Information Security announces finalists for 2007 Readers' Choice awards

This year more than 1,500 readers weighed in on nearly 350 products. Preview the list of finalists; winners will be revealed in the April 2007 issue of Information Security.

Information Security magazine
Information Security magazine asked its readers to rate the security products used and deployed within their organizations.

More than 1,500 readers weighed in on more than 340 products. Rated by your peers, here are the top 5 finalists in 15 categories.

The winners will be published in the April issue of Information Security.

Information Security 2007 Readers' Choice award categories
  Antimalware

  Messaging: Email
  Network Firewall
  Intrusion Detection/Prevention
  Unified Threat Management
  Wireless
  Application Security
  Database Security
  SIMs
  Vulnerability Management
  Risk Policy Management
  Authentication
  Identity and Access Management
  Endpoint Security
  Remote Access




Antimalware: Host and gateway antivirus and antispyware products, host-based intrusion prevention

  • McAfee's VirusScan Enterprise/Anti-Spyware Enterprise
  • McAfee Host Intrusion Prevention
  • Symantec's Symantec AntiVirus Corporate Edition
  • Trend Micro's Trend Micro AV/Anti-Spyware
  • Websense's Websense Enterprise


Messaging: Email: Antispam, AV, content filtering; instant messaging and VoIP security


Network Firewall: Appliances and software-based network firewall products


Intrusion Detection/Prevention: Signature- and anomaly-based intrusion detection and/or prevention and network-based analysis


Unified Threat Management (UTM): Multiple proprietary and third-party security applications, including firewall/VPN, antivirus, IPS, etc., consolidated in a single appliance or software package with common management interface


Wireless: Wireless IDS/IPS, access control and rogue detection products


Application Security: Web application firewalls, application vulnerability assessment and Web services security


Database Security: Database monitoring and vulnerability assessment, data encryption, removable storage and portable device control


SIMs: Security information and/or security event management


Vulnerability Management: Vulnerability management lifecycle, vulnerability assessment and automated patch management


Risk Policy Management: Risk assessment/management, policy management/enforcement, configuration management/enforcement


Authentication: PKI, RADIUS, biometrics, tokens and smart cards


Identity and Access Management: Web SSO, provisioning, user auditing, directories and password management


Endpoint Security: Network access control


Remote Access: IPsec and SSL VPN, thin clients

This was first published in February 2007

Dig deeper on Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close