Access your Pro+ Content below.
Security Readers' Choice Awards 2013
This article is part of the October 2013 Vol. 15 / No. 8 issue of Information Security magazine
For the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories. Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion.
Features in this issue
We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.
In this special report, Gartner's Anton Chuvakin uses SIEM processes to show how security monitoring can make or break a SIEM implementation.
Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.
SDN is a design with security as its foundation, and it has the potential to solve traditional networking's glaring security issues.
Columns in this issue
We've tallied the votes in our Readers' Choice Awards 2013. Find out the best security products of the year.
In his inaugural Security Economics column, Peter Lindstrom looks at technology risk management, and how to make the hard decisions pay off.
Iowa State University recruits industry professionals and hackers to provide students with "real-world" security education.