SC Awards

2014 SC Awards U.S. Finalists: Round Two

Share

READER TRUST AWARDS

Best Cloud Computing Security Solution
These technologies are deployed to protect data and/or applications in a cloud environment. They may also protect the cloud computing infrastructure itself. Cloud computing security concerns are numerous for both providers and their customers, and include security and privacy worries, compliance issues and legal/contractual problems. Solutions or services in this category can provide for the protection of data or applications in the cloud, protection for traffic flowing between companies and their cloud service providers, policy management and encryption capabilities, privileged user access and controls or more.

  • Check Point Software Technologies for Check Point Virtual Appliance for AWS
  • Juniper Networks for Firefly Host
  • Palo Alto Networks for VM-Series
  • Rapid7 for Rapid7 UserInsight
  • Trend Micro for Deep Security
  • Zscaler for Zscaler Direct-to-Cloud Network


Best Fraud Prevention Solution
Given the reliance on the internet by consumers from all walks of life to conduct any number of retail, banking or other transactions, fraud prevention solutions have become critical. Tools nominated in this category strive to minimize online privacy and security problems that could lead to fraud and, therefore, impact both the company and the customer. Still an evolving area of information security, there are a slew of solutions and services available that could qualify for consideration in this category – from authentication and enhanced encryption solutions to secure web communication or malware-detection offerings.

  • CA Technologies for CA eComMinder with CA RiskMinder
  • Entrust for Entrust TransactionGuard
  • RSA, the security division of EMC, for RSA Silver Tail
  • SpectorSoft for Spector 360 Recon
  • Trusteer for Trusteer Pinpoint Malware Detection and Trusteer Pinpoint Account Takeover (ATO) Detection

Best Multifactor Solution
Products here provide enhanced security to end-users or devices by offering credentials for access to an authenticator or authentication server. Software and hardware that specializes in the biometric authentication of users is also included here. These solutions may use a tangible device (something you have) for authentication, and knowledge (something you know) for authentication. For biometrics, the solution provides identification and authentication using any of the following methods: finger/thumb print/retinal scan/voice recognition/hand/palm geometry/facial recognition.

  • Authentify for Authentify xFA
  • CA Technologies for CA Advanced Authentication
  • Entrust for Entrust IdentityGuard
  • RSA, the security division of EMC, for RSA SecurID
  • Secure Access Technologies for SAT Multi-Factor Proximity Token
  • VASCO Data Security for MYDIGIPASS.COM

Best Web Application Firewall
Application firewalls inspect the body of packets and restrict access to legitimate application traffic while blocking access to other parts of the operating system. They typically use deep-packet inspection, provide logging and reporting, block real-time traffic, provide alerting capabilities and auto-update features, perform web caching, provide content filtering, offer web-based access to reporting and/or logging, protect traffic from reaching the underlying operating system, and filter application traffic to only legitimate requests.

  • Barracuda Networks for Barracuda Web Application Firewall
  • Dell SonicWALL for Dell SonicWALL SRA 7.0 Web Application Firewall
  • Fortinet for FortiWeb-400C
  • Juniper Networks for WebApp Secure
  • Trustwave for Trustwave Web Application Firewall

EXCELLENCE AWARDS

Best Enterprise Security Solution
This includes tools and services from all product sectors specifically designed to meet the requirements of large enterprises. The winning solution will have been a leading solution during the last two years, having helped to strengthen the IT security industry's continued evolution.
  • FireEye for FireEye Oculus
  • ForeScout Technologies for ForeScout CounterACT
  • Radware for Attack Mitigation System
  • Splunk for Splunk Enterprise
  • Tripwire for Tripwire Enterprise Security Suite

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.