Network Security

2013 SC Magazine US Awards Finalists

READER TRUST AWARDS

Best Anti-Malware Gateway
Products in this category generally are appliances. Their purpose is to act as gateways, usually at the perimeter of the enterprise, protecting against various types of malware attempting to enter the enterprise from outside. These typically centrally managed solutions protect at least against viruses and worms, but may also protect against spam, spyware, phishing emails and other malware.

  • Dell SonicWALL for Dell SonicWALL TZ 215

  • McAfee for McAfee Web Protection

  • Symantec for Symantec Web Gateway

  • Trustwave for Secure Web Gateway

  • Websense for Websense TRITON Security Gateway Anywhere

Best Cloud Computing Security
These technologies are deployed to protect data and/or applications deployed in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers, and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privileged user access and controls or more.
  • IBM for IBM Cloud Security Solutions

  • Juniper Networks for vGW Virtual Gateway

  • Sophos for Sophos SafeGuard 6

  • Symantec for Symantec O3 Cloud Identity and Access Control

  • Trend Micro for Trend Micro Deep Security 9

  • Websense for Websense TRITON Enterprise

Best Computer Forensic Tool
Products in this category fall into two sub-categories: network and media. The network tools must be exclusively intended for forensic analysis of network events/data. If the product is a SIEM with forensic capabilities, it should be placed in the SIEM category. Media tools cover just about all other non-network forensic tools, including those that collect data from media over the network and live forensic tools. This also includes specialized forensic tools that are not intended to analyze network data.

  • AccessData Group for Forensic Toolkit (FTK)

  • FireEye for FireEye Malware Analysis System

  • Guidance Software for EnCase

  • RSA, the security division of EMC, for RSA NetWitness

  • Websense for Websense Cyber Security Intelligence On-Demand

Best Data Leakage Prevention (DLP)
Includes products that help organizations safeguard their intellectual property and customers' critical data persistently – inside and outside the company. Network-based and endpoint data leakage prevention products will be considered. Products should prevent data from unauthorized exit from the network, or protect data on the endpoint – whether the endpoint is connected to a network or not. Products typically are policy-driven and should include scanning of all data, regardless of protocol or application leaving the network, and/or keep track of peripherals, such as removable storage and attached to the endpoint – reporting that inventory to a central location or administrator. All entrants should have the capability of being managed by a centralized administrator. Those products considered part of this category include: network DLP products, which are typically gateways; those products protecting only endpoints; and hybrid products that operate at both the gateway to the network and at the endpoint. Specifically for endpoint DLP, traffic should be monitored and encryption should be available.

  • Dell SonicWALL for Dell SonicWALL E-Class Network Security Appliance (NSA) 8510

  • Identity Finder for Identity Finder

  • RSA, the security division of EMC, for RSA DLP

  • Symantec for Symantec Data Loss Prevention

  • Trend Micro for Trend Micro Integrated Data Loss Prevention

  • Websense for Websense Data Security Suite

Best Database Security Solution
Protecting its critical information is the number one priority for many organizations. An integral component of this is to secure corporate databases. Entries here should include solutions that help customers safeguard mission-critical database environments. Features of these offerings can run the gamut – from encryption to access management to logging and monitoring. Be sure to explain the specific ways the solution protects these corporate crown jewels and the features present to ensure exposures are mitigated.

  • BeyondTrust for PowerBroker Database - Monitor & Audit

  • DB Networks for Adaptive Database Firewall

  • IBM for IBM InfoSphere Guardium 

  • Imperva for Imperva SecureSphere

  • McAfee for McAfee Database Security Solution

Best Email Security Solution
Email security addresses the ability to exchange email messages securely, as well as filter email messages based on content, source or other criteria. Solutions should ensure the privacy of sensitive messages, limit the repercussions of email forgery and manage other aspects of email security within the organization. These products are enterprise-centric and should have, but are not required to have, some form of centralized management. They may include spam filters, junk mail filters, malware filters, unauthorized content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, and more.

  • Barracuda Networks for Barracuda Email Security

  • McAfee for McAfee Email Protection

  • Proofpoint for Proofpoint Enterprise Protection/Proofpoint Enterprise Privacy

  • Symantec for Symantec Messaging Gateway

  • Websense for Websense Email Security Gateway Anywhere

Best Enterprise Firewall
Products in this category are organizational firewalls, not personal firewalls. Firewalls must provide a mechanism to filter incoming and outgoing traffic based on port, protocol, source IP address and destination IP address. All products must have the ability to terminate network traffic based on the above filtering criteria.

  • AT&T for AT&T Network-Based Firewall

  • Check Point Software Technologies for Check Point R75.40

  • Dell SonicWALL for Dell SonicWALL SuperMassive E10800

  • Fortinet for FortiGate-800C

  • Sourcefire for Sourcefire Next-Generation Firewall (NGFW)

Best Fraud Prevention Solution
Given the reliance on the internet by consumers from all walks of life to conduct any number of retail, banking or other transactions, fraud prevention solutions have become critical. Solutions nominated in this category strive to minimize problems with online privacy and security that could lead to fraud and, therefore, impact both the company and the customer. Still an evolving area of information security, there are a slew of solutions and services available that could qualify for consideration in this category – from authentication and enhanced encryption solutions to secure web communication or malware detection offerings.

  • CA Technologies for CA RiskMinder

  • Entrust for Entrust TransactionGuard

  • RSA, the security division of EMC, for RSA Adaptive Authentication

  • Symantec for Symantec Code Signing

  • Trusteer for Trusteer Pinpoint

Best Identity Management Application
Products in this category address the identity management lifecycle in an enterprise environment, including password management, user provisioning and enterprise-access management.

  • CA Technologies for CA IdentityMinder

  • Centrify for Centrify Suite 2012

  • Cyber-Ark Software for Privileged Identity Management Suite

  • IBM Software Group for IBM Security Identity Manager

  • NetIQ for NetIQ Identity Manager 4

Best Intrusion Detection System/Intrusion Prevention System (IDS/IPS) Product
Products in this category monitor networks for malicious behavior and block or prevent those activities. Typically, they are for enterprise deployments, moving well beyond the desktop. Please note: The product is not an email gateway that additionally provides IDS services. Secondary services are permitted, but product may not be classed as a UTM, anti-malware/anti-spam gateway, or other tool not considered to have classic IDS/IPS functionality.

  • Check Point Software Technologies for Check Point IPS Software Blade

  • Dell SonicWALL for Dell SonicWALL SuperMassive E10200

  • HP for HP TippingPoint S7100NX Next Generation Intrusion Prevention System (IPS)

  • IBM for IBM Security Network IPS / Network Protection

  • Sourcefire for Sourcefire Next-Generation IPS (NGIPS)

Best IPsec/SSL VPN
For this category, we are focusing on IPsec and SSL VPN products. IPsec products usually provide encrypted point-to-point (as opposed to end-to-end) remote access using IPsec. SSL VPN products provide encrypted remote access to client machines using the SSL/TLS protocol. Client machines may use either a web browser or a standalone SSL VPN client. The SSL VPN must provide access to a client network – not only a web application interface. Product must support multiple, simultaneous SSL VPN connections. Many of these products are integrated VPN/portal products.

  • Barracuda Networks for Barracuda SSL VPN

  • Dell SonicWALL for Dell SonicWALL Aventail E-Class SRA EX9000

  • HOB for HOB RD VPN blue edition

  • Juniper Networks for MAG Series Junos Pulse Gateways

  • NCP Engineering for NCP Secure Enterprise Management 3.0

Best Managed Security Service
These security offerings provide a turnkey approach to an organization's primary technical security needs. These offerings can be either a co-located device at the client organization facility, or can be a completely outsourced solution where the application to be protected would reside at the vendor's data center.

  • Dell SecureWorks for Dell SecureWorks Managed Security Services

  • IBM for IBM Managed Security Services

  • MANDIANT for MCIRT Managed Defense

  • Verisign for Verisign MalDetector Service

  • Verizon Business for Managed Security Services – Commercial

Best Mobile/Portable Device Security
More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Some examples include iPhones, iPads, Android devices, BlackBerries, and more. Products in this category deal with not only a collapsing perimeter, but also consumer-owned and controlled devices being used to get at corporate resources. At a minimum, these devices likely will require strong endpoint security, point-to-point encryption and more. This is a broad category. If your product is used to secure this type of small device/handheld, it may fit. Security can be for data at rest in the device itself, secure access to data in the enterprise, and encryption for data in motion between the enterprise and the device. It also includes anything from hard disk encryption solutions and tools that track lost mobile devices to USB/thumb drive security solutions.

  • AirWatch for AirWatch MDM/MCM/MAM

  • AVG for AVG AntiVirus FREE for Android

  • Marble Cloud for Marble Access

  • Sophos for Sophos Mobile Control 2.5

  • Symantec for Symantec Mobile Management Suite

Best Multifactor Product
Products here provide enhanced security to end-users or devices by offering credentials for access to an authenticator or authentication server. Software and hardware that specializes in the biometric authentication of users is also included here. These solutions may use a tangible device (something you have) for authentication, and knowledge (something you know) for authentication. For biometrics, the solution provides identification and authentication using any of the following methods: finger/thumb print/retinal scan/voice recognition/hand/palm geometry/facial recognition.

  • CA Technologies for CA AuthMinder

  • Entrust for Entrust IdentityGuard

  • PhoneFactor for PhoneFactor

  • RSA, the security division of EMC, for RSA SecurID

  • Symantec for Symantec VIP

Best NAC product
Protecting host-based computing platforms and network resources from threats that are brought in by employees, vendors, contractors and guests involves a numbers of solutions and policies. From anti-virus and firewalls to IDS/IPS solutions, the products in this category run the gamut. However, to control access to network resources at the endpoint, the tools companies often rely on are network access control (NAC) products. These solutions can be used to validate the existence of certain security measures and validate that they are properly configured and up-to-date. They also can validate the existence of current OS patches and can be used to manage the complexity associated with overseeing permissions and authorizations for various groups of users. Most will integrate with a common directory structure, some will provide local authentication capabilities, while others will match something on the endpoint – such as an agent or MAC address – to the authentication before allowing access to the protected network resources.

  • Bradford Networks for Network Sentry

  • ForeScout Technologies for ForeScout CounterACT

  • StillSecure for StillSecure Safe Access

  • Trustwave for Trustwave NAC

Best Policy Management Solution
These products are used to enforce configuration policies to devices in an enterprise. This can include, but is not limited to, network configuration, encryption configuration, software configuration and hardware configuration. These products are able to audit devices against a policy created by an administrator, as well as have the ability to make policy changes to devices in the enterprise. Important functionality will include compliance management.

  • IBM for IBM Endpoint Manager

  • AirWatch for AirWatch MDM/MCM/MAM

  • NetIQ for NetIQ Secure Configuration Manager

  • SolarWinds for SolarWinds Network Configuration Manager (NCM)

  • Tripwire for Tripwire Enterprise 8.2

Best Security Information/Event Management (SIEM) Appliance
Tools in the security information and event management (SIEM) category are used to collect, aggregate and correlate log data for unified analysis and reporting. Typically, these solutions can take logs from a large number of sources, normalize them and build a database that allows detailed reporting and analysis. While forensic analysis of network events may be a feature of a SIEM, it is not the only feature, nor is it the primary focus of the tool.

  • HP for ArcSight Express

  • IBM Software Group for QRadar SIEM

  • LogRhythm for LogRhythm

  • NetIQ for NetIQ Sentinel 7

  • SolarWinds for SolarWinds Log & Event Manager (LEM)

  • Splunk for Splunk Enterprise

Best UTM Security
Solutions should take an “in-depth” defense approach. Entrants should have an integrated, multifunction endpoint/UTM offering – not a single-function product. These products typically aggregate a wide variety of threat data into a single unified tool. Many organizations define those threat categories as anti-virus, content management, IDS/IPS and spam filtering. The minimum functionality, according to IDC, is IDS/IPS, anti-virus and firewall/VPN. Entrants should meet this IDC-minimum functionality, although they may include anti-malware gateway, anti-spam gateway, anti-phishing gateway and more. Products function at the endpoint or the gateway, or are hybrid gateway/endpoint solutions.

  • Check Point Software Technologies for Check Point 2200 and 4000 Series Appliances

  • Dell SonicWALL for Dell SonicWALL TZ 215

  • Fortinet for FortiGate-100D

  • Sophos for Sophos UTM 9

  • Symantec for Symantec Endpoint Protection

Best Vulnerability Management Tool
These products perform network/device vulnerability assessment and/or penetration testing. They may use active or passive testing, and are either hardware- or software-based solutions that report vulnerabilities using some standard format/reference.

  • GFI Software for GFI LanGuard 2012

  • Qualys for QualysGuard Vulnerability Management

  • Rapid7 for Rapid7 Nexpose Enterprise

  • Tenable Network Security for SecurityCenter

  • Trustwave for TrustKeeper Vulnerability Manager

Best Web Application Firewall
Application firewalls inspect the body of packets and restricts access to legitimate application traffic while blocking access to other parts of the operating system. They typically use deep packet inspection, provide logging and reporting, block real-time traffic, provide alerting capabilities and auto-update features, perform web caching, provide content filtering, offer web-based access to reporting and/or logging, protect traffic from reaching the underlying operating system, and filter application traffic to only legitimate requests.

  • Barracuda Networks for Barracuda Web Application Firewall

  • Dell SonicWALL for Dell SonicWALL SRA Web Application Firewall Service

  • Fortinet for FortiWeb-400C

  • IBM for IBM Security Network IPS/Network Protection

  • Imperva for SecureSphere Web Application Firewall

Best Web Content Management Product
Solutions in this category provide web content filtering for laptops, desktops and, optionally, servers They may block or filter objectionable websites and content, and enlist blacklist, whitelist or both to update the vendor-provided data on which the solution is based.

  • Barracuda Networks for Barracuda Web Security

  • EdgeWave for iPrism Web Security

  • Websense for Websense Web Security Gateway Anywhere


EXCELLENCE AWARDS

Best Customer Service
Support and service of offerings sold are critical components of any contract. For many organizations that seek out help from information security vendors and service providers, the assistance they get from customer service representatives is crucial to the deployment, ongoing maintenance and successful running of the technologies they've bought and to which they have entrusted their businesses and sensitive data. For this new category, we're looking for vendor and service providers that offer stellar support and service – the staff that fulfilled its contracts and maybe even goes a little beyond to ensure that organizations are protected from the many threats launched by today's savvy cyber criminals.

  • Barracuda Networks for Barracuda Customer Service and Support

  • ESoft for eSoft Customer Support

  • Kaspersky Lab Americas for Kaspersky Business Products

  • Qualys for QualysGuard Technical Support

  • Vanguard Integrity Professionals for Vanguard Customer Service


Best Emerging Technology

What cutting-edge technologies are bursting onto the scene with some innovative capabilities to address the newest information security needs facing organizations? This new category welcomes both new vendors and old pros that are looking to provide products and services that look to help shape the future by addressing fast-evolving threats through the creation of these types of offerings. Solutions should have just hit the market in the last six to 12 months and you should have some customers available who can act as references. The company should also have an office in North America and provide ready support and service to customers in this country.

  • Black Lotus for Human Behavior Analysis

  • CipherCloud for CipherCloud Gateway

  • CloudPassage for CloudPassage Halo

  • Microsoft for Enhanced Mitigation Experience Toolkit (EMET) 3.0

  • Pindrop Security for Fraud Detection System

  • Webroot Software for Webroot SecureAnywhere Business - Endpoint Protection

 

Best Enterprise Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning offering will have been a leading solution during the last two years, having helped to strengthen the IT security industry's continued evolution.

  • CA Technologies for CA Technologies Content-Aware Identity and Access Management Suite

  • FireEye for FireEye Malware Protection System

  • Qualys for QualysGuard Enterprise

  • Sourcefire for Sourcefire Next-Generation IPS (NGIPS)

  • Tenable Network Security for SecurityCenter

  • Varonis Systems for Varonis Data Governance Suite


Best Regulatory Compliance Solution

Nominated solutions should help organizations comply with specific regulatory requirements demanded of companies in the health care, financial services and government markets. Solutions should help customers meet mandates noted in such legislation as HIPAA, SOX, GLBA, FISMA, or in guidelines noted by the likes of the FFIEC or the PCI Security Standards Council. Nominees must be prepared to offer references of customers who are engaged in, or have already completed, real, fully-fledged deployments, and should be ready to address specific questions posed to them during the judging process.

  • Agiliance for Agiliance RiskVision with Agiliance Compliance Manager Application

  • Qualys for QualysGuard Policy Compliance

  • RSA, the security division of EMC, for RSA Archer eGRC

  • Symantec for Symantec Control Compliance Suite 11

  • Websense for Websense Data Security Suite

Best Security Company
Nominees should be the tried-and-true, longer-standing companies which have been offering products and services to customers for at least three years. Nominations can come from all sectors. Areas that will be accounted for in the judging process include: product line strength, customer base, customer service/support, research and development, company growth and solvency, innovation and more.

  • Cyber-Ark Software

  • Dell SonicWALL

  • MANDIANT

  • Sophos

  • Sourcefire

  • Verizon

Best SME Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of small to midsized businesses. The winning solution will have been a leading offering during the last two years, having helped to strengthen the IT security industry's continued evolution.

  • AirWatch for AirWatch MDM/MCM/MAM

  • Kaspersky Lab Americas for Kaspersky Endpoint Security for Windows Workstations

  • Qualys for QualysGuard Express

  • Sophos for Sophos UTM 9

  • SpectorSoft for SPECTOR 360

Rookie Security Company of the Year
Nominated companies should be new to the IT security field – offering an initial, strong, flagship product that is within two years of its initial release. Nominees can come from any IT security product/service sector and will be continuing efforts in further product development, customer growth and overall fiscal and employee growth. Please note in your submission the launch date of your initial flagship offering. If this initial offering or any of your other products have been on the market for longer than two years, please do not submit a nomination in this category.

  • Appthority

  • Pindrop Security

  • Seculert

  • Vaultive

  • viaForensics


PROFESSIONAL AWARDS

Best Cyber Security Higher Education Program
The best cyber security undergraduate or higher education program which currently has a cyber security degree program. These are for schools throughout the United States and qualification is based on the quality of instruction, programs and how well these prepare students for the marketplace.

  • Champlain College for Computer Forensics & Digital Investigation Degree Programs

  • Iowa State University for Cyber Security Education Program

  • Kennesaw State University for Bachelor of Business Administration in Information Security and Assurance (BBA-ISA)

  • University of Maryland University College for Cyber Security Degrees and Certificate Programs

 

Best Professional Certification Program
Programs are defined as professional industry groups offering certifications to IT security professionals wishing to receive educational experience and credentials. Entrants can include organizations in the industry granting certifications for the training and knowledge they provide.

  • GIAC - Global Information Assurance Certification for GIAC Security Expert (GSE)

  • GIAC - Global Information Assurance Certification for GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)

  • Information System Audit and Control Association for CRISC (Certified in Risk and Information Systems Control)

  • Information System Audit and Control Association for CISM (Certified Information Security Manager)

  • Information System Audit and Control Association for CISA (Certified Information Systems Auditor)

Best Professional Training Program
Programs are defined as those geared toward strengthening expertise of information security professionals via training by an outside industry expert on secure coding, end-user awareness and more. Entrants can include companies offering such training and which does not conclude with the winning of a particular professional certification.

  • Guidance Software for Guidance Software Training

  • Inspired eLearning for Security Awareness Training

  • (ISC)2 for The (ISC)2 Education Program

  • Secure Ninja for SecureNinja Cyber Security Training Program

  • The SANS Institute for SANS Training


Best Security Team

Contenders should only include end-user teams that have executed and are managing exceptional and strong security programs, which they have built from virtually non-existent ones. The team should have successfully established and implemented an integral and/or innovative/cutting-edge component of their security program, and should have spearheaded various areas of support for its success, such as strong end-user awareness training, good configuration management, and more. Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category.

  • godaddy.com for Go Daddy Security Team

  • Teleperformance Group for Teleperformance Security Team

  • U.S. Department of Homeland Security for ICS-CERT Security Team


CSO of the Year

Contenders should include those who work for end-user companies only. No vendor CSOs will be considered. Nominees are the cream of the crop, having spearheaded a viable IT security program, gained the support of their company's executive leaders, as well as their colleagues, and helped – through their indefatigable efforts – to propel the CISO/CSO position to a footing of influence within their organization and the corporate world as a whole. Specific projects and undertakings, as well as over-arching security programs to propel these various goals, should be noted. Nominees should be prepared to answer further questions during the judging process, offer at least two references, and be open to holding confidential interviews with members of the SC Magazine editorial team, if warranted. Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category.

  • Bobby Dominguez, director, IT security & GRC, PSCU Financial Services

  • Nikk Gilbert, vice president & chief information security officer, CUNA Mutual Group

  • John South, CSO, Heartland Payment Systems

  • Bruce Wignall, CISO, Teleperformance Group

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.