Products of the Year 2006


This article can also be found in the Premium Editorial Download "Information Security magazine: Best-of-breed: Security Products of the Year: 2006."

Download it now to read this article plus other related content.

Information Security & SearchSecurity.com Products of the year 2006

Choosing Our 2006 Products of the Year


    Requires Free Membership to View

Security and SearchSecurity.com presented 890 readers with a survey of more than 300 security products, divided into 12 categories. Respondents were asked to select the products in each category that they use and had the option of specifying products that did not appear on the list. (The categories and product lists were determined by Information Security and SearchSecurity.com editors.) Respondents were asked to rate each product in six areas: overall quality, performance, features, security, documentation and vendor support/service.

In each area, respondents scored the product on a scale of one (poor) to five (excellent). They also had the ability to opt out of scoring in one or more criteria by indicating that they had "no opinion."

Winners were based on cumulative responses for the six criteria. Editors arrived at a product's overall score by calculating the average number of points it received in all of the evaluation areas. In each category, the highest overall score received the gold medal, the next highest earned the silver medal, and the third highest took the bronze medal.

To prevent products that received a small number of high scores from unduly influencing the results, we instituted a vote qualification minimum: In order to be eligible for award consideration, a product had to be among the top five vote getters in its category.

The three finalists in each category represent the top scores from the top five vote-getters. The gold medal winner received the highest score among the three finalists.

The gold medal winner also had to get at least 25 percent of the total votes.

Emerging Technologies awards were determined by Information Security and SearchSecurity.com editors, who chose three innovative technologies that promise to address a critical security need for enterprises and/or SMBs.

This was first published in February 2006

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: