Explore the Latest in Tech Innovations

Please enable JavaScript in your browser to complete this form.
Name

The Wave: Prevoty Leads the RASP Market

Mar 29, 2018 | Data

Featured article by Jeffrey C. Steuart, Tech Professional and Author

The latest Forrester Wave™: Runtime Application Self-Protection report for Q1 2018 names Prevoty as the sector’s sole leader.

“Forrester’s research uncovered a market in which Prevoty leads the pack,” wrote Amy DeMartine, Principal Analyst at Forrester. Forrester also identified Prevoty as differentiated in the criteria of attack detection, management UI, attack response, zero-day attacks, reporting and analysis, feedback loops, vision, and market approach.

“Prevoty leads the pack with robust attack detection, response, and visibility. Prevoty’s RASP tool can protect Java, .NET, Python, PHP, and Ruby applications using the vendor’s own language parsing, with responses including redirect, sanitize, terminate, transform, and signal. Prevoty includes out-of-the-box SIM integrations as well as flexible ad hoc reporting,” the report states.

Assessment criteria included: attack detection, management UI, attack response, zero-day attacks, reporting and analysis, feedback loops, performance load, vision, roadmap and market approach. TCO and ease of configuration and maintenance were also factored in to Forrester’s evaluation of eight RASP vendors, including Prevoty, Waratek, tCell, Contrast Security, Signal Sciences, Avocado Systems, Micro Focus and CA Veracode.

Prevoty recently marked another significant milestone with the introduction of fully autonomous application protection. Prevoty’s RASP solution deploys via autonomous plugins that perform without dependencies on network connections, enabling fast deployments, without risks of latency, network calls, data leakage or man-in-the-middle attacks.

Stopping Struts2: Prevoty’s solution was recently field-proven at major scale with the Struts2 vulnerabilities. The Company reports that its customers’ applications remained secure and protected from application-targeted attacks, including those organizations whose apps leveraged third-party components with unpatched Struts2 vulnerabilities.

“Enterprises have realized that the software they build, buy, and rely on to conduct business is inherently vulnerable to attackers,” said Kunal Anand, CTO and Co-Founder of Prevoty. “Our industry has failed to protect applications and data as we’ve relied on a two-prong approach: making developers responsible to build secure code and deploying network appliances at the edge. It’s only getting worse. Applications are becoming more complex and dynamic. Public cloud transformations and the rapid deployment promised by DevOps are making it challenging for security teams.”

In today’s attack-heavy environment, applications and services require embedded security controls to help mitigate vulnerabilities, prevent zero-day attacks, increase visibility and improve risk management. These and other requirements are expected to continue driving rapid growth in the RASP market. A copy of the Forrester Wave™: Runtime Application Self-Protection report for Q1 2018 is available here.

Jeff Steuart is an IT professional in a commercial real estate analysis practice serving leading development and engineering organizations.

How new data privacy laws will impact you

How new data privacy laws will impact you

The 2025 Data Privacy Crisis: 8 New Laws Create Compliance Emergency
January 2025 brought unprecedented privacy upheaval as eight new state laws activated simultaneously, affecting businesses nationwide. With non-compliance costs averaging $14.82 million and 94% of consumers refusing to buy from companies that mishandle data, the stakes have never been higher. From mandatory universal opt-out mechanisms to AI governance challenges, organizations face a regulatory maze that could trigger automatic violations. Tennessee, Minnesota, and Maryland follow with even stricter requirements mid-year. Discover critical compliance strategies, technical implementation requirements, and personal VPN protection benefits to navigate 2025’s most complex privacy landscape and avoid costly penalties.

read more
The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

The Quantum Readiness Survey: How Technology Leaders Are Preparing for the Next Computing Revolution

Quantum computing is no longer a distant scientific curiosity—it’s rapidly approaching commercial reality. From breaking current encryption methods to solving optimization problems that could transform entire industries, quantum computing represents both unprecedented opportunity and significant risk for enterprise organizations. Be a part of the future, take part 1 of the Quantum Computing survey

read more
Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Your Monthly Tech Intelligence Briefing – May 26, 2025 – Memorial Day Edition

Securing Multi-Cloud Environments: Best Practices for 2025
As we honor those who served our nation this Memorial Day, it’s fitting to reflect on the strategic importance of defending our digital infrastructure. Just as military operations require coordinated defense across multiple fronts, modern enterprises must secure their multi-cloud environments with the same level of strategic planning and execution.

read more
Share This