Access "2011 Information Security magazine Readers' Choice Awards"
This article is part of the September 2011 issue of The top 2011 security products: Information Security Readers' Choice Awards
For the sixth consecutive year, Information Security readers voted to determine the best security products. More than 1,500 voters participated this year, rating products in 14 different categories. Introduction and Methodology Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores. 2011 READERS' CHOICE AWARDS WINNERS Best Antimalware Products Readers vote on the best business-grade desktop and server antivirus and antispyware products. Best Authentication Products Readers vote on the best digital identity ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
2011 Information Security magazine Readers' Choice Awards
by Information Security Staff
Readers pick the best security products.
-
Best authentication products 2011
by Information Security Staff
Readers choose the best authentication products.
-
Best intrusion detection/prevention products 2011
by Information Security Staff
Readers choose the best intrusion detection/prevention products.
-
Best network access control products 2011
by Information Security Staff
ISM readers choose the best network access control products of 2011. See who won the gold.
-
Best secure remote access products 2011
by Information Security Staff
Readers choose the best secure remote access products.
-
Best unified threat management products 2011
by Information Security Staff
Readers choose the best unified threat management products.
-
Best Web application firewalls 2011
by Information Security Staff
Our readers selected their favorite Web application firewalls. See which product took the top spot.
-
Framework for building a vulnerability management lifecycle, program
by Diana Kelley
A robust vulnerability management program requires the integration of inventory, change and configuration management.
-
2011 Information Security magazine Readers' Choice Awards
by Information Security Staff
-
-
Best antimalware products 2011
by Information Security Staff
Readers rank the best antimalware products.
-
Best identity and access management products 2011
by Information Security Staff
Readers choose the best identity and access management products.
-
Best messaging security products 2011
by Information Security Staff
ISM readers choose the best messaging security products of 2011. See which one took home the gold.
-
Best policy and risk management products 2011
by Information Security Staff
Readers choose the best policy and risk management products 2011.
-
Best security information and event management products 2011
by Information Security Staff
Readers choose the best security information and event management products.
-
Best vulnerability management products 2011
by Information Security Staff
Readers choose the best vulnerability management products.
-
Best Web security products 2011
by Information Security Staff
Readers choose the best Web security products
-
Microsoft BlueHat prize wins over Black Hat Crowd
by Robert Westervelt
Security pros say Microsoft’s contest to encourage development of new security technologies for its products is promising.
-
Best antimalware products 2011
by Information Security Staff
-
Columns
-
Ranum chat: Enterprise information security architecture
by Marcus J. Ranum, Contributor
Security expert and Information Security magazine columnist Marcus Ranum continues a new bimonthly feature where he goes one-on-one with a fellow security industry insider. This month, Marcus talks to Gunnar Peterson, managing principal at Arctec Group, where he focuses on distributed systems security for large enterprise systems.
-
Organizations need a new data security model to combat today’s threats
by Phil Gardner and Chris Silva
Modern threats require a fundamental shift in information security away from the fortress mentality.
-
Bring back the lulz by changing up your information security model
by Michael S. Mimoso, Editorial Director
Security needs more lulz, but it’s not happening until we change our protection models, understand how our respective businesses work and concentrate on current threats and adversaries.
-
Ranum chat: Enterprise information security architecture
by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO