Best Email Security Solution
Email security addresses the ability to exchange email messages with assurance, as well as the ability to filter email messages based on content, source or other criteria. Solutions should ensure the privacy of sensitive messages, limit the repercussions of email forgery and manage other aspects of safeguarding email within the organization. These products are enterprise-centric and should have, but are not required to have, some form of centralized management. They may include spam filters, junk mail filters, malware filters, unauthorized content (sometimes called “extrusion protection” or “data leakage protection”), phishing and other types of undesirable content. However, these are not simply anti-spam filters. These email security products should be evaluated on their effectiveness, manageability, non-intrusiveness, ease of use and other factors that impact the implementation of this type of product in the enterprise environment. They typically provide features such as email encryption, digital signatures, automatic shredding of messages and attachments, and more.

  • Barracuda for Barracuda Email Security Service
  • Cisco for Cisco Email Security Appliance
  • McAfee for McAfee Email Protection
  • Proofpoint for Proofpoint Enterprise Protection/Privacy
  • Websense for Triton AP-Email

Best UTM Security Solution
Given the continuous convergence of the market, we've decided to retire some categories this year and integrate a number of individual categories from previous years into this unified threat management (UTM) category. The former categories – Best Enterprise Firewall, Best Intrusion Detection System/Intrusion Prevention System Product, Best IPsec/SSL VPN and Best Anti-Malware Gateway – are now integrated here. As formerly, contenders in the UTM security category should take an “in-depth” defense approach. Entrants should have an integrated, multifunction endpoint/UTM offering – not a single-function product. These products typically aggregate a wide variety of threat data into a single unified tool. Many organizations define those threat categories as anti-malware, content management, IDS/IPS and spam filtering, along with firewall/VPN. Entrants should meet this minimum functionality, although they may include anti-malware gateway, anti-spam gateway, anti-phishing gateway and more. Products function at the endpoint or the gateway, or are hybrid gateway/endpoint solutions.

  • Barracuda for Barracuda Firewall
  • Check Point Software Technologies for Check Point 600 Appliance
  • Dell for Dell SonicWALL Unified Threat Management
  • Fortinet for FortiGate/FortiWiFi-60D-POE
  • Juniper Networks for SRX Series Services Gateways


Best Emerging Technology
What cutting-edge technologies with innovative capabilities are bursting onto the scene to address the newest information security needs facing organizations? This new category welcomes both new vendors and old pros looking to provide products and services that – through the creation of these types of offerings – look to help shape the future by addressing fast-evolving threats. Solutions should have just hit the market in the last six to 12 months, and entries should have some customers available who can act as references. The company should also have an office in North America and provide ready support and service to customers in this country.

  • Cisco for Cisco Advanced Malware Protection
  • Cylance for CylancePROTECT 
  • Palo Alto Networks for Traps Advanced Endpoint Protection
  • Proofpoint for Proofpoint Threat Response
  • Skyhigh Networks for Skyhigh Secure


Best Security Team
Contenders should only include teams from end-user companies that have executed and are managing exceptional and strong security programs, which they have built from virtually non-existent ones. The team should have successfully established and implemented an integral and/or innovative/cutting-edge component of their security program, and should have spearheaded various areas of support for its success, such as strong end-user awareness training, good configuration management, and more.

Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category.

  • Government of New Brunswick for Security Event Management Team 
  • Troy University IT Secure Operations Team for Troy IT SOC
  • Voya Financial for Technology Risk and Security

CSO of the Year
Contenders should include those who work for end-user companies only. No vendor CSOs will be considered. Nominees are the cream of the crop – having spearheaded a viable IT security program; gained the support of their company's executive leaders, as well as their colleagues; and helped – through their indefatigable efforts – to propel the CISO/CSO position to a footing of influence within their organization and the corporate world as a whole. Specific projects and undertakings, as well as over-arching security programs to propel these various goals, should be noted. Nominees should be prepared to answer further questions during the judging process, offer at least two references, and be open to holding confidential interviews with members of the SC Magazine editorial team, if warranted.

Please note: Professionals who work for an IT security vendor, IT reseller or IT consultancies are not eligible for this category

  • Gene Fredriksen, CISO, PSCU
  • Christopher Ipsen, CISO, state of Nevada
  • John Masserini, CISO, MIAX Options
  • Myrna Soto, CISO, Comcast 
  • Bruce Wignall, CISO, Teleperformance Group