This article can also be found in the Premium Editorial Download "Information Security magazine: The top 2011 security products: Information Security Readers' Choice Awards."
Download it now to read this article plus other related content.
Cisco ASA 5500 Series Adaptive Security Appliance
The Cisco ASA 5500 Series Adaptive Security Appliance received top honors in this year’s contest, winning high scores from readers
The Cisco appliance integrates firewall protection, VPN technology, intrusion prevention, content security and unified communications security. It’s designed to stop attacks before they breach the network perimeter, control network and application activity and protect corporate resources. The product features what Cisco calls “context-aware” firewall protection to provide deeper security insight by correlating real-time global threat intelligence with in-depth local network context. The firewall works to determine who is trying to gain access and what content they’re trying to access.
The Cisco ASA 5500 Series Adaptive Security Appliance also provides fast throughput and high connection setup rates, and its architecture enables customized security services deployment. The product’s remote access capability is integrated with IPS and Web security to ensure secure mobility.
“The UTM market has traditionally been viewed as a niche for SMB due to concerns about performance and best-of-breed functionality. Larger enterprises are becoming more comfortable with multi-function gateways, but what’s generating the most buzz are next-generation firewalls, which combine enterprise firewalls, application controls and intrusion prevention systems -- what a UTM vendor might call UTM-light.”
--Andrew Braunberg, research director, Current Analysis
SonicWALL E-Class Network Security Appliance Series
Check Point UTM-1
CheckPoint Software Technologies
2011 READERS' CHOICE AWARDS WINNERS
Introduction and Methodology
Best Antimalware Products
Best Authentication Products
Best Identity and Access Management Products
Best Intrusion Detection and Prevention Products
Best Messaging Security Products
Best Mobile Data Security Products
Best Network Access Control Products
Best Policy and Risk Management Products
Best Secure Remote Access Products
Best Security Information and Event Management Products
Best Unified Threat Management Products
Best Vulnerability Management Products
Best Web Application Firewalls
Best Web Security Products
This was first published in September 2011