BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Security Readers' Choice Awards 2013

Last updated:September 2013

Editor's note

For the eighth consecutive year, Information Security readers voted to determine the best security products. More than 1,000 readers participated this year, rating products in 19 different categories.

Methodology: Respondents were asked to rate only the products in use in their organization, and then score each product based on criteria specific to each category. For each criterion, respondents scored the product on a star scale of one (poor) to five (excellent). Winners were based on the cumulative responses for each product category criterion.

1Best of 2013

Readers vote on the best Authentication products for 2013: Digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards, knowledge-based systems, digital certificates, biometrics, cell phone-based authentication.

2Best of 2013

Readers vote on the best Cloud Security products for 2013: Services and products designed to secure business use of cloud computing, including data encryption, identity and access management and network security.

3Best of 2013

Readers vote on the best Data Loss Prevention products in 2013: Network, client and combined data leakage prevention software and appliances for enterprise and midmarket deployments, as well as “DLP lite” email-only products.

4Best of 2013

Readers vote on the best Email Security products in 2013: Antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. Includes email archiving and e-discovery products and services.

5Best of 2013

Readers vote on the best Encryption products in 2013: Hardware and software-based file and full-disk encryption, and network encryption products.

6Best of 2013

Readers vote on the best Endpoint Security products in 2013: Business-grade desktop and server antimalware and endpoint protection suites that include antivirus and antispyware, using signature-, behavior- and anomaly-based detection, whitelisting, host-based intrusion prevention and client firewalls.

7Best of 2013

Readers vote on the best Enterprise Firewalls in 2013: Enterprise-caliber network firewall appliances and software, stateful packet filtering firewalls with advanced application layer and protocol filtering.

8Best of 2013

Readers vote on the best Identity and Access Management products in 2013: User identity access privilege and authorization management, single sign-on, user identity provisioning, Web-based access control, federated identity, role-based access management, password management, compliance and reporting.

9Best of 2013

Readers vote on the best Intrusion Detection and Prevention products in 2013: Network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based technologies to identify denial-of service, malware- and hacker-attack traffic patterns.

10Best of 2013

Readers vote on the best Mobile Data Security products in 2013: Smartphone and tablet data protection products including antimalware, mobile access, platform-specific security (Android, iOS, Windows and BlackBerry), mobile device management, mobile application management and mobile application security.

11Best of 2013

Readers vote on the best Network Access Control products in 2013: Appliance, software and infrastructure user and device network access policy creation, compliance, enforcement (802.1X, client-based, DHCP) and remediation products.

12Best of 2013

Readers vote on the best Policy and Risk Management products in 2013: Risk assessment and modeling, and policy creation, monitoring and reporting products and services. Incudes IT governance, risk and compliance products, and configuration management.

13Best of 2013

Readers vote on the best Remote Access products in 2013: IPsec VPN, SSL VPN (stand-alone and as part of application acceleration and delivery systems) and combined systems and products, as well as other remote access products and services.

14Best of 2013

Readers vote on the best SIEM products in 2013: Security information and event management software, appliances and managed services for SMB and enterprise security monitoring, compliance and reporting.

15Best of 2013

Readers vote on the best Unified Threat Management products in 2013: UTM appliances that integrate firewall, VPN, gateway antivirus, URL Web filtering, antispam and more.

16Best of 2013

Readers vote on the best Vulnerability Management products in 2013: Network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management and vulnerability lifecycle management.

17Best of 2013

Readers vote on the best Web Application Firewalls in 2013: Standalone Web application firewalls and WAFs that are part of application acceleration and delivery systems.

18Best of 2013

Readers vote on the best Web Security products in 2013: Software and hardware products, hosted Web services for inbound and outbound content filtering for malware activity detection/prevention, static and dynamic URL filtering and application control (IM, P2P).

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close