Readers' Choice Awards 2012

Readers' Choice Awards 2012

For the seventh consecutive year, Information Security readers voted to determine the best security products. More than 2,000 voters participated this year, rating products in 14 different categories.

Methodology
Respondents were asked to rate only the products in use in their organization, and rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category.

Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.

Table of contents:

Best of Application Security 2012

Readers vote on the best Application Security products in 2012, including static and dynamic vulnerability scanners, and other source code analysis products and services used during development.

Best of Authentication 2012

Readers vote on the best Authentication products in 2012: Digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. knowledge-based systems, digital certificates, biometrics, cell phone-based authentication.

Best of Email Security 2012

Readers vote on the best Email Security products in 2012: Antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Includes email archiving and e-discovery products and services.

Best of Endpoint Security 2012

Readers vote on the best Endpoint Security products in 2012: Business-grade desktop and server antimalware and endpoint protection suites that include antivirus and antispyware, using signature-, behavior- and anomaly-based detection, whitelisting, host-based intrusion prevention and client firewalls.

Best of Enterprise Firewalls 2012

Readers vote on the best Enterprise Firewall products in 2012: Enterprise-caliber network firewall appliances and software, stateful packet filtering firewalls with advanced application layer/protocol filtering. Includes next-generation firewalls.

Best of Identity and Access Management 2012

Readers vote on the best Identity and Access Management products in 2012: User identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

Best of Intrusion Detection and Prevention 2012

Readers vote on the best Intrusion detection and Prevention products in 2012: Network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based technologies to identify denial-of service, malware and hacker attack traffic patterns.

Best of Network Access Control 2012

Readers vote on the best Network Access Control products in 2012: Appliance, software and infrastructure user and device network access policy creation, compliance, enforcement (802.1X, client-based, DHCP, etc.) and remediation products.

Best of Remote Access 2012

Readers vote on the best Remote Access products in 2012: IPsec VPN, SSL VPN (stand-alone and as part of application acceleration and delivery systems) and combined systems and products, as well as other remote access products and services.

Best of Policy and Risk Management 2012

Readers vote on the best Policy and Risk Management products in 2012: Risk assessment and modelling, and policy creation, monitoring and reporting products and services. IT governance, risk and compliance products, and configuration management.

Best of SIEM 2012

Readers vote on the best SIEM products in 2012: Security information and event management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.

Best of Vulnerability Management 2012

Readers vote on the best Vulnerability Management products in 2012: Network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management, vulnerability lifecycle management.

Best of Web Application Firewalls 2012

Readers vote on the best Web Application Firewalls products in 2012: Standalone Web application firewalls and WAFs that are part of application acceleration/delivery systems.

Best of Web Security 2012

Readers vote on the best Web Security products in 2012: Software and hardware products, hosted Web services for inbound and outbound content filtering for malware activity detection/prevention, static and dynamic URL filtering and application control (IM, P2P, etc.).