2012 Winners

  • Winner
    Cisco for Cisco Web SecurityCategory description

    Products in this category generally are appliances. Their purpose is to act as gateways, usually at the perimeter of the enterprise, protecting against various types of malware attempting to enter the enterprise from outside. These typically centrally -managed solutions protect at least against viruses and worms, but may also protect against spam, spyware, phising emails and other malware.

    Category

    Best Anti-Malware Gateway

  • Winner
    ESETCategory description

    These products are used to provide a central management point for mitigation of the threat of malware. They manage the anti-malware software/appliances from a central point, facilitating data file updates, reporting, alerting and more, so also will provide appropriate logging and reporting. They are not in themselves anti-malware products. Malware management, for the purposes of this category, is defined as a product that reduces the threat of malware for small, medium or large enterprises on an organization basis by managing instances of an anti-malware product or products residing on endpoints, servers or gateways.

    Category

    Best Anti-Malware Management (client-based, typically software only)

  • Winner
    IBM for IBM Cloud Security SolutionsCategory description

    These technologies are deployed to protect data and/or applications deployed in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers, and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privileged user access and controls or more.

    Category

    Best Cloud Computing Security

  • Winner
    RSA for RSA NetWitness 9.6Category description

    Products in this category fall into two sub-categories: network and media. The network tools must be exclusively intended for forensic analysis of network events/data. If the product is a SIEM with forensic capabilities, it should be placed in the SIEM category. Media tools cover just about all other non-network forensic tools, including those tools that collect data from media over the network and live forensics tools. This also includes specialized forensic tools that are not intended to analyze network data.

    Category

    Best Computer Forensics Tool

  • Winner
    McAfee for McAfee Database SecurityCategory description

    Protecting its critical information is the number one priority for many organizations. An integral component of this is to secure corporate databases. Entries here should include solutions that help customers safeguard mission-critical database environments. Features of these offerings can run the gamut – from encryption to access management to logging and monitoring. Be sure to explain the specific ways the solution protects these corporate crown jewels and the features present to ensure exposures are mitigated.

    .

    Category

    Best Database Security Solution

  • Winner
    Symantec for Symantec Data Loss PreventionCategory description

    Includes products that help organizations safeguard their intellectual property and customers’ critical data persistently – inside and outside the company. Network-based and endpoint data leakage prevention products will be considered. Products should prevent data from unauthorized exit from the network, or protect data on the endpoint – whether the endpoint is connected to a network or not. Products typciically are policy-driven and should include scanning of all data, regardless of protocol or application leaving the network, and/or keep track of peripherals, such as removable storage and attached to the endpoint – reporting that inventory to a central location or adminstrator. All entrants should have the capability of being managed by a centralized administrator. Those products considered part of this category include: network DLP products, which are typically gateways; those products protecting only endpoints; and hybrid products that operate at both the gateway to the network and at the endpoint. Specifically for endpoint DLP, traffic should be monitored and encryption should be available.

    Category

    Best Data Leakage Prevention

  • Winner
    Proofpoint for Proofpoint Enterprise Protection/Enterprise PrivacyCategory description

    These products may filter email messages based on content, source or other criteria. Direction of flow may be either to the organization, from the organization or both. These products are enterprise-centric and should have, but are not required to have, some form of centralized management. They may include spam filters, junk mail filters, malware filters, unauthorized content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters.

    Category

    Best Email Content Management

  • Winner
    Sophos for Astaro Security Gateway v8.2Category description

    Email security addresses the ability to exchange email messages securely. This includes ensuring the privacy of sensitive messages, limiting the repercussions of email forgery, and managing other aspects of email security within the organization. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use, and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, etc., and more.

    Category

    Best Email Security

  • Winner
    Barracuda Networks for Barracuda NG FirewallCategory description

    Products in this category are organizational firewalls, not personal firewalls. Firewalls must provide a mechanism to filter incoming and outgoing traffic based on port, protocol, source IP address and destination IP address. All products must have the ability to terminate network traffic based on the above filtering criteria.

    Category

    Best Enterprise Firewall

  • Winner
    IronKey for IronKey Trusted AccessCategory description

    Given the reliance on the internet internet for consumers from all walks of life to conduct any number of retail, banking or other transactions, fraud prevention solutions have become critical. Solutions nominated in this category strive to minimize online privacy and security problems that could lead to fraud and, therefore, impact both the company and the customer. Still an evolving area of information security, there are a slew of solutions and services available that could qualify for consideration in this category – from authentication and enhanced encryption solutions to secure web communication or malware detection offerings.

    Category

    Best Fraud Prevention

  • Winner
    CA Technologies for CA IdentityMinder (formerly CA Identity Manager)Category description

    Products in this category address the identity management
    lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management

    Category

    Best Identity Management Application

  • Winner
    Check Point Software Technologies for Check Point IPS Software BladeCategory description

    Products in this category monitor networks for malicious
    behavior and block or prevent those activities.
    Typically, they are for enterprise deployments, moving
    well beyond the desktop.

    Category

    Best Intrusion Detection/Prevention Product

  • Winner
    Dell SecureWorksCategory description

    These security offerings provide a turnkey approach to an organization’s primary technical security needs. These offerings can be either a co-located device at the client organization facility, or can be a completely outsourced solution where the application to be protected would reside at the vendor’s data center.

    Category

    Best Managed Security Service

  • Winner
    Symantec for PGP Whole Disk Encryption from SymantecCategory description

    More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Some examples include iPhones, iPads, Android devices, BlackBerries, and more. Products in this category deal with not only a collapsing perimeter, but also consumer-owned and -controlled devices being used to get at corporate resources. At a minimum, these devices likely will require strong endpoint security, point-to-point encryption and more. This is a broad category. If your product is used to secure this type of small device/handheld,. it may fit. Security can be for data at rest in the device itself, secure access to data in the enterprise, and encryption for data in motion between the enterprise and the device. Includes anything from hard disk encryption solutions and tools that track lost mobile devices to USB/thumb drive security solutions.

    Category

    Best Mobile/Portable Device Security

  • Winner
    Entrust for Entrust IdentityGuardCategory description

    Products provide enhanced security to end-users or devices by offering credentials for access to an authenticator or authentication server. Software and hardware that specializes in the biometric authentication of users is also included here. These solutions may use a tangible device (something you have) for authentication, and knowledge (something you know) for authentication. For biometrics, the solution provides identification and authentication using any of the following methods: finger/thumb print/retinal scan/voice recognition/ hand/palm geometry/facial recognition.

    Category

    Best Multifactor Product