Access your Pro+ Content below.
'Information Security' readers have voted ...
This article is part of the October 2013 Vol. 15 / No. 8 issue of Information Security magazine
Remember travel without the airline and hotel deals—or the cautionary tales—on aggregation sites? How about finding the local businesses that everyone frequents because of excellent pricing and services before Yelp? Our eighth annual Readers' Choice Awards honor Information Security magazine voters' top security product choices in 19 categories, with the goal of informing readers by reporting how these security technologies and services perform in real-world deployments. We take a unique approach to our Readers' Choice Awards and ask Information Security readers to only vote on the products in use in their respective organizations. We take a unique approach to our Readers' Choice Awards and ask Information Security readers to only vote on the products in use in their respective organizations. The winning technologies are deployed in their networking environments, giving the senior security management that vote on them first-hand knowledge of the products' strengths, potential issues, vendor support and services and, foremost, ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.
In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.
Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues.
Columns in this issue
We've tallied the votes in our Readers' Choice Awards 2013. Find out the best security products of the year.
In his inaugural Security Economics column, Peter Lindstrom looks at technology risk management, and how to make the hard decisions pay off.
Iowa State University recruits industry professionals and hackers to provide students with "real-world" security education.