Gartner® Hype Cycle™ for Application Security Report

ThreatX Named a Sample Vendor in July 2022 Gartner® Hype Cycle™ for Application Security Report

ThreatX has been named a Sample Vendor in the July 2022 Gartner Hype Cycle™ for Application Security in the API Threat Protection and Cloud WAAP categories. We’re thrilled with this recognition, and look forward to continuing to help organizations tackle the significant challenge of application and API security. Gartner notes in the report, “Because APIs are typically used for access to data or application functionality, often linked to systems of record, the impact of an API breach can be substantial. Privacy regulations typically require reporting if private data is breached through an unsecure API. APIs are easily and intentionally programmable, so a vulnerability can leak large volumes of data. The challenge of distinguishing malicious access from valid access further complicates the task of securing APIs.”

The July 2022 Gartner Hype Cycle™ for Application Security can help you understand the lifecycles of technologies in the application security space to reduce the risk of your technology investment decisions. Use the report to get a clear picture of application security technologies, the Sample Vendors, and the threat landscape.

What Will You Learn?

  • The application security technologies available, from emerging to established solutions
  • The definitions, business impacts, drivers, obstacles of and Gartner recommendations for each application security technology
  • The Sample Vendors offering each technology
  • Trends and best practices in application security

Gartner, Hype Cycle for Application Security, Joerg Fritsch, 11 July 2022

GARTNER and Hype Cycle are registered trademarks and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from ThreatX.

Download the Report