Security Architecture, Endpoint/Device Security, Endpoint/Device Security, Network Security, Security Strategy, Plan, Budget, Threat Management, Threat Intelligence, Threat Management, Threat Management, Endpoint/Device Security, Endpoint/Device Security, Endpoint/Device Security

SC Awards Finalists 2017 Round One



Best Advanced Persistent Threat (APT) Protection

An advanced persistent threat (APT) product and/or service provides real-time detection of and protection against intruders gaining access to an enterprise environment to stealthily extract high-value information assets from targeted organizations in manufacturing, financial, national defense and other industries.

Check Point Software Technologies for SandBlast

Cisco for Advanced Malware Protection

CrowdStrike for Falcon

Proofpoint for Targeted Attack Protection (TAP) for Email

SonicWALL for Capture Advanced Threat Protection

Best Mobile Security Solution
More and more employees are using smaller and smaller devices with loads of applications to access corporate data. Some examples include iPhones, iPads, Android devices, BlackBerries and more. Products in this category deal with not only a collapsing perimeter, but also consumer-owned and -controlled devices being used to get at corporate resources. At a minimum, these devices likely will require strong endpoint security, point-to-point encryption and more. This is a broad category. If your product is used to secure this type of small device/handheld, it may fit. Security can be for data at rest in the device itself, secure access to data in the enterprise, and encryption for data in motion between the enterprise and the device. It also includes anything from hard disk encryption solutions and tools that track lost mobile devices to USB/thumb drive security solutions.

KoolSpan for TrustCall

OptioLabs for OptioCore

VASCO Data Security International for DIGIPASS for Apps

VMware for Workspace ONE

Zimperium for Mobile Threat Protection

Best Vulnerability Management Solution
These products perform network/device vulnerability assessment and/or penetration testing. They may use active or passive testing, and are either hardware- or software-based solutions that report vulnerabilities using some standard format/reference.

Barracuda for Vulnerability Manager

Black Duck for Hub

Core Security for Core Vulnerability Insight

RiskSense for RiskSense Platform

Synack for Crowd Security Intelligence


Best SME Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of small- to midsized businesses. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry's continued evolution.

eSentire for Managed Detection and Reponse

DigiCert for CertCentral

Versasec for vSEC:CMS 4.5

Webroot for SecureAnywhere® Business Endpoint Protection

Netsurion for remote-managed security

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.