For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.
Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category.
Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.
Table of contents:
Readers vote on the best Application Security products in 2012, including static and dynamic vulnerability scanners, and other source code analysis products and services used during development.
Readers vote on the best Authentication products in 2012: Digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. knowledge-based systems, digital certificates, biometrics, cell phone-based authentication.
Readers vote on the best Email Security products in 2012: Antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Includes email archiving and e-discovery products and services.
Readers vote on the best Endpoint Security products in 2012: Business-grade desktop and server antimalware and endpoint protection suites that include antivirus and antispyware, using signature-, behavior- and anomaly-based detection, whitelisting, host-based intrusion prevention and client firewalls.
Readers vote on the best Enterprise Firewall products in 2012: Enterprise-caliber network firewall appliances and software, stateful packet filtering firewalls with advanced application layer/protocol filtering. Includes next-generation firewalls.
Readers vote on the best Identity and Access Management products in 2012: User identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.
Readers vote on the best Intrusion detection and Prevention products in 2012: Network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based technologies to identify denial-of service, malware and hacker attack traffic patterns.
Readers vote on the best Network Access Control products in 2012: Appliance, software and infrastructure user and device network access policy creation, compliance, enforcement (802.1X, client-based, DHCP, etc.) and remediation products.
Readers vote on the best Remote Access products in 2012: IPsec VPN, SSL VPN (stand-alone and as part of application acceleration and delivery systems) and combined systems and products, as well as other remote access products and services.
Readers vote on the best Policy and Risk Management products in 2012: Risk assessment and modelling, and policy creation, monitoring and reporting products and services. IT governance, risk and compliance products, and configuration management.
Readers vote on the best SIEM products in 2012: Security information and event management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
Readers vote on the best Vulnerability Management products in 2012: Network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management, vulnerability lifecycle management.
Readers vote on the best Web Application Firewalls products in 2012: Standalone Web application firewalls and WAFs that are part of application acceleration/delivery systems.
Readers vote on the best Web Security products in 2012: Software and hardware products, hosted Web services for inbound and outbound content filtering for malware activity detection/prevention, static and dynamic URL filtering and application control (IM, P2P, etc.).