Essential Guide

Security Readers' Choice Awards 2013

We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.

Introduction

For the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories.

Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion.

1Application security-

Best of 2013

Readers vote on the best Application Security products for 2013: Static and dynamic vulnerability scanners, and other source code analysis products and services used during development.

Feature

Best of application security 2013

We tallied our readers' votes to determine their choices for the best application security products of the year in the 2013 Readers' Choice Awards. Continue Reading

2Authentication-

Best of 2013

Readers vote on the best Authentication products for 2013: Digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards, knowledge-based systems, digital certificates, biometrics, cell phone-based authentication.

Feature

Best of authentication 2013

Readers vote for the top authentication products in 2013: Digital identity verification products, services and management systems. Continue Reading

3Cloud security-

Best of 2013

Readers vote on the best Cloud Security products for 2013: Services and products designed to secure business use of cloud computing, including data encryption, identity and access management and network security.

Feature

Best of cloud security 2013

See which vendors' offerings our readers voted to be the best cloud security products of the year in our 2013 Readers' Choice Awards. Continue Reading

4Data loss prevention-

Best of 2013

Readers vote on the best Data Loss Prevention products in 2013: Network, client and combined data leakage prevention software and appliances for enterprise and midmarket deployments, as well as “DLP lite” email-only products.

Feature

Best of data loss prevention 2013

Readers vote on the top data loss prevention products in 2013: Information loss prevention, extrusion prevention, protecting intellectual property, identifying and securing sensitive data. Continue Reading

5Email security-

Best of 2013

Readers vote on the best Email Security products in 2013: Antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Includes email archiving and e-discovery products and services.

Feature

Best of email security 2013

Readers vote on their top email security products in 2013: Antispam, antiphishing, email antivirus, spyware, antimalware filtering through software and appliances. Continue Reading

6Encryption-

Best of 2013

Readers vote on the best Encryption products in 2013: Hardware and software-based file and full-disk encryption, and network encryption products.

Feature

Best of encryption products 2013

Readers vote on the top encryption products in 2013: full drive encryption, mobile storage, certificate management and secure communications. Continue Reading

7Endpoint security-

Best of 2013

Readers vote on the best Endpoint Security products in 2013: Business-grade desktop and server antimalware and endpoint protection suites that include antivirus and antispyware, using signature-, behavior- and anomaly-based detection, whitelisting, host-based intrusion prevention and client firewalls.

Feature

Best of endpoint security 2013

Readers vote on the top endpoint security products in 2013: Business-grade desktop and server antimalware and endpoint protection suites. Continue Reading

8Enterprise firewall-

Best of 2013

Readers vote on the best Enterprise Firewalls in 2013: Enterprise-caliber network firewall appliances and software, stateful packet filtering firewalls with advanced application layer and protocol filtering.

Feature

Best of enterprise firewalls 2013

Find out which enterprise firewalls received top honors from voters this year in Information Security magazine's Readers' Choice 2013 awards. Continue Reading

9Identity and access management-

Best of 2013

Readers vote on the best Identity and Access Management products in 2013: User identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

Feature

Best of identity and access management 2013

Readers honor the top identity and access management products in 2013: Access privilege and authorization management, SSO, identity provisioning. Continue Reading

10Intrusion detection and preven-

Best of 2013

Readers vote on the best Intrusion Detection and Prevention products in 2013: Network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based technologies to identify denial-of service, malware- and hacker-attack traffic patterns.

Feature

Best of intrusion detection and prevention 2013

Readers vote on the top intrusion detection and prevention products in 2013: Network-based IDS and IPS appliances, attack traffic patterns. Continue Reading

11Mobile data security-

Best of 2013

Readers vote on the best Mobile Data Security products in 2013: Smartphone and tablet data protection products including antimalware, mobile access, platform-specific security (Android, iOS, Windows and BlackBerry), mobile device management, mobile application management and mobile application security.

Feature

Best of mobile data security 2013

Readers vote on the best mobile data security products in 2013: Mobile device management, mobile app management, data and malware protection. Continue Reading

12Network access control-

Best of 2013

Readers vote on the best Network Access Control products in 2013: Appliance, software and infrastructure user and device network access policy creation, compliance, enforcement (802.1X, client-based, DHCP) and remediation products.

Feature

Best of network access control 2013

Readers vote on the top Network Access Control products in 2013: Network access policy creation, compliance, enforcement and remediation products. Continue Reading

13Policy and risk management-

Best of 2013

Readers vote on the best Policy and Risk Management products in 2013: Risk assessment and modeling, and policy creation, monitoring and reporting products and services. Incudes IT governance, risk and compliance products, and configuration management.

Feature

Best of policy and risk management 2013

Readers vote on the top policy and risk management products in 2013: IT governance, risk and compliance products, and configuration management. Continue Reading

14Remote access-

Best of 2013

Readers vote on the best Remote Access products in 2013: IPsec VPN, SSL VPN (stand-alone and as part of application acceleration and delivery systems) and combined systems and products, as well as other remote access products and services.

Feature

Best of remote access 2013

Readers vote on the top Remote Access products in 2013: IPsec VPN and SSL VPN (standalone and as part of application acceleration and delivery systems). Continue Reading

15SIEM-

Best of 2013

Readers vote on the best SIEM products in 2013: Security information and event management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.

Feature

Best of security information and event management 2013

Readers rate the top SIEMs in 2013: Software, appliances and managed services for security monitoring, incident response and compliance reporting. Continue Reading

16UTM-

Best of 2013

Readers vote on the best Unified Threat Management products in 2013: UTM appliances that integrate firewall, VPN, gateway antivirus, URL Web filtering, antispam and more.

Feature

Best of unified threat management 2013

Readers rate the top unified threat management products in 2013: integrated security systems with firewall, content filtering and antivirus software. Continue Reading

17Vulnerability management-

Best of 2013

Readers vote on the best Vulnerability Management products in 2013: Network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability lifecycle management.

Feature

Best of vulnerability management 2013

Readers pick the top vulnerability management products in 2013: Network vulnerability scanners, patch management, reporting, remediation, compliance. Continue Reading

18Web application firewalls-

Best of 2013

Readers vote on the best Web Application Firewalls in 2013: Standalone Web application firewalls and WAFs that are part of application acceleration and delivery systems.

Feature

Best of Web application firewalls 2013

Readers vote on the top Web application firewalls in 2013: Standalone WAFs and products that are part of application acceleration/delivery systems. Continue Reading

19Web security-

Best of 2013

Readers vote on the best Web Security products in 2013: Software and hardware products, hosted Web services for inbound and outbound content filtering for malware activity detection/prevention, static and dynamic URL filtering and application control (IM, P2P).

Feature

Best of Web security 2013

Readers pick the top Web security products in 2013: Inbound and outbound content filtering, URL filtering and application control (IM, P2P). Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close