Best Identity Management & Best Intrusion Detection/Prevention

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections. 

Best Identity Management Application

Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

Finalists

  • CA Technologies for CA Identity Manager
  • Cyber-Ark Software, Inc. for Privileged Identity Management Suite/Privileged Session Management
  • IBM for IBM Tivoli  Identity and Access Assurance
  • NetIQ for Novell Identity Manager by NetIQ
  • Quest Software, Inc. for Quest One Identity Solutions

Best Intrusion Detection/Prevention Product

Products in this category monitor networks for malicious behavior and block or prevent those activities. Typically, they are for enterprise deployments, moving well beyond the desktop.

Please note: The product is not an email gateway that additionally provides IDS services. Secondary services are permitted, but product may not be classed as a UTM, anti-malware/anti-spam gateway, or other tool not considered to have classic IDS/IPS functionality.

Finalists

  • Check Point Software Technologies for Check Point IPS Software Blade
  • Cisco Systems for Cisco Intrusion Prevention System
  • Hewlett-Packard Company for HP TippingPoint S6100N Intrusion Prevention System (IPS)
  • McAfee, Inc. for McAfee Network Security Platform
  • Sourcefire for Sourcefire IPS
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Information sharing requires breaking down barriers, White House cyber guru says

Information sharing requires breaking down barriers, White House ...

The White House has advanced an agenda to promote and facilitate information sharing on security threats and vulnerabilities.

Worm variant of Android ransomware, Koler, spreads via SMS

Worm variant of Android ransomware, Koler, spreads via ...

Upon infection, the Koler variant will send an SMS message to all contacts in the device's address book.

Patch for Windows flaw can be bypassed, prompts temporary fix from Microsoft

Patch for Windows flaw can be bypassed, prompts ...

The Windows zero-day received a patch last week, but the fix can still be bypassed by crafty attackers.