Premium Content

Access "Security Readers' Choice Awards 2013"

SearchSecurity.com Staff Published: 30 Sep 2013

For the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories. Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion. Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Secure file transfer: Send large files fast, but keep your system safe
    secure_file_transfer.png
    E-Handbook

    FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...

  • Is your mobile security strategy combating the wrong enemy?
    ism_0414.png
    E-Zine

    As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...

  • What's the best focus for MDM strategy now?
    best_focus_for_MDM.png
    E-Handbook

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...