Blue Coat Proxy SG, Proxy AV
Blue Coat Systems
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Blue Coat Systems Proxy SG and Proxy AV products beat out the competition with high marks from readers for their ease of installation, configuration and administration plus their granular, flexible policy creation and enforcement. Readers also were impressed with the products' return on investment and vendor service and support. ProxySG appliances enable policy control over content, users, applications and protocols to protect users and networks from Web threats. Proxy AV appliances, designed for use with the ProxySG Full Proxy Edition appliances, provide inline threat protection and malware scanning at the gateway.
McAfee Secure Web Gateway
For the second year in a row, McAfee ranks in our top three with its McAfee Secure Web Gateway appliance. Earning the silver this year, the product was cited for its granular, flexible policy creation and enforcement, detection of known Web-based threats, and comprehensive and customized reporting features. The McAfee Secure Web Gateway integrates numerous protections from Web filtering and anti-malware to SSL scanning and content control, all with a simplified management footprint and a flexible policy engine.
SonicWALL Content Filtering Service
The SonicWALL Content Filtering Service garnered the bronze, receiving favorable reviews from readers for its granular, flexible policy creation and enforcement and ability to detect both known and unknown Web-based threats, and vendor service and support. SonicWALL CFS is built around a Web site caching and rating architecture that allows administrators to automatically block sites by category for easier administration. The appliance categorizes millions of URLs, IP addresses and domains in a continuously updated database to ensure high levels of protection.
2010 READERS' CHOICE AWARDS WINNERS
Introduction and Methodology
Best Antimalware Products
Readers vote on the best business-grade desktop and server antivirus and antispyware products.
Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.
Best Data Loss Prevention Products
Readers vote on the best network, client and combined data loss prevention software and appliances for enterprise and midmarket deployments.
Best Identity and Access Management Products
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning.
Best Intrusion Detection and Prevention Products
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection.
Best Messaging Security Products
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services.
Best Mobile Data Security Products
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection.
Best Network Access Control Products
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.
Best Network Firewalls
Readers vote on the best network firewalls, including enterprise-caliber network firewall appliances and software, and stateful packet filtering firewalls with advanced application/protocol layer filtering.
Best Secure Remote Access Products
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services.
Best Security Information and Event Management Products
Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
Best Unified Threat Management Products
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.
Best Vulnerability Management Products
Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability management lifecycle products.
Best Web Security Gateway Products
Readers vote on the best Web security gateway products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention.