Access your Pro+ Content below.
2010 Information Security magazine Readers' Choice Awards
This article is part of the September 2010 issue of Information Security magazine
For the fifth consecutive year, Information Security and SearchSecurity.com readers voted to determine the market's best security products. Almost 1,500 voters participated in the 2010 Readers' Choice Awards, rating products and services in 14 different categories. Respondents were asked to rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores. 2010 READERS' CHOICE AWARDS WINNERS Introduction and Methodology Best Antimalware Products Readers vote on the best business-grade desktop and server antivirus and antispyware products. Best Authentication Products ...
Access this Pro+ Content for Free!
Features in this issue
For the fifth consecutive year, Information Security readers voted to determine the best security products. Nearly 1,500 voters participated this year, rating products in 14 different categories.
The collaborative nature of Web 2.0 introduces myriad threats to data that must be proactively countered.
What you can expect from this fall's update to the Payment Card Industry Data Security Standard.
Tools help protect privacy but safeguarding personal data in the age of Google and Facebook is getting harder.
Columns in this issue
Embedding security in hardware isn't new, but is it worth an $8 billion investment? Time will tell on the Intel-McAfee acquisition.
Targeted attacks on corporations and their crown jewels have become routine. Companies need to be prepared.
Bruce Schneier and Marcus Ranum debate the risks associated with employees using personal computing devices.