IDC MarketScape: Worldwide Web Application and API Protection - F5
IDC MarketScape: Worldwide Web Application and API Protection - F5
FIGURE 1
IN THIS EXCERPT
The content for this excerpt was taken directly from IDC MarketScape: Worldwide Web
Application and API Protection Enterprise Platforms 2024 Vendor Assessment (Doc #
US51795524). All or parts of the following sections are included in this excerpt: IDC
Opinion, IDC MarketScape Vendor Inclusion Criteria, Essential Guidance, Vendor
Summary Profile, Appendix and Learn More. Also included is Figure 1 and 2.
IDC OPINION
Web applications are foundational components of the modern digital business,
providing the functionality required to interact with customers and prospects, partners
and guests, and employees and contractors. Attackers continually probe these
applications and related application programming interfaces (APIs) for opportunities to
steal data, gain illicit access, or defraud businesses for personal illicit gain. Attacks
targeting web applications and APIs have led to high-profile data breaches, costly
downtime, and real-world impacts including theft. End users and customers often bear
the brunt of the impact through financial losses. Eventually, this can result in a loss of
customer trust and less willingness to conduct business online.
Online cybercrime is more than a mere nuisance. It has the potential to degrade and
disrupt business results. Over the years, businesses have adopted numerous security
tools to address the steady stream of new threat tactics and expanding attack surfaces.
Web application firewall (WAF) offers a foundational level of protection against known
and emerging application layer exploits. Enterprises have layered in numerous
specialized solutions such as DDoS mitigation, bot management, and more recently, API
security.
Web application and API protection (WAAP) combines these essential security
technologies into an integrated, coherent platform to ensure a reliable level of
protection against vast online threats. Consolidated, integrated platforms help reduce
security gaps, reduce management complexity, and provide streamlined inspections.
IDC research shows that 77% of businesses rate integration between security solutions
as "important" or of "critical importance." Applications face an array of threats each
day, and attackers intentionally leverage multiple tactics to identify weaknesses in the
defenses. As a result, application security strategies that focus on specialized security
silos are set up for eventual failure. Security convergence and consolidation are a
critical step for enabling a stronger security posture, whether through improved
However, convergence yields many business benefits as well, such as reduced time and
resources required for deployment and management, improved user experience, and
improved analytics. In addition, performing all security functionalities in one service
reduces the latency introduced by routing traffic to multiple security inspection points.
The combination of WAF and API security is critical to ensure complete coverage of web
applications across all interfaces and attack surfaces. The WAAP value proposition is
rounded out by technologies designed to address specialized threat types such as
DDoS attacks and unwanted bot activities. These threats vary widely in terms of ease of
detection, difficulty of mitigation, frequency of occurrence, and severity of impact.
Ultimately, a complete application protection stack requires WAF and API security,
DDoS mitigation, and bot management. However, the unique technical requirements of
APIs and specialized requirements of DDoS attacks and bot activities mean that the
evolution toward WAAP is a long winding journey.
Vendors must offer a converged WAAP solution that combines two more of the
following into a unified security platform:
▪ API security
▪ Bot management
▪ DDoS mitigation
▪ Web application firewall
Note that WAF is considered foundational and must be included to be considered as
WAAP. Furthermore, one-off sales of WAAP components as standalone solutions will
not be counted as WAAP.
In addition, this IDC MarketScape analysis includes the following requirements for
market participation and presence:
Strategy Considerations
In addition, given the rapidly evolving nature of web application and API technologies,
shifting business practices, and a constant level of adaptation and innovation by threat
actors, security buyers should be highly aware of the solution's ability to meet their
needs over the next three to five years. Furthermore:
F5
F5 is a Leader in this 2024 IDC MarketScape for WAAP enterprise platforms.
Challenges
Capabilities
▪ The F5 CDN is not as easily integrated/turned on as other features. This may limit
adoption or increase TCO; however, customer perception may play a sizable part
of the challenge.
▪ Limited CDN footprint was noted, as fewer POPs cause longer route times/more
hops, which increase latency.
▪ Block pages are not customizable in some circumstances, such as blocks
resulting from the Malicious User Detection engine.
▪ Customers noted a limited ability to query logs with more complex filter options,
such as "OR" logic.
Consider F5 When
F5 solutions are oriented toward enterprise and service provider organizations with
demanding, large-scale applications and complex environments. F5 has demonstrated
a long history of delivering high-performance advanced security capabilities to secure
applications and APIs, often through strategic acquisitions of purpose-built point
solutions. By combining these point solutions into a single coherent, flexible platform,
F5 aids enterprises in their digital transformation journeys.
APPENDIX
Positioning on the y-axis reflects the vendor's current capabilities and menu of services
and how well aligned the vendor is to customer needs. The capabilities category
focuses on the capabilities of the company and product today, here and now. Under
this category, IDC analysts will look at how well a vendor is building/delivering
capabilities that enable it to execute its chosen strategy in the market.
Positioning on the x-axis, or strategies axis, indicates how well the vendor's future
strategy aligns with what customers will require in three to five years. The strategies
category focuses on high-level decisions and underlying assumptions about offerings,
customer segments, and business and go-to-market plans for the next three to five
years.
The size of the individual vendor markers in the IDC MarketScape represents the
market share of each individual vendor within the specific market segment being
assessed.
For each specific criteria, vendors were evaluated on a one to five scale, with three
considered the baseline that indicates an average assessment, five representing the
best and rarest assessment, and one being the lowest and also similarly rare. The
Figure 1 provides a visual representation of several factors that are translated into a
positioning along each axis. Existing product-specific features and functionality are an
important component of the "capabilities" axis, but many more factors are considered
as well. Similarly, the "strategies" axis heavily considers the vendor's plans for future
product developments. However, several factors are also considered including the
strength of the overall business and go-to-market plans. These factors may have a long-
term impact on the solution, and IDC has adjusted the weights of these criteria
accordingly. Overall, several factors go into each vendor assessment, and readers are
advised to consider Figure 1 in the context provided in the vendor profiles.
Market Definition
WAAP is a converged security solution for active application protection with WAF at its
core. WAAP solutions combine multiple functions into a unified security platform
including WAF, bot management, API security, DDoS mitigation, and other security
technologies. However, WAF is considered foundational and must be an integral
component to be considered as WAAP. Furthermore, one-off sales of WAAP
components as standalone solutions will not be counted as WAAP.
API Security
API security solutions are specifically designed to protect API communications against
misuse, abuse, and exploits. These solutions provide essential capabilities, in part or in
whole, such as API schema ingestion, validation, and enforcement; dynamic and
adaptive traffic monitoring and pattern analysis; and detection/prevention of threats
such as malware, exploits, code injection, bots, DDoS attacks, fraud, and abuse.
Some API protection capabilities may be included in a WAAP offering by default, such as
inspections of API traffic that can be completed at the same inspection point as a WAF.
However, a full API security deployment may require additional sensors and
components to ensure visibility and inventory of all API endpoints and ultimately,
protection of all API communications.
Bot Management
Bot management is the practice of ensuring the integrity of online communications by
limiting access to only authentic human users and desirable bot activities under
controlled and approved conditions. Bot management solutions leverage numerous
signals and insights into client, device, browser, user identity, and behavior combined
with advanced analytics to detect the most sophisticated and elusive bots. These
solutions also provide granular categorization and control over the entire bot
ecosystem based on risk profiles, bot types, or for specific bots.
DDoS Mitigation
The DDoS mitigation market includes solutions that detect and filter distributed denial-
of-service attacks. While DDoS defense features can exist in firewalls, IPS, and other
security products, purpose-built DDoS mitigation solutions are designed to handle the
largest, most complex, and novel attacks. Such products can be on premises or through
the cloud — or a hybrid of the two.
As it relates to WAAP, online fraud and abuse prevention capabilities are typically
rooted in bot management capabilities tuned specifically to address the unique
patterns indicative of specific fraudulent activities such as account takeover or new
account fraud (also called fake account fraud). Insights into user identity, client- and
device-level telemetry, and user behavior are required to fully detect fraud and other
actions that indicate abuse of properly functioning applications and APIs. As a result,
significant variance exists between WAAP solutions in their ability to detect fraud, as
well as how these capabilities are packaged and marketed to buyers.
LEARN MORE
Related Research
▪ Web Application and API Security Survey Presentation, 2024 (IDC #US52509324,
August 2024)
▪ Identifying and Measuring the Costs of Cyberattacks Targeting Web Applications and
APIs (IDC #US52025924, April 2024)
▪ Market Analysis Perspective: Worldwide Active Application Security Market, 2023 (IDC
#US51332023, November 2023)
▪ IDC TechBrief: Client-Side WAF (IDC #US51199423, September 2023)
▪ Worldwide Application Protection and Availability Forecast, 2023–2027: Threat
Escalation and New Frontiers (IDC #US51178423, September 2023)
Synopsis
This IDC study provides an overview of available WAAP solutions on their own merit
while factoring in the advantages of the broader vendor portfolio, strategic and
technical partnerships, intellectual property, acquisitions, total cost of ownership,
customer satisfaction, and competitive differentiators. WAAP is an integrated approach
for enabling secure, performant access to important web applications and related APIs.
The market is rapidly evolving beyond the ability of point products to sufficiently
mitigate risk. As such, there remains a wide range of capabilities and approaches for
security buyers to consider.
"The WAAP market is at a critical juncture as vendors race to protect against the next
generation of online threats while defending against the relentless attacks of the
modern day," according to Christopher Rodriguez, research director for the IDC
Security and Trust team. "At the same time, enterprise buyers are approaching their
WAAP planning in the context of rapidly changing technologies."
Global Headquarters
140 Kendrick Street
Building B
Needham, MA 02494
USA
508.872.8200
Twitter: @IDC
blogs.idc.com
www.idc.com
This IDC research document was published as part of an IDC continuous intelligence service, providing
written research, analyst interactions, and web conference and conference event proceedings. Visit
www.idc.com to learn more about IDC subscription and consulting services. To view a list of IDC offices
worldwide, visit www.idc.com/about/worldwideoffices. Please contact IDC report sales at
+1.508.988.7988 or www.idc.com/?modal=contact_repsales for information on applying the price of this
document toward the purchase of an IDC service or for information on additional copies or web rights.
Copyright 2024 IDC. Reproduction is forbidden unless authorized. All rights reserved.