Information Security

Information Security announces finalists for 2007 Readers' Choice awards

Information Security magazine
Information Security magazine asked its readers to rate the security products used and deployed within their organizations.

More than 1,500 readers weighed in on more than 340 products. Rated by your peers, here are the top 5 finalists in 15 categories.

The winners will be published in the April issue of Information Security.

Information Security 2007 Readers' Choice award categories
  Antimalware

  Messaging: Email
  Network Firewall
  Intrusion Detection/Prevention
  Unified Threat Management
  Wireless
  Application Security
  Database Security
  SIMs
  Vulnerability Management
  Risk Policy Management
  Authentication
  Identity and Access Management
  Endpoint Security
  Remote Access




Antimalware: Host and gateway antivirus and antispyware products, host-based intrusion prevention

  • McAfee's VirusScan Enterprise/Anti-Spyware Enterprise
  • McAfee Host Intrusion Prevention
  • Symantec's Symantec AntiVirus Corporate Edition
  • Trend Micro's Trend Micro AV/Anti-Spyware
  • Websense's Websense Enterprise


Messaging: Email: Antispam, AV, content filtering; instant messaging and VoIP security


Network Firewall: Appliances and software-based network firewall products


Intrusion Detection/Prevention: Signature- and anomaly-based intrusion detection and/or prevention and network-based analysis


Unified Threat Management (UTM): Multiple proprietary and third-party security applications, including firewall/VPN, antivirus, IPS, etc., consolidated in a single appliance or software package with common management interface


Wireless: Wireless IDS/IPS, access control and rogue detection products


Application Security: Web application firewalls, application vulnerability assessment and Web services security


Database Security: Database monitoring and vulnerability assessment, data encryption, removable storage and portable device control


SIMs: Security information and/or security event management


Vulnerability Management: Vulnerability management lifecycle, vulnerability assessment and automated patch management


Risk Policy Management: Risk assessment/management, policy management/enforcement, configuration management/enforcement


Authentication: PKI, RADIUS, biometrics, tokens and smart cards


Identity and Access Management: Web SSO, provisioning, user auditing, directories and password management


Endpoint Security: Network access control


Remote Access: IPsec and SSL VPN, thin clients


This was first published in February 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: