Best Cloud Computing Security & Best Computer Forensics Tool

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections. 

Best Cloud Computing Security

These technologies are deployed to protect data and/or applications deployed in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numer­ous for both providers and their customers, and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privi­leged user access and controls or more.

Finalists

  • IBM Corporation for IBM Cloud Security Solutions
  • McAfee for McAfee Cloud Security Platform
  • RSA Security, Inc. for RSA Solution for Cloud Security and Compliance
  • Symantec Corporation for Symantec Endpoint Protection.cloud
  • Trend Micro, Inc. for Trend Micro SecureCloud

Best Computer Forensics Tool

Products in this category fall into two sub-categories: network and media. The network tools must be exclusively intended for forensic analysis of network events/data. If the product is a SIEM with forensic capabilities, it should be placed in the SIEM category. Media tools cover just about all other non-network forensic tools, including those tools that collect data from media over the network and live forensics tools. This also includes specialized forensic tools that are not intended t analyze network data.

Finalists

  • AccessData Group for Forensic Toolkit (FTK)
  • Guidance Software, Inc. for EnCase®
  • MANDIANT for MANDIANT Intelligent Response 2.0
  • Quest Software, Inc. for Quest ChangeAuditor
  • RSA NetWitness for RSA NetWitness 9.6
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.