[GOLD]
Barracuda Web Application Firewall
Barracuda Networks
If application developers don't employ secure coding
Requires Free Membership to View
[SILVER]
BIG-IP Application Security Manager
F5 Networks
The BIG-IP Application Security Manager
(ASM) uses automated, adaptive policies based on the traffic patterns that it observes. The
straightforward policy implementation, according to F5 Networks, allows companies to reduce overall
operational costs. The readers seem to have agreed. Those surveyed gave it high marks for its
return on investment.
[BRONZE]
Citrix Systems NetScaler Application Firewall
Citrix Systems
Readers had a strong appreciation for the NetScaler Application Firewall's vendor service and
support, as well as its ability to stop attacks and flaws. The Citrix Systems firewall blocks
application-layer attacks based on behaviors--not signatures--that deviate from its security model.
NetScaler's learning engine also generates policy recommendations using similar analysis.
[TRENDS]
"[The consolidation (IBM/Watchfire, HP/SPIDynamics)] that we've seen so far is largely on the
testing side. There will be a natural shift from the testing gear to more proactive automated
prevention products like WAFs, technical frameworks and development tools, which stop
vulnerabilities at an earlier phase." -- Diana Kelley, cofounder, Security Curve
2009 READERS' CHOICE AWARDS
Introduction and Methodology
Best Antimalware Products
Best Application Security Products
Best Authentication Products
Best Data Loss Prevention Products
Best Email Security Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Network Firewalls
Best Risk and Policy Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Security Gateway Products
Best Wireless Security Products
This was first published in September 2009
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation