Best Cloud Computing Security & Best Computer Forensics Tool

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections. 

Best Cloud Computing Security

These technologies are deployed to protect data and/or applications deployed in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numer­ous for both providers and their customers, and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privi­leged user access and controls or more.

Finalists

  • IBM Corporation for IBM Cloud Security Solutions
  • McAfee for McAfee Cloud Security Platform
  • RSA Security, Inc. for RSA Solution for Cloud Security and Compliance
  • Symantec Corporation for Symantec Endpoint Protection.cloud
  • Trend Micro, Inc. for Trend Micro SecureCloud

Best Computer Forensics Tool

Products in this category fall into two sub-categories: network and media. The network tools must be exclusively intended for forensic analysis of network events/data. If the product is a SIEM with forensic capabilities, it should be placed in the SIEM category. Media tools cover just about all other non-network forensic tools, including those tools that collect data from media over the network and live forensics tools. This also includes specialized forensic tools that are not intended t analyze network data.

Finalists

  • AccessData Group for Forensic Toolkit (FTK)
  • Guidance Software, Inc. for EnCase®
  • MANDIANT for MANDIANT Intelligent Response 2.0
  • Quest Software, Inc. for Quest ChangeAuditor
  • RSA NetWitness for RSA NetWitness 9.6
Share this article:

Sign up to our newsletters

More in News

Senator Leahy prepares bill to tackle NSA snooping

The bill is set to be introduced on Tuesday.

Malware used to compromise payment cards at Wendy's restaurant in Michigan

Customers who paid with credit and debit cards at a Wendy's in Michigan may have had their payment card compromised if they used it at the restaurant for about a month prior to July 15.

Report: Japan eyes law requiring security incident reporting

Bloomberg says the Japanese government is eyeing cyber security legislation to make companies 'fess up to security incidents impacting users.