Best enterprise authentication products
The market leaders in the enterprise authentication category faced stiff competition this year from some noteworthy upstarts. Read Now
The votes are tallied. The readers have spoken. Information Security is honoring readers’ picks for the best security hardware, appliances and services in our ninth-annual Readers’ Choice Awards.
We invited readers to complete online surveys in August to identify the top security tools from a list of more than 400 products. We also requested respondents write in and name any products that we may have missed. More than 1,700 IT security professionals cast votes in one or more of this year’s 22 categories and told us which products they can’t live without. New categories in 2014 include Denial-of-Service Products, Threat Intelligence Services and Wireless Network Security Tools.
What sets Information Security Readers' Choice winners apart from products honored with the other industry awards? We ask our survey respondents to only rate the security tools in use in their environment, and then score each product based on criteria specific to the category. For each criterion, respondents score the product on a star scale of one (poor) to five (excellent). Winners are based on the cumulative responses for each product category criterion. This year we are recognizing multiple winners in each category because the top products, according to those surveyed, are just too close to call.