For the fourth consecutive year, Information Security and SearchSecurity.com readers voted to determine the market's...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
best security products. A record 1721 voters participated in the 2009 Readers' Choice Awards, rating 380 products and services in 17 different categories.
Respondents were asked to rate each product based on criteria specific to each category. For each criteria, respondents scored the product on a scale of one (poor) to five (excellent). In addition, each criteria was given a weighted percentage to reflect its importance in that category.
Winners were based on the cumulative weighted responses for each product category criteria. Editors arrived at a product's overall score by calculating the average score it received for each criteria, applying the weighted percentage and adding the adjusted scores.
2009 READERS' CHOICE AWARDS WINNERS
Introduction and Methodology
Best Antimalware Products
Readers vote on the best business-grade desktop and server antivirus and antispyware products.
Best Application Security Products
Readers vote on the best Web application firewalls, static and dynamic Web application vulnerability scanning and source code analysis products and services.
Best Authentication Products
Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards.
Best Data Loss Prevention Products
Readers vote on the best network, client and combined data loss prevention software and appliances for enterprise and midmarket deployments.
Best Email Security Products
Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services.
Best Identity and Access Management Products
Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning.
Best Intrusion Detection and Prevention Products
Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection.
Best Mobile Data Security Products
Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection.
Best Network Access Control Products
Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation.
Best Network Firewalls
Readers vote on the best network firewalls, including enterprise-caliber network firewall appliances and software, and stateful packet filtering firewalls with advanced application/protocol layer filtering.
Best Risk and Policy Management Products
Readers vote on the best risk assessment and modeling, and policy creation, monitoring and reporting products and services. IT governance, risk and compliance products and configuration management products were also considered.
Best Secure Remote Access Products
Readers vote on the best remote access products, including IPsec VPN, SSL VPN, and combined systems and products, as well as other remote access products and services.
Best Security Information and Event Management Products
Security information and event management and log management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.
Best Unified Threat Management Products
Readers voted on the best unified threat management products, including UTM appliances that feature firewall, VPN, gateway antivirusm URL Web filtering and antispam.
Best Vulnerability Management Products
Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability management lifecycle products.
Best Web Security Gateway Products
Readers vote on the best Web security gateway products, including software and hardware, hosted Web services for inbound and outbound content filtering for malware activity detection and prevention.
Best Wireless Security Products
Readers vote on the best wireless security products, including wireless firewalls and UTM devices, wireless access control products, WLAN intrusion and detection systems, and security-enabled wireless infrastructure products.