Premium Content

Access "Security Readers' Choice Awards 2013"

SearchSecurity.com Staff Published: 30 Sep 2013

For the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories. Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion. Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Security Readers' Choice Awards 2013 by SearchSecurity.com Staff

      We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.

    • SIEM analytics: Process matters more than products by Anton Chuvakin

      Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.

More Premium Content Accessible For Free

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...