2016 SC Awards U.S. Finalists: Round Three

2016 SC Awards Logo
2016 SC Awards Logo

Best Computer Forensic Solution
Products in this category fall into two sub-categories: network and media. The network tools must be exclusively intended for forensic analysis of network events/data. If the product is a SIEM with forensic capabilities, it should be placed in the SIEM category. Media tools cover just about all other non-network forensic tools, including those tools that collect data from media over the network and live forensic tools. This also includes specialized forensic tools that are not intended to analyze network data.

Blue Coat Systems for Blue Coat Security Analytics Platform

Guidance Software for EnCase

AccessData for Forensic Toolkit (FTK)

LogRhythm for Network Monitor

FireEye for Network Forensics Platform and Investigation Analysis Platform

Best Identity Management Solution
Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

CyberArk for CyberArk Privileged Account Security Solution

Dell for Dell One Identity Manager 7.0

Identiv for Identiv Connected Physical Access Manager (ICPAM)

Ping Identity for Identity Defined Security platform

Identity Automation for RapidIdentity


Best NAC Solution
network resources from threats that are brought in by employees, vendors, contractors and guests involves a numbers of solutions and policies. From anti-virus and firewalls to IDS/IPS solutions, the products in this category run the gamut. However, to control access to network resources at the endpoint, the tools companies often rely on are network access control (NAC) products. These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up to date. They also can validate the existence of current OS patches and can be used to manage the complexity associated with overseeing permissions and authorizations for various groups of users. Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.

Cisco for Cisco's Identity Services Engine (ISE)

Cryptzone for AppGate

ForeScout Technologies for ForeScout CounterACT

Pulse Secure for Pulse Policy Secure

Trustwave for Trustwave Network Access Control

Best Behavior Analytics/Enterprise Threat Detection
A still somewhat-emerging category, these products focus on detecting insider threats, targeted attacks and other fraudulent activities by examining human behaviors, sussing out patterns that are then analyzed through the application of algorithms and statistical analysis to detect anomalies that may indicate threats of loss or compromise to organizations' critical data. Offerings in this space are also referred to as so-called “user behavior analytics” products by analyst company Gartner.

Splunk for Splunk UBA

Masergy Communications, Inc. for Unified Enterprise Security (UES)

Rapid7 for UserInsight

Vectra Networks for Vectra Automated Threat Management solution

Gurucul for Gurucul GRA

EXCELLENCE AWARDS

Best Regulatory Compliance Solution
Nominated solutions should help organizations comply with specific regulatory requirements demanded of companies in the health care, retail, educational, financial services and government markets. Solutions should help customers meet mandates noted in such legislation as HIPAA, SOX, GLBA, FISMA, or in guidelines noted by the likes of the FFIEC or the PCI Security Standards Council. Nominees must be prepared to offer references of customers who are engaged in, or have already completed, real, fully fledged deployments, and should be ready to address specific questions posed to them during the judging process.

Agiliance for RiskVision 7.5

Netwrix for Netwrix Auditor

RSA, The Security Division of EMC for RSA Archer GRC

Tenable Network Security for SecurityCenter

Trustwave for Trustwave TrustKeeper

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS