Best Email Security Solution
Email security addresses the ability to exchange email messages with assurance, as well as the ability to filter email messages based on content, source or other criteria. Solutions should ensure the privacy of sensitive messages, limit the repercussions of email forgery, and manage other aspects of safeguarding email within the organization. These products are enterprise-centric and should have, but are not required to have, some form of centralized management. They may include spam filters, junk mail filters, malware filters, unauthorized content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, and more.
Cisco for Email Security Solution
IRONSCALES for IronTraps
Mimecast for Secure Email Gateway
Proofpoint for Email Protection
Trustwave for Secure Email Gateway
Best UTM Security Solution
Given the continuous convergence of the market, we’ve decided to retire some categories this year and integrate a number of individual categories from previous years into this unified threat management (UTM) category. The former categories – Best Enterprise Firewall, Best Intrusion Detection System/Intrusion Prevention System Product, Best IPsec/SSL VPN, Best Anti-Malware Gateway and Best Web Content Management – are now integrated here. As formerly, contenders in the UTM security category should take an “in-depth” defense approach. Entrants should have an integrated, multifunction endpoint/UTM offering – not a single-function product. These products typically aggregate a wide variety of threat data into a single unified tool. Many organizations define those threat categories as anti-malware, content management, IDS/IPS and spam filtering, along with firewall/VPN. Entrants should meet this minimum functionality and can include anti-malware gateway, anti-spam gateway and anti-phishing gateway, as well as provide web content filtering for laptops, desktops and, optionally, servers that blocks or filters objectionable websites and content.
5nine Software for Cloud Security
Entensys for UserGate UTM
SonicWALL for TZ Firewall Series
Sophos for UTM
WatchGuard Technologies for FireBox T70
Best Emerging Technology
What cutting-edge technologies with some innovative capabilities are bursting onto the scene to address the newest information security needs facing organizations? This category welcomes both new vendors and old pros looking to provide products and services that look to help shape the future by addressing fast-evolving threats through the creation of these types of offerings. Solutions should have just hit the market in the last six to 12 months, and entries should have some customers available who can act as references. The company should also have an office in North America and provide ready support and service to customers in this country.
Cylance for CylancePROTECT
Exabeam for User Behavior Intelligence Platform
Flashpoint for Flashpoint Platform
Javelin Networks for Javelin ZeroMove
Trusona for Cloud Identity Suite
Contenders should include those who work for end-user companies only. No vendor CSOs will be considered. Nominees are the cream of the crop, having spearheaded a viable IT security program, gained the support of their company’s executive leaders, as well as their colleagues, and helped – through their indefatigable efforts – to propel the CISO/CSO position to a footing of influence within their organization and the corporate world as a whole. Specific projects and undertakings, as well as over-arching security programs to propel these various goals, should be noted. Nominees should be prepared to answer further questions during the judging process, offer at least two references, and be open to holding confidential interviews with members of the SC Magazine editorial team, if warranted.
Connie Berrera, CISO at Jackson Health System
Tim Callahan, Senior Vice President, Global Chief Security Officer at Aflac
Emily Heath, Global CISO at AECOM
Pritesh Parekh, VP, Chief Security Officer at Zuora
Myrna Soto, SVP, Global CISO at Comcast Cable