2016 SC Awards U.S. Finalists: Round Two

2016 SC Awards Logo
2016 SC Awards Logo

TRUST AWARDS

Best Cloud Computing Security Solution
These technologies are deployed to protect data and/or applications in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers – and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can pro­vide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryp­tion capabilities, privileged user access and controls or more.

Zscaler for Zscaler Next Generation Firewall

Skyhigh Networks for Skyhigh Cloud Security manager

Illumio for Illumio Adaptive Security Platform

Netskope for Netskope Active Platform

Dell for Dell Cloud Access Manager 8.1

Best Fraud Prevention Solution
Given the reliance on the internet by consumers from all walks of life to conduct any number of retail, banking or other transactions, fraud prevention solutions have become critical. Tools nominated in this category strive to minimize online privacy and security problems that could lead to fraud and, therefore, impact both the company and the customer. Still an evolving area of information security, there are a slew of solutions and services available that could qualify for consideration in this category – from authentication and enhanced encryption solutions to secure web communication or malware-detection offerings.

Equifax for FraudIQ Manager

RiskIQ for RiskIQ

Splunk for Splunk Enterprise

Easy Solutions for Total Fraud Protection

Sift Science for Sift Science Fraud Prevention

Best Multifactor Solution
Products here provide enhanced security to end-users or devices by offering credentials for access to an authenticator or authentication server. Software and hardware that specializes in the biometric authentication of users is also included here. These solutions may use a tangible device (something you have) for authentication and knowledge (something you know) for authentication. For biometrics, the solution provides identification and authentication using any of the following methods: finger/thumb print/retinal scan/voice recognition/hand/palm geometry/facial recognition.

Yubico for YubiKey NEO

MicroStrategy Usher for Usher Mobile Identity Platform

SecureAuth for SecureAuth IdP

Nok Nok Labs for Nok Nok Labs S3 Suite

RSA, The Security Division of EMC for RSA SecurID

Best Web Application Solution
Application firewalls inspect the body of packets and restrict access to legitimate application traffic while blocking access to other parts of the operating system. They typically use deep-packet inspection, provide logging and reporting, block real-time traffic, provide alerting capabilities and auto-update features, perform web caching, provide content filtering, offer web-based access to reporting and/or logging, protect traffic from reaching the underlying operating system, and filter application traffic to only legitimate requests.

iboss Cybersecurity for iboss Secure Web Gateway

F5 Networks for F5 BIG-IP Application Security Manager (ASM) and F5 Silverline Web Application Firewall (WAF) service

Alert Logic for Alert Logic Web Security Manager

Barracuda for Barracuda Web Application Firewall

Palo Alto Networks for PA-7080

EXCELLENCE AWARDS

Best Enterprise Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry's continued evolution.

Skyhigh Networks for Skyhigh Cloud Security Manager

Digital Shadows for Digital Shadows SearchLight

Cisco for Cisco's AMP Threat Grid

Cyphort for Cyphort Advanced Threat Defense Platform 3.3

Palo Alto Networks for Palo Alto Networks Next-Generation Security Platform

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS