Essential Guide

This Essential Guide is a collection of articles, videos and other content selected by our editors to give you a comprehensive view of this topic.

Security Readers' Choice Awards 2013

We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.

ISM Award WinnersFor the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories.

Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion.

Best of 2013

1. Application security

Readers vote on the best Application Security products for 2013: Static and dynamic vulnerability scanners, and other source code analysis products and services used during development.

Best of 2013

2. Authentication

Readers vote on the best Authentication products for 2013: Digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards, knowledge-based systems, digital certificates, biometrics, cell phone-based authentication.

Best of 2013

3. Cloud security

Readers vote on the best Cloud Security products for 2013: Services and products designed to secure business use of cloud computing, including data encryption, identity and access management and network security.

Best of 2013

4. Data loss prevention

Readers vote on the best Data Loss Prevention products in 2013: Network, client and combined data leakage prevention software and appliances for enterprise and midmarket deployments, as well as “DLP lite” email-only products.

  • Best of data loss prevention 2013

    Readers vote on the top data loss prevention products in 2013: Information loss prevention, extrusion prevention, protecting intellectual property, identifying and securing sensitive data.

    Award Winners

Best of 2013

5. Email security

Readers vote on the best Email Security products in 2013: Antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Includes email archiving and e-discovery products and services.

  • Best of email security 2013

    Readers vote on their top email security products in 2013: Antispam, antiphishing, email antivirus, spyware, antimalware filtering through software and appliances.

    Award Winners

Best of 2013

6. Encryption

Readers vote on the best Encryption products in 2013: Hardware and software-based file and full-disk encryption, and network encryption products.

Best of 2013

7. Endpoint security

Readers vote on the best Endpoint Security products in 2013: Business-grade desktop and server antimalware and endpoint protection suites that include antivirus and antispyware, using signature-, behavior- and anomaly-based detection, whitelisting, host-based intrusion prevention and client firewalls.

Best of 2013

8. Enterprise firewalls

Readers vote on the best Enterprise Firewalls in 2013: Enterprise-caliber network firewall appliances and software, stateful packet filtering firewalls with advanced application layer and protocol filtering.

Best of 2013

9. Identity and access management

Readers vote on the best Identity and Access Management products in 2013: User identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

Best of 2013

10. Intrusion detection and prevention

Readers vote on the best Intrusion Detection and Prevention products in 2013: Network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based technologies to identify denial-of service, malware- and hacker-attack traffic patterns.

Best of 2013

11. Mobile data security

Readers vote on the best Mobile Data Security products in 2013: Smartphone and tablet data protection products including antimalware, mobile access, platform-specific security (Android, iOS, Windows and BlackBerry), mobile device management, mobile application management and mobile application security.

Best of 2013

12. Network access control

Readers vote on the best Network Access Control products in 2013: Appliance, software and infrastructure user and device network access policy creation, compliance, enforcement (802.1X, client-based, DHCP) and remediation products.

Best of 2013

13. Policy and risk management

Readers vote on the best Policy and Risk Management products in 2013: Risk assessment and modeling, and policy creation, monitoring and reporting products and services. Incudes IT governance, risk and compliance products, and configuration management.

Best of 2013

14. Remote access

Readers vote on the best Remote Access products in 2013: IPsec VPN, SSL VPN (stand-alone and as part of application acceleration and delivery systems) and combined systems and products, as well as other remote access products and services.

  • Best of remote access 2013

    Readers vote on the top Remote Access products in 2013: IPsec VPN and SSL VPN (standalone and as part of application acceleration and delivery systems).

    Award Winners

Best of 2013

15. SIEM

Readers vote on the best SIEM products in 2013: Security information and event management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.

Best of 2013

16. Unified threat management

Readers vote on the best Unified Threat Management products in 2013: UTM appliances that integrate firewall, VPN, gateway antivirus, URL Web filtering, antispam and more.

Best of 2013

17. Vulnerability management

Readers vote on the best Vulnerability Management products in 2013: Network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability lifecycle management.

Best of 2013

18. Web application firewalls

Readers vote on the best Web Application Firewalls in 2013: Standalone Web application firewalls and WAFs that are part of application acceleration and delivery systems.

Best of 2013

19. Web security

Readers vote on the best Web Security products in 2013: Software and hardware products, hosted Web services for inbound and outbound content filtering for malware activity detection/prevention, static and dynamic URL filtering and application control (IM, P2P).