Whenever you visit our websites, information may be collected using cookies and similar tools to improve your user experience and to enhance the performance of the website.
Closing this message means you accept the use of cookies.
Cloud-native applications are—and will continue to be—composed of heterogenous…
Cloud-native applications further complicate the ability to secure hybrid and…
DevSecOps is becoming the standard approach for securing cloud-native applicatio…
Businesses are shifting from product and organizational silos to an integrated…
To enable a unified approach, buyers require solutions that secure the build-shi…
Conclusion
Research Methodology
Respondent Demographics
ESG Research Report: Leveraging DevSecOps to Secure Cloud-native Applications
ESG Research Report
Mar 30, 2020
Fundamental changes to application architectures and the infrastructure platforms that host them is antiquating existing cybersecurity technologies and challenging traditional approaches to protecting business-critical workloads. Additionally, the continuous integration and continuous delivery (CI/CD) process of DevOps is as impactful a change to cybersecurity programs as the changes to the applications and infrastructure that these methodologies manage.
In order to get more insight into these trends, ESG surveyed 371 IT and cybersecurity professionals at organizations in North America (US and Canada) responsible for evaluating, purchasing, and managing cloud security technology products and services. These organizations are mature cloud users in terms of public cloud services and/or containers.
Page Count: 28
Table of Contents
Executive Summary
Report Conclusions
Introduction
Research Objectives
Research Findings
Cloud-native applications are—and will continue to be—composed of heterogenous microservices deployed across hybrid clouds
Cloud-native applications further complicate the ability to secure hybrid and multi-cloud environments
DevSecOps is becoming the standard approach for securing cloud-native applications
Businesses are shifting from product and organizational silos to an integrated and unified approach, with increased involvement of the cybersecurity team resulting in multiple influencers and buyers
To enable a unified approach, buyers require solutions that secure the build-ship-run lifecycle and the entire technology stack, independent of deployment locality