Best Enterprise Security Solution & Best Regulatory Compliance

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories. Now, let's turn to our Excellence section. 

Best Enterprise Security Solution

This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry's continued evolution.

Finalists

  • Sourcefire for Sourcefire IPS
  • Splunk for Splunk
  • Verdasys for Digital Guardian
  • Websense, Inc. for Websense Web Security Gateway Anywhere
  • WhiteHat Security for Whitehat Sentinel

Best Regulatory Compliance Solution

Nominated solutions should help organizations comply with specific regulatory requirements demanded of companies in the health care, financial services and government markets. Solutions should help customers meet mandates noted in such legislation as HIPAA, SOX, GLBA, FISMA, or in guidelines noted by the likes of the FFIEC or the PCI Security Standards Council. Nominees must be prepared to offer references of customers who are engaged in, or have already completed, real, fully-fledged deployments, and should be ready to address specific questions posed to them during the judging process.

Finalists

  • Agiliance, Inc. for Agiliance® RiskVision™ with Agiliance Compliance Manager Application
  • eEye Digital Security for Retina CS & Regulatory Reporting Packs
  • Modulo for Modulo Risk Manager™ NG
  • Qualys, Inc. for QualysGuard Policy Compliance
  • RSA Security, Inc. for RSA Archer eGRC Suite platform
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

President signs Executive Order to improve payment security

President signs Executive Order to improve payment security

President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other ...

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.