-
Report details
-
29
Figures
-
0
Tables
-
Executive Summary
-
Introduction
-
Research Findings
-
As Cloud-native Development and DevOps Adoption Grow, Application Security Becom…
-
Most Say API Security Is Robust, but Many Cite Challenges and Concerns, Includin…
-
API Attacks Are Common, and the Business Impacts Are Significant
-
Responsibility for API Security Is Distributed, and Work Remains for Process…
-
Budgets Appear Strong, but Many Will Focus on Process and Strategy
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
Research Report: API Security From Development to Runtime
Research Report
Jan 06, 2025
by
John Grady, Melinda Marks, Emily Marsh, Enterprise Strategy Group Research
Every API is a potential attack vector, and adversaries have a variety of avenues to compromise endpoints at their disposal. Attacks on availability, exploitation of weak authentication, and the abuse of shadow APIs are all common and can easily lead to sensitive data loss. The breadth of tools used to secure APIs and issues with collaboration across personas responsible for ensuring secure development, deployment, and operation of APIs may be creating more challenges than organizations realize. Success requires security operations and tools spanning the software development process, from development to runtime, to help teams discover, manage, configure, monitor, and protect APIs. Leaders need to understand the behaviors that forward-thinking organizations have undertaken and how to properly assess solutions to secure APIs from development to runtime.
To gain insights into these trends, TechTarget’s Enterprise Strategy Group surveyed 385 IT, cybersecurity, and application development professionals in North America (US and Canada) involved securing their organization’s APIs.
Page Count: 26
Table of Contents
-
Executive Summary
-
Introduction
-
Research Findings
-
As Cloud-native Development and DevOps Adoption Grow, Application Security Becomes a Priority
-
Most Say API Security Is Robust, but Many Cite Challenges and Concerns, Including Usage of AI
-
API Attacks Are Common, and the Business Impacts Are Significant
-
Responsibility for API Security Is Distributed, and Work Remains for Process and Education
-
Budgets Appear Strong, but Many Will Focus on Process and Strategy
-
Conclusion
-
Research Methodology
-
Respondent Demographics
|
|