IDC MarketScape: Worldwide Web Application and API - Akamai
IDC MarketScape: Worldwide Web Application and API - Akamai
FIGURE 1
IN THIS EXCERPT
The content for this excerpt was taken directly from IDC MarketScape: Worldwide Web
Application and API Protection Enterprise Platforms 2024 Vendor Assessment (Doc #
US51795524). All or parts of the following sections are included in this excerpt: IDC
Opinion, IDC MarketScape Vendor Inclusion Criteria, Essential Guidance, Vendor
Summary Profile, Appendix and Learn More. Also included is Figure 1 and 2.
IDC OPINION
Web applications are foundational components of the modern digital business,
providing the functionality required to interact with customers and prospects, partners
and guests, and employees and contractors. Attackers continually probe these
applications and related application programming interfaces (APIs) for opportunities to
steal data, gain illicit access, or defraud businesses for personal illicit gain. Attacks
targeting web applications and APIs have led to high-profile data breaches, costly
downtime, and real-world impacts including theft. End users and customers often bear
the brunt of the impact through financial losses. Eventually, this can result in a loss of
customer trust and less willingness to conduct business online.
Online cybercrime is more than a mere nuisance. It has the potential to degrade and
disrupt business results. Over the years, businesses have adopted numerous security
tools to address the steady stream of new threat tactics and expanding attack surfaces.
Web application firewall (WAF) offers a foundational level of protection against known
and emerging application layer exploits. Enterprises have layered in numerous
specialized solutions such as DDoS mitigation, bot management, and more recently, API
security.
Web application and API protection (WAAP) combines these essential security
technologies into an integrated, coherent platform to ensure a reliable level of
protection against vast online threats. Consolidated, integrated platforms help reduce
security gaps, reduce management complexity, and provide streamlined inspections.
IDC research shows that 77% of businesses rate integration between security solutions
as "important" or of "critical importance." Applications face an array of threats each
day, and attackers intentionally leverage multiple tactics to identify weaknesses in the
defenses. As a result, application security strategies that focus on specialized security
silos are set up for eventual failure. Security convergence and consolidation are a
critical step for enabling a stronger security posture, whether through improved
However, convergence yields many business benefits as well, such as reduced time and
resources required for deployment and management, improved user experience, and
improved analytics. In addition, performing all security functionalities in one service
reduces the latency introduced by routing traffic to multiple security inspection points.
The combination of WAF and API security is critical to ensure complete coverage of web
applications across all interfaces and attack surfaces. The WAAP value proposition is
rounded out by technologies designed to address specialized threat types such as
DDoS attacks and unwanted bot activities. These threats vary widely in terms of ease of
detection, difficulty of mitigation, frequency of occurrence, and severity of impact.
Ultimately, a complete application protection stack requires WAF and API security,
DDoS mitigation, and bot management. However, the unique technical requirements of
APIs and specialized requirements of DDoS attacks and bot activities mean that the
evolution toward WAAP is a long winding journey.
Vendors must offer a converged WAAP solution that combines two more of the
following into a unified security platform:
▪ API security
▪ Bot management
▪ DDoS mitigation
▪ Web application firewall
Note that WAF is considered foundational and must be included to be considered as
WAAP. Furthermore, one-off sales of WAAP components as standalone solutions will
not be counted as WAAP.
In addition, this IDC MarketScape analysis includes the following requirements for
market participation and presence:
Strategy Considerations
In addition, given the rapidly evolving nature of web application and API technologies,
shifting business practices, and a constant level of adaptation and innovation by threat
actors, security buyers should be highly aware of the solution's ability to meet their
needs over the next three to five years. Furthermore:
Akamai
Akamai is a Leader in this 2024 IDC MarketScape for worldwide WAAP enterprise
platforms.
Akamai is a worldwide provider of networking and security delivered from the Akamai
Connected Cloud, a distributed edge and cloud platform, that puts applications and
experiences closer to users and keeps threats farther away. Akamai has specialized in
the enterprise market with strong penetration in the Fortune 500. The Akamai security
portfolio includes an integrated WAAP solution called App & API Protector (AAP), as well
as dedicated solutions in the categories of API security, DDoS mitigation, bot
management, account protection, WAF, client-side protection and compliance, DNS,
Strengths
Capabilities
▪ Adaptive Security Engine (ASE) provides self-tuning for reliable usage of out-of-
the-box rules. ASE provides better zero-day protection, improves detections (by a
factor of 2x, according to Akamai) and reduces false positives (by a factor of up to
5x, according to Akamai), and enables auto updates for continuous ease of use.
ASE is powered by Akamai security intelligence.
▪ ASE provides false positive flagging for easier/faster remediation of false
positives. Akamai claims over 50% after one day and 75% within a week.
▪ Comprehensive WAAP suite offers a one-stop shopping experience for
simplified/complete security. A single WAAP SKU is available, with add-ons
offered for advanced or specialized functionality.
▪ Extensive add-ons and specialized solutions provide alignment to use case–
specific requirement such as ATO, brand protection, and scraper (hype event)
protection.
▪ Akamai offers a very large-scale edge/CDN infrastructure. Providing protection
near to user ensures performance.
▪ Support for DevOps workflows supports the shift left strategies of enterprise
customers. Support for management and deployment through APIs, CLI, and
Terraform improves security posture without slowing developers.
▪ Existing integrations with related security tooling simplify integration with
broader security architecture for better security outcomes. The solution includes
prebuilt connectors for Splunk, Qradar, and ArcSight.
▪ A multimode approach to API security is offered. The approach delivers
protections for known, on-platform API traffic out of the box and complete API
protection later as needed.
▪ Breadth of additional related capabilities offered along with WAAP ensures
security does not hinder performance. The portfolio includes solutions such as
SiteShield, mPulse Lite, EdgeWorkers, Image & Video Manager, and API
Acceleration.
▪ Akamai recently introduced new capabilities for application layer DDoS
mitigation including short burst detection and customizable rate limiting based
on granular contextual clues. These address the full breadth of DDoS attacks
including the specialized needs of application layer attacks.
Challenges
Capabilities
▪ AI/ML engines do not allow for easy tuning by customers (i.e., cannot change
order of rules). This may create delays in responding to false positives and
require collaboration with Akamai to resolve. Temporary exceptions and
workarounds are a possible option for navigating rule order complexities.
APPENDIX
Positioning on the x-axis, or strategies axis, indicates how well the vendor's future
strategy aligns with what customers will require in three to five years. The strategies
category focuses on high-level decisions and underlying assumptions about offerings,
customer segments, and business and go-to-market plans for the next three to five
years.
The size of the individual vendor markers in the IDC MarketScape represents the
market share of each individual vendor within the specific market segment being
assessed.
For each specific criteria, vendors were evaluated on a one to five scale, with three
considered the baseline that indicates an average assessment, five representing the
best and rarest assessment, and one being the lowest and also similarly rare. The
criteria were then weighted based on analyst perspective and understanding of general
market trends to best inform IT buyer decision-making. Evaluations for each criterion
was also weighted between a "quantitative" assessment and a "qualitative" assessment,
as was most appropriate and relevant to the specific criterion.
Figure 1 provides a visual representation of several factors that are translated into a
positioning along each axis. Existing product-specific features and functionality are an
important component of the "capabilities" axis, but many more factors are considered
as well. Similarly, the "strategies" axis heavily considers the vendor's plans for future
product developments. However, several factors are also considered including the
strength of the overall business and go-to-market plans. These factors may have a long-
term impact on the solution, and IDC has adjusted the weights of these criteria
accordingly. Overall, several factors go into each vendor assessment, and readers are
advised to consider Figure 1 in the context provided in the vendor profiles.
Market Definition
WAAP is a converged security solution for active application protection with WAF at its
core. WAAP solutions combine multiple functions into a unified security platform
including WAF, bot management, API security, DDoS mitigation, and other security
technologies. However, WAF is considered foundational and must be an integral
component to be considered as WAAP. Furthermore, one-off sales of WAAP
components as standalone solutions will not be counted as WAAP.
API Security
API security solutions are specifically designed to protect API communications against
misuse, abuse, and exploits. These solutions provide essential capabilities, in part or in
whole, such as API schema ingestion, validation, and enforcement; dynamic and
adaptive traffic monitoring and pattern analysis; and detection/prevention of threats
such as malware, exploits, code injection, bots, DDoS attacks, fraud, and abuse.
Some API protection capabilities may be included in a WAAP offering by default, such as
inspections of API traffic that can be completed at the same inspection point as a WAF.
However, a full API security deployment may require additional sensors and
components to ensure visibility and inventory of all API endpoints and ultimately,
protection of all API communications.
Bot Management
Bot management is the practice of ensuring the integrity of online communications by
limiting access to only authentic human users and desirable bot activities under
controlled and approved conditions. Bot management solutions leverage numerous
signals and insights into client, device, browser, user identity, and behavior combined
with advanced analytics to detect the most sophisticated and elusive bots. These
solutions also provide granular categorization and control over the entire bot
ecosystem based on risk profiles, bot types, or for specific bots.
DDoS Mitigation
The DDoS mitigation market includes solutions that detect and filter distributed denial-
of-service attacks. While DDoS defense features can exist in firewalls, IPS, and other
security products, purpose-built DDoS mitigation solutions are designed to handle the
largest, most complex, and novel attacks. Such products can be on premises or through
the cloud — or a hybrid of the two.
As it relates to WAAP, online fraud and abuse prevention capabilities are typically
rooted in bot management capabilities tuned specifically to address the unique
patterns indicative of specific fraudulent activities such as account takeover or new
account fraud (also called fake account fraud). Insights into user identity, client- and
device-level telemetry, and user behavior are required to fully detect fraud and other
LEARN MORE
Related Research
▪ Web Application and API Security Survey Presentation, 2024 (IDC #US52509324,
August 2024)
▪ Identifying and Measuring the Costs of Cyberattacks Targeting Web Applications and
APIs (IDC #US52025924, April 2024)
▪ Market Analysis Perspective: Worldwide Active Application Security Market, 2023 (IDC
#US51332023, November 2023)
▪ IDC TechBrief: Client-Side WAF (IDC #US51199423, September 2023)
▪ Worldwide Application Protection and Availability Forecast, 2023–2027: Threat
Escalation and New Frontiers (IDC #US51178423, September 2023)
▪ Worldwide Application Protection and Availability Market Shares, 2022: Platforms
Compete with Emerging Technologies (IDC #US51204923, September 2023)
▪ Tales of the Tape: WAF and API Protection Emerge as Security Essentials (IDC
#US51187923, September 2023)
Synopsis
This IDC study provides an overview of available WAAP solutions on their own merit
while factoring in the advantages of the broader vendor portfolio, strategic and
technical partnerships, intellectual property, acquisitions, total cost of ownership,
customer satisfaction, and competitive differentiators. WAAP is an integrated approach
for enabling secure, performant access to important web applications and related APIs.
The market is rapidly evolving beyond the ability of point products to sufficiently
mitigate risk. As such, there remains a wide range of capabilities and approaches for
security buyers to consider.
"The WAAP market is at a critical juncture as vendors race to protect against the next
generation of online threats while defending against the relentless attacks of the
modern day," according to Christopher Rodriguez, research director for the IDC
Security and Trust team. "At the same time, enterprise buyers are approaching their
WAAP planning in the context of rapidly changing technologies."
Global Headquarters
140 Kendrick Street
Building B
Needham, MA 02494
USA
508.872.8200
Twitter: @IDC
blogs.idc.com
www.idc.com
This IDC research document was published as part of an IDC continuous intelligence service, providing
written research, analyst interactions, and web conference and conference event proceedings. Visit
www.idc.com to learn more about IDC subscription and consulting services. To view a list of IDC offices
worldwide, visit www.idc.com/about/worldwideoffices. Please contact IDC report sales at
+1.508.988.7988 or www.idc.com/?modal=contact_repsales for information on applying the price of this
document toward the purchase of an IDC service or for information on additional copies or web rights.
Copyright 2024 IDC. Reproduction is forbidden unless authorized. All rights reserved.