This article can also be found in the Premium Editorial Download "Information Security magazine: The top 2011 security products: Information Security Readers' Choice Awards."
Download it now to read this article plus other related content.
gold winner
Cisco ASA 5500 Series Adaptive Security Appliance
Cisco Systems
The Cisco ASA 5500 Series Adaptive Security Appliance received top honors in this year’s contest, winning high scores from readers
Requires Free Membership to View
The Cisco appliance integrates firewall protection, VPN technology, intrusion prevention, content security and unified communications security. It’s designed to stop attacks before they breach the network perimeter, control network and application activity and protect corporate resources. The product features what Cisco calls “context-aware” firewall protection to provide deeper security insight by correlating real-time global threat intelligence with in-depth local network context. The firewall works to determine who is trying to gain access and what content they’re trying to access.
The Cisco ASA 5500 Series Adaptive Security Appliance also provides fast throughput and high connection setup rates, and its architecture enables customized security services deployment. The product’s remote access capability is integrated with IPS and Web security to ensure secure mobility.
“The UTM market has traditionally been viewed as a niche for SMB due to concerns about performance and best-of-breed functionality. Larger enterprises are becoming more comfortable with multi-function gateways, but what’s generating the most buzz are next-generation firewalls, which combine enterprise firewalls, application controls and intrusion prevention systems -- what a UTM vendor might call UTM-light.”
--Andrew Braunberg, research director, Current Analysis
silver winner
SonicWALL E-Class Network Security Appliance Series
SonicWALL
bronze winner
Check Point UTM-1
CheckPoint Software Technologies
2011 READERS' CHOICE AWARDS WINNERS
Introduction and Methodology
Best Antimalware Products
Best
Authentication Products
Best
Identity and Access Management Products
Best
Intrusion Detection and Prevention Products
Best
Messaging Security Products
Best
Mobile Data Security Products
Best
Network Access Control Products
Best
Policy and Risk Management Products
Best
Secure Remote Access Products
Best
Security Information and Event Management Products
Best
Unified Threat Management Products
Best
Vulnerability Management Products
Best
Web Application Firewalls
Best
Web Security Products
This was first published in September 2011
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation