Information Security announces finalists for 2007 Readers' Choice awards

This year more than 1,500 readers weighed in on nearly 350 products. Preview the list of finalists; winners will be revealed in the April 2007 issue of Information Security.

Information Security magazine
Information Security magazine asked its readers to rate the security products used and deployed within their organizations.

More than 1,500 readers weighed in on more than 340 products. Rated by your peers, here are the top 5 finalists in 15 categories.

The winners will be published in the April issue of Information Security.

Information Security 2007 Readers' Choice award categories

  Messaging: Email
  Network Firewall
  Intrusion Detection/Prevention
  Unified Threat Management
  Application Security
  Database Security
  Vulnerability Management
  Risk Policy Management
  Identity and Access Management
  Endpoint Security
  Remote Access

Antimalware: Host and gateway antivirus and antispyware products, host-based intrusion prevention

  • McAfee's VirusScan Enterprise/Anti-Spyware Enterprise
  • McAfee Host Intrusion Prevention
  • Symantec's Symantec AntiVirus Corporate Edition
  • Trend Micro's Trend Micro AV/Anti-Spyware
  • Websense's Websense Enterprise

Messaging: Email: Antispam, AV, content filtering; instant messaging and VoIP security

Network Firewall: Appliances and software-based network firewall products

Intrusion Detection/Prevention: Signature- and anomaly-based intrusion detection and/or prevention and network-based analysis

Unified Threat Management (UTM): Multiple proprietary and third-party security applications, including firewall/VPN, antivirus, IPS, etc., consolidated in a single appliance or software package with common management interface

Wireless: Wireless IDS/IPS, access control and rogue detection products

Application Security: Web application firewalls, application vulnerability assessment and Web services security

Database Security: Database monitoring and vulnerability assessment, data encryption, removable storage and portable device control

SIMs: Security information and/or security event management

Vulnerability Management: Vulnerability management lifecycle, vulnerability assessment and automated patch management

Risk Policy Management: Risk assessment/management, policy management/enforcement, configuration management/enforcement

Authentication: PKI, RADIUS, biometrics, tokens and smart cards

Identity and Access Management: Web SSO, provisioning, user auditing, directories and password management

Endpoint Security: Network access control

Remote Access: IPsec and SSL VPN, thin clients

This was first published in February 2007

Dig Deeper on Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions



Find more PRO+ content and other member only offers, here.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: