Thank you to the bad guys
I don't think I've seen any year where real innovation was more evident, says Technology Editor Peter Stephenson.
GROUP TEST 1 OPENER
These tools address the rash of large-scale attacks and can fend off those to come, says Peter Stephenson, technology editor.
PRODUCT: INDUSTRY INNOVATORS
Access control: Innovators 2015
The approaches to access control have varied over the decades, but today the challenges are greater than ever.
Perimeter defense: Innovators 2015
The perimeter is disappearing.
Virtualization and cloud security: Innovators 2015
We still need the functionality of traditional protections - at least in part - but the manner of deployment is quite different.
Data Protection: Innovators 2015
There would be no need for security on our networks if we didn't care about protecting the data that sit on them and travel on ...
Cyberthreat analysis and intelligence: Innovators 2015
This is an entirely new category and it has become one of the most important areas of next-generation network and data protection.
Next-generation security monitoring and analytics: Innovators 2015
The approaches that each of these Innovators takes is focused on a specific way of viewing the security monitoring and analytics problem.
Security infrastructure: Innovators 2015
The evaporation of the perimeter has made the idea of an infrastructure a bit fuzzy and, certainly, the notion of a surety infrastructure is an ...
Risk and policy management: Innovators 2015
Collecting data needs to be diverse allowing data collection directly off of network devices and from questionnaires and other "soft" sources.
Analysis and testing: Innovators 2015
Our selection in this category is living proof that one doesn't need a big organization to turn out a first-rate product with a lot of ...
Hall of Fame: Innovators 2015
To get to the Hall of Fame an Innovator must have been on our radar for some time and in the year-end Innovators issue for ...