Best Identity Management & Best Intrusion Detection/Prevention

Share this article:

Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections. 

Best Identity Management Application

Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

Finalists

  • CA Technologies for CA Identity Manager
  • Cyber-Ark Software, Inc. for Privileged Identity Management Suite/Privileged Session Management
  • IBM for IBM Tivoli  Identity and Access Assurance
  • NetIQ for Novell Identity Manager by NetIQ
  • Quest Software, Inc. for Quest One Identity Solutions

Best Intrusion Detection/Prevention Product

Products in this category monitor networks for malicious behavior and block or prevent those activities. Typically, they are for enterprise deployments, moving well beyond the desktop.

Please note: The product is not an email gateway that additionally provides IDS services. Secondary services are permitted, but product may not be classed as a UTM, anti-malware/anti-spam gateway, or other tool not considered to have classic IDS/IPS functionality.

Finalists

  • Check Point Software Technologies for Check Point IPS Software Blade
  • Cisco Systems for Cisco Intrusion Prevention System
  • Hewlett-Packard Company for HP TippingPoint S6100N Intrusion Prevention System (IPS)
  • McAfee, Inc. for McAfee Network Security Platform
  • Sourcefire for Sourcefire IPS
Share this article:

Sign up to our newsletters

More in News

Five schools earn NSA's excellence in cyber ops distinction

The schools earned NSA's Centers for Academic Excellence designation for their cyber offerings.

With RATs at their disposal, 419 scammers target businesses

With RATs at their disposal, 419 scammers target ...

A new report reveals how Nigeria's 419 scammers are spreading malware to pocket business funds.

InfoSec pros worried BYOD ushers in security exploits, survey says

InfoSec pros worried BYOD ushers in security exploits, ...

A study by the Information Security Community on LinkedIn found most organizations don't have proper polices and support for BYOD.