Application Security Best Practices SurveyInsights for the Healthcare Industry
2 
Application Security Benchmark Survey 
Insights for the Healthcare Industry 
•About this survey 
•What is being developed by enterprises? 
•What is not being tested? 
•How will things change in 12 months? 
•Executive commitment 
•A plan to close the gap
3 
About The Survey 
•Conducted by IDGResearch from May-June 2014 
•Respondents: 
-100 US 
-100 UK 
-106 Germany & Switzerland 
26% 
5% 
6% 
6% 
8% 
9% 
11% 
14% 
16% 
Other 
Telecommunications 
Retail, Wholesale 
Healthcare, Medical, Biotech, Pharmaceuticals 
Advertising, PR, Marketing 
Business services, Consulting 
Manufacturing & Distribution 
Computing (HW, SW, Services) 
Financial services (banking, accounting,insurance) 
0% 
10% 
20% 
30% 
17% 
27% 
16% 
21% 
18% 
$500 million - $999.9 million 
$1 billion - $2.9 billion 
$3 billion - $4.9 billion 
$5 billion - $9.9 billion 
$10 billion or more
What is being developed by enterprises?
5 
Healthcare enterprise application portfolio 
Internally Developed vs. Externally Sourced 
Internally developed 
Sourced from commercial software vendor 
Outsourced (developed by third party) 
34% 
42% 
24% 
Source: Veracode and IDGResearch Services 
Q1. With the total equal to 100%, please estimate what proportion of your organization’s total enterprise application portfoliois internally developed vs. externally-developed/ sourced? 
Healthcare Base: 18 
Average number of internally developed enterprise applications 
1829 
Source: Veracode and IDGResearch Services 
Q9. How many internally developed enterprise applications are currently deployed within your organization? 
Healthcare Base: 18
6 
Taxonomy of internally developed applications 
Source: Veracode and IDGResearch Services 
Q3. With the total equal to 100%, approximately what percent of your internally developedenterprise application portfolio falls into the following application architecture categories? 
Healthcare Base: 18 
31% 
25% 
22% 
24% 
Mobile Applications 
Web Applications 
Client/Server Applications 
Terminal Applications 
HEALTHCARE
What is being spent on securing internally developed applications?
8 
Security spending on internally developed enterprise applications 
HEALTHCARE 
0% 
17% 
22% 
17% 
11% 
22% 
11% 
0% 
0% 
35% 
Less than $100,000 
$100,000 to $249,999 
$250,000 to $499,999 
$500,000 to $749,999 
$750,000 to $999,999 
$1M to $2.49M 
$2.5M to $4.9M 
$5M or more 
$1.12M 
Source: Veracode and IDGResearch Services 
Q7a. Please estimate your organization’s overall spend on application security for internally developed applications? 
Total Healthcare Base: 18
9 
Breakdown of application security spending on internally developed applications 
HEALTHCARE 
Penetration Testing 
SAST 
DAST 
Application Discovery/Inventory 
20% 
26% 
31% 
22% 
Source: Veracode and IDGResearch Services 
Q7b. Approximately what percent of your organization’s application security budget for internally developed applications is spent on the following: 
Healthcare Base: 18
What is not being tested?
11 
Internally developed applications not tested for security vulnerabilities 
Source: Veracode and IDG Research Services 
Q5a. For each application architecture listed below, approximately what percentage of your 
organization’s internally developed applications do you test for security vulnerabilities? 
(Total does not have to add up to 100%) 
Healthcare Base: 18 
HEALTHCARE 
MOBILE APPLICATIONS 
63% not tested for vulnerabilities 
WEB APPLICATIONS 
57%not tested for vulnerabilities 
TERMINAL APPLICATIONS 
64%not tested for vulnerabilities 
CLIENT/SERVER APPLICATIONS 
59%not tested for vulnerabilities 
ALL APPLICATIONS 
60%not tested for vulnerabilities 
A
12 
Importance of closing the gaps in application security testing 
HEALTHCARE 
Source: Veracode and IDG Research Services 
Q5b. For each application architecture listed below, how important is it for your organization 
to close the gaps in coverage and move closer to testing 100% of your internally developed 
applications for security vulnerabilities? 
Healthcare Base: 18 
87% MOBILE APPLICATIONS 
(N = 15) 
80% WEB APPLICATIONS 
(N = 15) 
69% CLIENT/SERVER APPLICATIONS 
(N = 16) 
69% TERMINAL APPLICATIONS 
(N = 16) 
Respondent organizations reporting less than 
100% coverage citing a critical or very 
important need to close gaps in coverage:
How will things change in 12 months?
14 
Changes in application security programs: 
12 month projection for Healthcare industry 
Source: Veracode and IDGResearch Services 
Q5a. For each application architecture listed below, approximately what percentage of your organization’s internally developed applications do you test for security vulnerabilities? (Total does not have to add up to 100%) 
Healthcare Base: 18 
2.92% 
average increase 
Change in security spend for internally developed applications 
(or 177 new apps) 
Average growth of internally developed applications 
9.7% 
average increase 
Estimated 2015 Budget: $1.15M 
Estimated 2015 Need: $3.11M 
To test all current and new applications with existing approaches 
$1.95M 
Average gap between need and budget 
Source: Veracode and IDGResearch Services 
Q8. How do you expect your organization’s overall spending on application security for internally developed enterprise applications to change over the next 12 months? 
Healthcare Base: 18
Executive commitment
16 
Executive commitment to application security testing 
HEALTHCARE 
Executives have mandated an enterprise-wide program and are tracking implementation 
Executives are aware of but have not mandated an enterprise-wide program 
Executives are interested in application security for business critical applications only 
Executives have little interest in application security programs 
44% 
28% 
28% 
0% 
Source: Veracode and IDGResearch Services 
Q9. Which of the following most accurately describes the level of executive commitment to application security testing (for internally developed applications) within your organization? 
Healthcare Base: 18
17 
A Plan to Close the Gap* 
Anticipated spending increases are dramatically lower than the minimum spending increase that IDGdetermined is required to close the gap. 
Simply extrapolating the existing assessment approaches to close the gap puts the CSOin an untenable budgetary situation. 
The key is rethinking these elements: 
•How security gets built into applications as they are being developed 
•How to build in security at the scale and pace required to support the more than 340 anticipated new applications that enterprises, on average, will develop in the next 12 months 
•How to build in security so that it lowers the financial burden of proactively managing risk 
By seeking out best practices for implementing application security at scale, CIOsand CSOscan use their expected budget increases for initiatives that tackle their existing gap in a significant way. 
* Except from “Why Application Security is a Business Imperative” IDGResearch, Aug 2014
Start the assessment 
http://www.veracode.com/application-security-assessment

More Related Content

PPTX
Veracode - Inglês
PPTX
Secure Code review - Veracode SaaS Platform - Saudi Green Method
PDF
Veracode - Overview
PPTX
The Four(ish) Appsec Metrics You Can’t Ignore
PDF
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
PDF
Mobile Security: Apps are our digital lives.
PDF
Veracode Corporate Overview - Print
PPTX
Strengthening cyber resilience with Software Supply Chain Visibility
Veracode - Inglês
Secure Code review - Veracode SaaS Platform - Saudi Green Method
Veracode - Overview
The Four(ish) Appsec Metrics You Can’t Ignore
8 Patterns For Continuous Code Security by Veracode CTO Chris Wysopal
Mobile Security: Apps are our digital lives.
Veracode Corporate Overview - Print
Strengthening cyber resilience with Software Supply Chain Visibility

What's hot (20)

PDF
Risks in the Software Supply Chain
PDF
7 measures to overcome cyber attacks of web application
PPTX
Intelligence on the Intractable Problem of Software Security
PDF
Solving for Compliance: Mobile app security for banking and financial services
PPTX
Accelerating Innovation with Software Supply Chain Management
PDF
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
PPT
OWASP: Building Secure Web Apps
PPT
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
PDF
Application Security Management with ThreadFix
PDF
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
PDF
Retail Industry Application Security Survey Insights
PPTX
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
PDF
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
PPT
IBM AppScan Enterprise - The total software security solution
PDF
Fortify Continuous Delivery
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
PPTX
Application Hackers Have A Handbook. Why Shouldn't You?
PDF
5 things about os sharon webinar final
PDF
The AppSec Path to Enlightenment
Risks in the Software Supply Chain
7 measures to overcome cyber attacks of web application
Intelligence on the Intractable Problem of Software Security
Solving for Compliance: Mobile app security for banking and financial services
Accelerating Innovation with Software Supply Chain Management
Tools & Techniques for Addressing Component Vulnerabilities for PCI Compliance
OWASP: Building Secure Web Apps
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Application Security Management with ThreadFix
Lawyers and Licenses in Open Source-based Development: How to Protect Your So...
Retail Industry Application Security Survey Insights
WhiteSource Webinar-New Research Reveals Key Strategy to Manage Open Source S...
Pactera - App Security Assessment - Mobile, Web App, IoT - v2
IBM AppScan Enterprise - The total software security solution
Fortify Continuous Delivery
SAST vs. DAST: What’s the Best Method For Application Security Testing?
Snippets, Scans and Snap Decisions: How Component Identification Methods Impa...
Application Hackers Have A Handbook. Why Shouldn't You?
5 things about os sharon webinar final
The AppSec Path to Enlightenment
Ad

Viewers also liked (16)

PDF
Veracode Automation CLI (using Jenkins for SDL integration)
PDF
ANSYS-Advantage-Healthcare-AA-V9-I1
PPTX
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
PDF
The Seven Kinds of Security
ODP
AllDayDevOps ZAP automation in CI
PPTX
It All Started With a Wager About System Upgrades
PDF
Building a deployment pipeline
PDF
Development stack for an healthcare application
PDF
Highly efficient container orchestration and continuous delivery with DC/OS a...
PPTX
Iot for e-health system project concept
ODP
Automating OWASP ZAP - DevCSecCon talk
PPTX
advantage and disadvantage of technology
PDF
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
PDF
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
PPTX
The OWASP Zed Attack Proxy
ODP
Another 7 tools for your #devops stack
Veracode Automation CLI (using Jenkins for SDL integration)
ANSYS-Advantage-Healthcare-AA-V9-I1
Scripts that automate OWASP ZAP as part of a continuous delivery pipeline
The Seven Kinds of Security
AllDayDevOps ZAP automation in CI
It All Started With a Wager About System Upgrades
Building a deployment pipeline
Development stack for an healthcare application
Highly efficient container orchestration and continuous delivery with DC/OS a...
Iot for e-health system project concept
Automating OWASP ZAP - DevCSecCon talk
advantage and disadvantage of technology
Using jira to manage risks v1.0 - owasp app sec eu - june 2016
Building Self-Defending Applications With OWASP AppSensor JavaOne 2016
The OWASP Zed Attack Proxy
Another 7 tools for your #devops stack
Ad

Similar to Healthcare application-security-practices-survey-veracode (20)

PDF
application-security-fallacies-and-realities-veracode
PDF
Selling Your Organization on Application Security
PDF
RPRT-GTM-1447315136-soas-bfsi-mini-report-FINAL.pdf
PDF
Does Application Security Pay? Measuring the Business Impact of Software Secu...
PDF
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
PPTX
Webinar: CX up AND costs down?
PDF
ultimate-guide-to-getting-started-with-appsec-veracode
PDF
Apperian 2015 Executive Enterprise Mobility Survey
PDF
Ultimate_Guide_to_getting_started_with_AppSec
PDF
Market landscape how pervasive technology has changed the game
PDF
Training Catalogue - CyberSec_Technocracy.pdf
PDF
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
PDF
Web Application Security Statistics Report 2016
PDF
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
PDF
Caspio Low-Code Report, 2020
PPTX
Audit Software Market Trends, Size & Forecast 2025–2034
PDF
Insurance rating software market
PDF
SECURITY
PDF
Website Security Statistics Report 2013
PDF
Apperian 2014 Executive Enterprise Mobility Report
application-security-fallacies-and-realities-veracode
Selling Your Organization on Application Security
RPRT-GTM-1447315136-soas-bfsi-mini-report-FINAL.pdf
Does Application Security Pay? Measuring the Business Impact of Software Secu...
ANIn Bengaluru July 2024 | Digital Transformation – Protect IT! by Pankaj Sayal
Webinar: CX up AND costs down?
ultimate-guide-to-getting-started-with-appsec-veracode
Apperian 2015 Executive Enterprise Mobility Survey
Ultimate_Guide_to_getting_started_with_AppSec
Market landscape how pervasive technology has changed the game
Training Catalogue - CyberSec_Technocracy.pdf
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Web Application Security Statistics Report 2016
Breaches Are Bad for Business. How Will You Detect and Respond to Your Next C...
Caspio Low-Code Report, 2020
Audit Software Market Trends, Size & Forecast 2025–2034
Insurance rating software market
SECURITY
Website Security Statistics Report 2013
Apperian 2014 Executive Enterprise Mobility Report

Recently uploaded (20)

DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Geologic Time for studying geology for geologist
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PDF
STKI Israel Market Study 2025 version august
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Configure Apache Mutual Authentication
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Flame analysis and combustion estimation using large language and vision assi...
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
Geologic Time for studying geology for geologist
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
STKI Israel Market Study 2025 version august
Improvisation in detection of pomegranate leaf disease using transfer learni...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
CloudStack 4.21: First Look Webinar slides
Enhancing plagiarism detection using data pre-processing and machine learning...
Configure Apache Mutual Authentication
Taming the Chaos: How to Turn Unstructured Data into Decisions
Consumable AI The What, Why & How for Small Teams.pdf
sustainability-14-14877-v2.pddhzftheheeeee
TEXTILE technology diploma scope and career opportunities
1 - Historical Antecedents, Social Consideration.pdf
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Zenith AI: Advanced Artificial Intelligence
Custom Battery Pack Design Considerations for Performance and Safety
Flame analysis and combustion estimation using large language and vision assi...

Healthcare application-security-practices-survey-veracode

  • 1. Application Security Best Practices SurveyInsights for the Healthcare Industry
  • 2. 2 Application Security Benchmark Survey Insights for the Healthcare Industry •About this survey •What is being developed by enterprises? •What is not being tested? •How will things change in 12 months? •Executive commitment •A plan to close the gap
  • 3. 3 About The Survey •Conducted by IDGResearch from May-June 2014 •Respondents: -100 US -100 UK -106 Germany & Switzerland 26% 5% 6% 6% 8% 9% 11% 14% 16% Other Telecommunications Retail, Wholesale Healthcare, Medical, Biotech, Pharmaceuticals Advertising, PR, Marketing Business services, Consulting Manufacturing & Distribution Computing (HW, SW, Services) Financial services (banking, accounting,insurance) 0% 10% 20% 30% 17% 27% 16% 21% 18% $500 million - $999.9 million $1 billion - $2.9 billion $3 billion - $4.9 billion $5 billion - $9.9 billion $10 billion or more
  • 4. What is being developed by enterprises?
  • 5. 5 Healthcare enterprise application portfolio Internally Developed vs. Externally Sourced Internally developed Sourced from commercial software vendor Outsourced (developed by third party) 34% 42% 24% Source: Veracode and IDGResearch Services Q1. With the total equal to 100%, please estimate what proportion of your organization’s total enterprise application portfoliois internally developed vs. externally-developed/ sourced? Healthcare Base: 18 Average number of internally developed enterprise applications 1829 Source: Veracode and IDGResearch Services Q9. How many internally developed enterprise applications are currently deployed within your organization? Healthcare Base: 18
  • 6. 6 Taxonomy of internally developed applications Source: Veracode and IDGResearch Services Q3. With the total equal to 100%, approximately what percent of your internally developedenterprise application portfolio falls into the following application architecture categories? Healthcare Base: 18 31% 25% 22% 24% Mobile Applications Web Applications Client/Server Applications Terminal Applications HEALTHCARE
  • 7. What is being spent on securing internally developed applications?
  • 8. 8 Security spending on internally developed enterprise applications HEALTHCARE 0% 17% 22% 17% 11% 22% 11% 0% 0% 35% Less than $100,000 $100,000 to $249,999 $250,000 to $499,999 $500,000 to $749,999 $750,000 to $999,999 $1M to $2.49M $2.5M to $4.9M $5M or more $1.12M Source: Veracode and IDGResearch Services Q7a. Please estimate your organization’s overall spend on application security for internally developed applications? Total Healthcare Base: 18
  • 9. 9 Breakdown of application security spending on internally developed applications HEALTHCARE Penetration Testing SAST DAST Application Discovery/Inventory 20% 26% 31% 22% Source: Veracode and IDGResearch Services Q7b. Approximately what percent of your organization’s application security budget for internally developed applications is spent on the following: Healthcare Base: 18
  • 10. What is not being tested?
  • 11. 11 Internally developed applications not tested for security vulnerabilities Source: Veracode and IDG Research Services Q5a. For each application architecture listed below, approximately what percentage of your organization’s internally developed applications do you test for security vulnerabilities? (Total does not have to add up to 100%) Healthcare Base: 18 HEALTHCARE MOBILE APPLICATIONS 63% not tested for vulnerabilities WEB APPLICATIONS 57%not tested for vulnerabilities TERMINAL APPLICATIONS 64%not tested for vulnerabilities CLIENT/SERVER APPLICATIONS 59%not tested for vulnerabilities ALL APPLICATIONS 60%not tested for vulnerabilities A
  • 12. 12 Importance of closing the gaps in application security testing HEALTHCARE Source: Veracode and IDG Research Services Q5b. For each application architecture listed below, how important is it for your organization to close the gaps in coverage and move closer to testing 100% of your internally developed applications for security vulnerabilities? Healthcare Base: 18 87% MOBILE APPLICATIONS (N = 15) 80% WEB APPLICATIONS (N = 15) 69% CLIENT/SERVER APPLICATIONS (N = 16) 69% TERMINAL APPLICATIONS (N = 16) Respondent organizations reporting less than 100% coverage citing a critical or very important need to close gaps in coverage:
  • 13. How will things change in 12 months?
  • 14. 14 Changes in application security programs: 12 month projection for Healthcare industry Source: Veracode and IDGResearch Services Q5a. For each application architecture listed below, approximately what percentage of your organization’s internally developed applications do you test for security vulnerabilities? (Total does not have to add up to 100%) Healthcare Base: 18 2.92% average increase Change in security spend for internally developed applications (or 177 new apps) Average growth of internally developed applications 9.7% average increase Estimated 2015 Budget: $1.15M Estimated 2015 Need: $3.11M To test all current and new applications with existing approaches $1.95M Average gap between need and budget Source: Veracode and IDGResearch Services Q8. How do you expect your organization’s overall spending on application security for internally developed enterprise applications to change over the next 12 months? Healthcare Base: 18
  • 16. 16 Executive commitment to application security testing HEALTHCARE Executives have mandated an enterprise-wide program and are tracking implementation Executives are aware of but have not mandated an enterprise-wide program Executives are interested in application security for business critical applications only Executives have little interest in application security programs 44% 28% 28% 0% Source: Veracode and IDGResearch Services Q9. Which of the following most accurately describes the level of executive commitment to application security testing (for internally developed applications) within your organization? Healthcare Base: 18
  • 17. 17 A Plan to Close the Gap* Anticipated spending increases are dramatically lower than the minimum spending increase that IDGdetermined is required to close the gap. Simply extrapolating the existing assessment approaches to close the gap puts the CSOin an untenable budgetary situation. The key is rethinking these elements: •How security gets built into applications as they are being developed •How to build in security at the scale and pace required to support the more than 340 anticipated new applications that enterprises, on average, will develop in the next 12 months •How to build in security so that it lowers the financial burden of proactively managing risk By seeking out best practices for implementing application security at scale, CIOsand CSOscan use their expected budget increases for initiatives that tackle their existing gap in a significant way. * Except from “Why Application Security is a Business Imperative” IDGResearch, Aug 2014
  • 18. Start the assessment http://www.veracode.com/application-security-assessment