis, risk analysis, and identification of vulnerability patterns for threat prevention.
Vendors Evaluated
The report covers the comprehensive study of the key vendors offering solutions for mobile application security. We have evaluated the following 10 vendors:
We have selected the 10 vendors for evaluations based on their breadth of product offering and robust business strategy. The focus of our vendor evaluation is based on the product they offer in the mobile application security market. A comprehensive list of all the vendors in this market was created through a product mapping strategy and MarketsandMarkets analysis. Based on their capabilities, innovations, and breadth of product offering, vendors were shortlisted. Our selected vendor mix includes companies from Tier 1 to Tier 4 and covers the whole market comprehensively.
The report will help the stakeholders such as application security vendors, technology partners, system integrators, distributors, and value added resellers to make business strategies and decisions on the deployment of mobile application security solutions.
Mobile application security involves scanning the mobile applications for vulnerabilities and identifying and preventing gaps in the security policy of the applications. This includes source code review, behavioral analysis, risk analysis, and identification of vulnerability patterns for threat prevention.
Vendors Evaluated
The report covers the comprehensive study of the key vendors offering solutions for mobile application security. We have evaluated the following 10 vendors:
- Appthority
- Arxan Technologies
- Cigital
- Checkmarx
- IBM Corporation
- HP
- Pradeo
- Rapid7
- Veracode
- WhiteHat Security
We have selected the 10 vendors for evaluations based on their breadth of product offering and robust business strategy. The focus of our vendor evaluation is based on the product they offer in the mobile application security market. A comprehensive list of all the vendors in this market was created through a product mapping strategy and MarketsandMarkets analysis. Based on their capabilities, innovations, and breadth of product offering, vendors were shortlisted. Our selected vendor mix includes companies from Tier 1 to Tier 4 and covers the whole market comprehensively.
DEVELOP, DELIVER, AND DEPLOY SECURE MOBILE APPS FOR AN ENRICHED END-USER EXPERIENCE
MOBILE APP SECURITY: BEST PRACTICES
DIVE EVALUATIONS
VENDOR INCLUSION CRITERIA
VENDORS EVALUATED
DIVE EVALUATION OVERVIEW
VENDOR PROFILES
VANGUARDS
IBM CORPORATION
HEWLETT-PACKARD
PRADEO SECURITY SYSTEMS
INNOVATORS
WHITEHAT SECURITY
CHECKMARX
VERACODE
EMERGING
RAPID 7
ARXAN TECHNOLOGIES
APPTHORITY
DYNAMIC
CIGITAL
SUPPLEMENTAL MATERIAL
VENDOR DIVE METHODOLOGY
QUADRANT DESCRIPTION
RELATED RESEARCH
ENDNOTES
MOBILE APP SECURITY: BEST PRACTICES
DIVE EVALUATIONS
VENDOR INCLUSION CRITERIA
VENDORS EVALUATED
DIVE EVALUATION OVERVIEW
VENDOR PROFILES
VANGUARDS
IBM CORPORATION
HEWLETT-PACKARD
PRADEO SECURITY SYSTEMS
INNOVATORS
WHITEHAT SECURITY
CHECKMARX
VERACODE
EMERGING
RAPID 7
ARXAN TECHNOLOGIES
APPTHORITY
DYNAMIC
CIGITAL
SUPPLEMENTAL MATERIAL
VENDOR DIVE METHODOLOGY
QUADRANT DESCRIPTION
RELATED RESEARCH
ENDNOTES