Best Identity Management & Best Intrusion Detection/Prevention

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections. 

Best Identity Management Application

Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

Finalists

  • CA Technologies for CA Identity Manager
  • Cyber-Ark Software, Inc. for Privileged Identity Management Suite/Privileged Session Management
  • IBM for IBM Tivoli  Identity and Access Assurance
  • NetIQ for Novell Identity Manager by NetIQ
  • Quest Software, Inc. for Quest One Identity Solutions

Best Intrusion Detection/Prevention Product

Products in this category monitor networks for malicious behavior and block or prevent those activities. Typically, they are for enterprise deployments, moving well beyond the desktop.

Please note: The product is not an email gateway that additionally provides IDS services. Secondary services are permitted, but product may not be classed as a UTM, anti-malware/anti-spam gateway, or other tool not considered to have classic IDS/IPS functionality.

Finalists

  • Check Point Software Technologies for Check Point IPS Software Blade
  • Cisco Systems for Cisco Intrusion Prevention System
  • Hewlett-Packard Company for HP TippingPoint S6100N Intrusion Prevention System (IPS)
  • McAfee, Inc. for McAfee Network Security Platform
  • Sourcefire for Sourcefire IPS
Share this article:

Sign up to our newsletters

More in News

Research shows vulnerabilities go unfixed longer in ASP

Research shows vulnerabilities go unfixed longer in ASP

A new report finds little difference in the number of vulnerabilities among programming languages, but remediation times vary widely.

Bill would restrict Calif. retailers from storing certain payment data

The bill would ban businesses from storing sensitive payment data, for any long than required, even if it is encrypted.

Amplification, reflection DDoS attacks increase 35 percent in Q1 2014

Amplification, reflection DDoS attacks increase 35 percent in ...

The Q1 2014 Global DDoS Attack Report reveals that amplification and reflection distributed denial-of-service attacks are on the rise.