Feature

2007 Readers' Choice AwardsMethodology

Ezine

This article can also be found in the Premium Editorial Download "Information Security magazine: Security Products Readers' Choice Awards 2007."

Download it now to read this article plus other related content.

Your Picks for Best Products


1,595 surveyed; 341 products; 15 winners


Information Security and SearchSecurity.com presented 1,595 readers with a survey of 341 security products,

    Requires Free Membership to View

divided into 15 categories. The categories and product lists were determined by Information Security and SearchSecurity.com editors, in consultation with recognized information security experts.

Respondents were asked to rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category. Some criteria were applied in multiple product categories, and one, "Investment ROI--are you getting your money's worth?" was asked in each of the 15 product categories.

Respondents also had the ability to opt out of scoring in one or more criteria by indicating that they had "no opinion."

Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores. In each category, the highest overall score received the gold medal, the next highest earned the silver medal, and the third highest took the bronze medal.

To prevent products that received a small number of high scores from unduly influencing the results, we instituted a vote qualification minimum: In order to be eligible for award consideration, a product had to get at least 25 percent of the number of responses received by the top vote-getter in its category.

Emerging Technologies awards were determined by Information Security and SearchSecurity.com editors, who chose three innovative technologies that address a critical security need for enterprises and/or SMBs.

This was first published in April 2007

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: