On March 19, 2018, Gartner released its periodic update to the Gartner Magic Quadrant for Application Security Testing, which analyzes vendors’ DevSecOps capabilities. We’re pleased to announce that IBM sustained its position in the “Leaders” Quadrant for Application Security Testing in a report that spanned 12 total vendors.

Gartner performs extensive research to determine which vendors will be positioned in the Leaders, Challengers, Visionaries and Niche Players quadrants in its reports.

Download the Gartner Magic Quadrant Report Now


This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from IBM.

Ultimately, vendors are evaluated on their Ability to Execute and Completeness of Vision.

‘Ability to Execute’ Evaluation Criteria in Magic Quadrant Report

When evaluating application security testing vendors on their Ability to Execute, Gartner analyzed the following criteria in this evaluation cycle:

  • Product or Service: Assessment of vendor’s current product and service capabilities, quality, feature sets and skills;
  • Overall Viability: Assessment of vendor’s overall financial health, as well as the financial and practical success of the business unit;
  • Sales Execution/Pricing: Vendor’s capabilities in all presales activities and the structure that supports them;
  • Market Responsiveness/Record: Vendor’s ability to respond, change direction, be flexible and achieve success as opportunities develop, competitors act, customer needs evolve and market dynamics change;
  • Marketing Execution: Assessment of vendor’s clarity, quality, creativity and efficacy of programs designed to deliver the organization’s message in order to influence the market, promote the brand, increase awareness of products and establish a positive identification in the minds of customers; and
  • Customer Experience: Vendor’s quality of supplier/buyer interactions, technical support or account support.

The following “Ability to Execute” metric wasn’t evaluated by Gartner in this review cycle: Operations.

‘Completeness of Vision’ Evaluation Criteria in Magic Quadrant Report

When evaluating vendors on their Completeness of Vision, the following evaluation criteria were utilized:

  • Market Understanding: Assessment of the vendor’s ability to understand buyers’ needs and translate them into usable SAST, DAST, IAST and MAST products and services;
  • Marketing Strategy: Vendor’s ability to provide clear, differentiated messaging consistently communicated internally, externalized through social media, advertising, customer programs and positioning statements;
  • Sales Strategy: Vendor’s ability to offer a sound strategy for selling that uses the appropriate networks, including direct and indirect sales, marketing, service and communication;
  • Offering (Product) Strategy: Evaluation of the vendor’s development and delivery of a solution that’s differentiated from the competition in a way that uniquely addresses critical customer requirements;
  • Innovation: Assessment of how vendors are innovating to support enterprise security intelligence, as well as developing methods to make security testing more accurate; and
  • Geographic Strategy: The vendor’s strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the “home” or native geography, either directly or through partners, channels and subsidiaries, as appropriate for that geography and market.

The following “Completeness of Vision” metrics weren’t evaluated by Gartner in this evaluation cycle: Business Model and Vertical/Industry Strategy.

Characteristics of ‘Leaders’ in Gartner Magic Quadrant for Application Security Testing

Leaders provide mature offerings that meet market demand. They’ve demonstrated the vision necessary to sustain their market positioning, especially as technology requirements evolve. The hallmark of Leaders is that they focus on and invest in their technology offerings to lead the market and affect its overall direction.

Leaders can be the vendors to watch as you try to understand how new offerings might evolve. Leaders typically possess a significant, satisfied customer base and enjoy high market visibility. Their size and maturity enable them to remain viable under constantly evolving market conditions. Leaders typically respond to a wide market audience by supporting broad market requirements. However, they may fail to meet the specific needs of vertical markets or other more specialized segments.

So these evaluation criteria clearly present high bars for achievement.

Get Your Complimentary Copy of 2018 Gartner Magic Quadrant for Application Security Testing

For a complete copy of the 2018 Gartner Magic Quadrant report for Application Security Testing, which provides an overview of all application security testing vendors, including IBM, and outlines their Strengths and Cautions, click on the box below.

Download the Gartner Magic Quadrant Report Now

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

More from Application Security

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…

Does Follina Mean It’s Time to Abandon Microsoft Office?

As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility of accidentally spreading malware to my clients. I take extra precautions to ensure that I’m not introducing risk to my clients. Still, using Microsoft Office was something I did many times a day without a second thought. I brought up…

3 Reasons Why Technology Integration Matters

As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain tight-lipped in a lot of data breach cases. Much like the way a vaccine can help stop the spread of infectious diseases, sharing threat intelligence and defense strategies can help to establish a more secure future for everyone.  So what…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…