Premium Content

Access "Security Readers' Choice Awards 2013"

Issue Overview

Information Security magazine - October 2013 Vol. 15 / No. 8

The winners of the Information Security Readers' Choice Awards 2013 are tallied, and presented in this issue. More than 1,000 readers voted for the best security products in 19 categories, including five new award categories this year: "Cloud Security," "Data Loss Prevention," "Encryption," "Mobile Data Security" and "Unified Threat Management."

The issue also features an in-depth article by Dr. Anton Chuvakin, who discusses SIEM analytics and how to implement processes and best practices to take advantage of the security monitoring capabilities that make these tools effective. VMware's Martin Casado shares his first-hand account of the security foundation of software-defined networking and its implications for network virtualization. We also debut a column on technology risk management and economics this month by security expert Peter Lindstrom, principal of Spire Security.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Security Readers' Choice Awards 2013 by SearchSecurity.com Staff

      We asked Information Security readers to pick the best security products in 19 categories. Find out which products earned top honors in our 2013 Readers' Choice Awards.

    • SIEM analytics: Process matters more than products by Anton Chuvakin

      Expect Microsoft Word to write the next great American novel? Success or failure with SIEM products rests on your security monitoring capabilities.

More Premium Content Accessible For Free

  • Threat intelligence and risk: Why cybersecurity hangs in the balance
    ISM_0614.png
    E-Zine

    As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...

  • How to respond to the latest distributed denial-of-service attacks
    DDOS_attacks.png
    E-Handbook

    All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...

  • Figuring out FIDO as the first products emerge
    ISM_0514.png
    E-Zine

    The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...