Best Network Security Management

Share this article:

Overall Category Winner and Winner for Best Event Management: ArcSight Enterprise Security Management 3.0 from ArcSight

ArcSight's Enterprise Security Management solution serves as security mission control for 20 of the 30 largest government agencies and the Fortune 5 in most industries.

ArcSight ESM ties together all security data generated by multiple disparate security devices in an intelligent system that allows security teams to manage compliance and best practice requirements, communicate the status of security to a broader audience, and gain visibility into insider threats -- all while ensuring protection at the perimeter.

ArcSight ESM enables enterprises, government organizations and managed security service providers to centrally manage information risk more efficiently.

FINALISTS:

• ArcSight for ArcSight Enterprise Security Management (ESM) 3.0

• Intellitactics for Intellitactics Security Manager

• OpenService, Inc. for Security Management Center

• TriGeo Network Security for Tri Geo Security Information Manager

Winner for Best Computer Forensics: Loglogic's Log Management Appliances

LogLogic is the technology leader for log management used for compliance, security and availability. LogLogic offers the world's first platform for automated collection, analysis, reporting and storage of systems data.

The appliance takes ten minutes to install, and provides proof of compliance, secure intrusion detection, and complete forensics capabilities. They also include aggregation of 100 percent log data, automated and standardized platform, behavioral analytics, plug and play capabilities.

FINALISTS:

• Crannog Software Ltd. for NetFlow Tracker

• Guidance Software for Guidance Software Encase Solutions

• LogLogic for LogLogic's Log Management Appliances

• Mantech International Corporation for NetWitness

Winner for Best Policy Management: Enterprise Security Management from Archer Technologies

Archer delivers compliance and risk management solutions that enable organizations to manage the processes required to secure and protect their enterprise according to corporate policies and industry and governmental regulations.

All Archer solutions are built on the highly flexible BITS-certified Archer SmartSuite Framework, empowering customers to easily adapt these solutions to their unique and changing requirements.

FINALISTS:

• Archer Technologies for Enterprise Security Management

• Courion for ComplianceCourier

• Vontu for Vontu 5.0

Winner for Best Security Audit: Core Impact from Core Security Technologies

Core Security Technologies develops strategic solutions that help security-conscious organizations worldwide develop and maintain a proactive process for securing their networks. The company's flagship product, CORE IMPACT, is the first automated penetration testing product for assessing specific information security threats to an organization.

Core's innovative software allows users to mimic the techniques used by hackers, worms or viruses to test the effectiveness of their corporate networks. This solution contains all the benefits of having a professional hacker on staff 24 hours a day.

FINALISTS:

• LogLogic for LogLogic's Log Management Appliances

• nCircle for nCircle IP 360

• Qualys for QualysGuard Consultant

• Trusted Network Technologies for TNT

• Core Security Technologies for Core Impact

Winner for Best Security Management Tool: Intellitactics Security Manager

Intellitactics Security Manager combines threat and incident management with extensive reporting to centralize operational control of the security infrastructure. It consolidates and analyzes events and alerts to accelerate attack response and incident resolution.

Intellitactics Security Manager increases operational productivity, reduces loss resulting from recovery and clean-up associated with internal and external attacks, reduces the cost of audits and mitigates risk without sacrificing business effectiveness.

FINALISTS:

• Archer Technologies for Enterprise Security Management

• Intellitactics for Intellitactics Security Manager

• LANDesk Software Inc. for LANDesk Security Suite 8.6

• OpenService Inc. for Security Management Center

• TriGeo Network Security for TriGeo Security Information Manager

• VigilantMinds for SecureXone

Share this article:
close

Next Article in News

Sign up to our newsletters

More in News

Instagram iOS and Android apps vulnerable to session hijacking

Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.

Report: Hackers stole data from Israeli defense firms

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

Neverquest trojan targets regional banks in Japan

Symantec researchers found a new variant of the banking trojan.