Where are the gaps in your network? How might bad actors slip in? The answer to those questions evolves just as quickly as the nature of the threats.

The technologies recognized in this category perform network/device vulnerability assessment and/or penetration testing, using such tactics as active or passive testing and either hardware- or software-based solutions to help companies recognize and ultimately mitigate threats to their most valuable assets.