Key Criteria for Evaluating Developer Security Toolsv1.0

An Evaluation Guide for Technology Decision Makers

Table of Contents

  1. Summary
  2. Developer Security Tooling Primer
  3. Report Methodology
  4. Decision Criteria Analysis
  5. Evaluation Metrics
  6. Key Criteria: Impact Analysis
  7. Analyst’s Take

1. Summary

Software needs to be written, built, and deployed with security in mind. This is true for both the application being created and the activities involved in its creation. In an ideal world, developers would be security engineers also and would build appropriate risk-mitigation features into their software applications, as well as follow appropriate procedures and apply policies to mitigate potential risk. The reality for many organizations, however, is that the urgency for software updates or new software often outweighs the ability to apply appropriate security at every step throughout the development and operation of a software product’s lifecycle.

Expanding the DevOps movement by considering security alongside every development or operational step in an application’s lifecycle, DevSecOps has become as popular a term as DevOps itself. Unfortunately, just as with DevOps, DevSecOps is not a single product or SKU that an organization can procure. There is no “one-size-fits-all” approach. The term itself may be defined differently to take into account the specific needs of an organization or department and touches all people, processes, and tooling across a software development workflow.

One key approach, often the one most associated with the term “DevSecOps,” is the focus on development security tools with a “shift-left” mindset; that is, tools that consider security as early as possible in the software development lifecycle. This mindset involves rapid security education, insights, and direct feedback to developers and engineers early in the development process. We describe this in more detail later.

This Key Criteria report examines the capabilities and trends that decision makers should look for when adopting that shift-left mindset to increase application security and release velocity, while reducing cost and risk.

The report also considers how to evaluate vendors’ capabilities to provide security-related insights, automation, and compliance closer to the developer—earlier in the development workflow—addressing ways to reduce risk while writing code, storing code, and deploying it across process and pipeline. Among our findings:

  • Development security tooling reduces risk and increases developer velocity by applying and enforcing “shift-left” security practices.
  • Developer security tooling automation can close the gap between security engineers and developers without sacrificing development speed.
  • Developer security tooling integrates with existing development and operational tools to increase the visibility of security-related events across development, operations, and security teams.
  • Developer security tooling delivers value by building on software and architecture (cloud and on-prem) vulnerability scanning, application and infrastructure hardening, and other well-established areas of IT security.

Developer security tools and a “shift-left” mindset are key building blocks for helping enterprises reduce the security risks associated with building and deploying applications. In addition to establishing security as a first-class citizen across the development workflow, this approach offers more traditional enterprises with long-established software development practices a connection point to leading-edge best practices, enabling them to develop and deliver software both quickly and in compliance with organizational policies.

How to Read this Report

This GigaOm report is one of a series of documents that helps IT organizations assess competing solutions in the context of well-defined features and criteria. For a fuller understanding consider reviewing the following reports:

Key Criteria report: A detailed market sector analysis that assesses the impact that key product features and criteria have on top-line solution characteristics—such as scalability, performance, and TCO—that drive purchase decisions.

GigaOm Radar report: A forward-looking analysis that plots the relative value and progression of vendor solutions along multiple axes based on strategy and execution. The Radar report includes a breakdown of each vendor’s offering in the sector.

Solution Profile: An in-depth vendor analysis that builds on the framework developed in the Key Criteria and Radar reports to assess a company’s engagement within a technology sector. This analysis includes forward-looking guidance around both strategy and product.