This Year's Finalists
The upcoming 2014 SC Awards U.S. in San Francisco will feature some of the most prominent names in the industry. Here's a list of the finalists for the big upcoming event.
Who could our next CISO of the year be? Here's where you find out, along with potential winners in categories that include best email security solution, UTM security solution, the Excellence Award for best emerging technology, and the Professional Award for best security team.
Categories found in this round of finalists include best database security solution, managed security service, SIEM solution, and Excellence Awards for security company and rookie security company of the year.
The categories in this round of finalists include best data leakage prevention solution, risk/policy management solution, Excellence Award for best customer service, Professional Awards for certification program and training program.
The third round of finalists for the upcoming SC Awards U.S. in San Francisco includes categories in best computer forensic solution, identity management solution, NAC solution, web content management solution, and the Excellence Award for best regulatory compliance solution.
This second round of 2014 SC Awards U.S. finalists includes categories for best cloud computing security solution, fraud prevention solution, multifactor solution, web application firewall, and the Excellence Award for best enterprise security solution.
Round one of the 2014 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
Sign up to our newsletters
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Access to 70,000 hacked servers sold on hacker marketplace; industry reacts
- Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components