SC Awards Europe 2014: The first finalists announced

Opinion by SC Staff

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for grabs...

Round oneBest Advanced Persistent Threat (APT) Protection

The hot topic of the past year has been advanced persistent threat (APT). Few now doubt the reality of advanced and well-resourced attackers, from nation states to criminal entities, working away across all vectors, month after month, to infiltrate, exfiltrate and disrupt.  What are the best products and services that we are coming up with to tackle this new threat?

 

The finalists...

 

Lancope StealthWatch System- Best APT Solution

CyberArk Privileged Account Security solution (v8)

Websense TRITON Enterprise

Trend Micro Deep Discovery

FireEye Oculus

Zscaler for APTs

Lumension Endpoint Management and Security Suite

 

Round Two: Best Cloud Computing Security Solution

 

The cloud has too many benefits - in terms of flexibility and cost saving - to be ignored. But it brings with it a host of new security issues that have to be addressed. How can you take advantage of cloud computing while meeting your compliance requirements and ensuring your data is kept safe? 

 

The finalists...

CipherCloud Platform

Trend Micro Deep Security

British Telecommunications Cloud Security Futures

Rapid7 UserInsight

GFI Cloud

Vormetric Encryption

Blue Coat Global Cloud Infrastructure

 

Round Three: Best Web Content Management Solution

For many companies, the website is not just a shop window, it is the engine room – whether they be an online retailer, information provider or online bank. But the increasing complexity of information, customer and client data, and real world transactions mean that security of web content is paramount.

 

The finalists...


Websense Web Security Gateway Anywhere

Clearswift SECURE Web Gateway

Trustwave Secure Web Gateway

GFI WebMonitori

Blue Coat PacketShaper

 

Round Four: Best Data Leakage Prevention (DLP) Solution

Whether it is malicious or accidental, the impact of data leaks can be financial or reputational, and include increasingly punitive fines from regulators. This all adds to security pressure so the race is on to plug those leaks, permanently.

 

The finalists...


Websense Data Security Suite

Prot-On

WatchGuard DLP

DeviceLock

DME

 

Round Five: Best Email Security Solution

While email is unlikely to be the intentional delivery mechanism for sensitive information, the fact is that a lot our valuable data does travel via email, and it needs to be protected when intended, and prevented when not.

 

The finalists...

 

Websense Email Security Gateway Anywhere

AirWatch Mobile Email Management

SonicWALL Hosted Email Security

Halon E-mail Security

Boldon James Email Classifier

Mimecast Email Security

McAfee Email Security

Proofpoint Email Security Solution Award Entry

 

Round Six: Best Encryption Solution

Everyone wants their data encrypted now that the number of prying eyes, and their technical capabilities, have become more prevalent and more competent.  But what approach best suits your needs, is internal encryption necessary and does the customer have to be the only one with the key?

 

The finalists...


CipherCloud Platform

Venafi Director

Boole Server Best Encryption

Vormetric Encryption

CryptoAuditor

 

Round Seven: Best Identity Management Solution

Identity verification is, for many, the crux of ensuring security of data, so that only the chosen few are given access to particular information. But the most secure data has no access whatsoever, and the most accessible has no security, so where on the continuum of usability versus security is the optimum?

 

The finalists...


CyberArk Privileged Account Security solution (v8)

Lieberman Software: Enterprise Random Password Manager

NetIQ Identity Manager 4

Evidian IAM Suite

CA CloudMinder

Centrify Server Suite (Centrify)

Universal Key Manager

 

Round Eight: Best Managed Security Service

Outsourcing may not absolve the tech team of responsibility for breach, but it can greatly increase the scope and depth of capabilities and expertise they are able to deploy, in a way that is scale-able and in line with growth of a business. But the problem is ensuring that you find a partner who understands your business, and who can provide the most appropriate, up-to-date and cost-effective approach to tackling the threats your network faces.

 

The finalists...


Becrypt Remote End User Device Service

Dell SecureWorks

Accumuli Security

F-Secure Protection Service

WideAngle MSS (NTT Com Security)

DOSarrest Security Service

Verdasys Managed Service for Information Protection

 

Round Nine: Best Mobile Security Solution

Everything is mobile, and if you're under 25, it always was. While the advantages of mobile access devices are self-evident, some of the security downsides are not always as obvious – at least to users. From BYOD to personal apps and social networking, the lines are blurring between work and home. As such, smartphones and increasingly popular tablets, like the iPad, all need to be catered for and made secure. Banning them just doesn't work.

 

The finalists...


Accellion kiteworks

Arxan Technologies - Mobile Application Integrity Protection

Becrypt iOS Mobile Device Management

IronKey Workspace W500

AirWatch Enterprise Mobility Management

WatchDox 

Good for Enterprise

 

Round Ten: Best Multi-factor Solution

Passwords may be passe, but authentication remains a key element in ensuring a secure system, with multi-factor solutions demanded for sensitive information, for if the wrong people have access to your most valuable data, then all your spend elsewhere is simply by-passed.

 

The finalists... 


HID Global ActivID Authentication Appliance

Swivel Secure Multifactor Authentication Solution

M-Pin Multifactor Authentication Platform

Encap - Next Generation Authentication Technology

Defender

 

Round Eleven: Best NAC Solution


Network Access Control (NAC) solutions are increasing in sophistication to unify endpoint technology, and while much focus is now on insider threats, the perimeter still needs to be defended by anti-virus, host intrusion, vulnerability assessment, authentication and network security enforcement. And although that approach may be seen as traditional, the options are keeping pace with rapid development of new threats.

 

The finalists...

 

ForeScout CounterACT

Bradford Networks' Network Sentry

Trustwave NAC

Portnox

 

Round Twelve: Best Risk/ Policy Management Solution

 

Most data breaches are not failures of technology, but of people, either because the correct policies were not in place, were not communicated or not followed. So what are the components of a policy that people will follow, that lets them do their job without compromising security at the least – and ideally, enhancing it? And what level of risk is acceptable for your business? Have you even calibrated your risk factors?

 

The finalists...


FireMon SecurityManager

QualysGuard Policy Compliance

Rapid7 ControlsInsight

Venafi Director Platform

AlgoSec Security Management Suite

Skybox Security Risk Policy Solution

Blue Coat Security and Policy Enforcement Center 

 

Round Thirteen: Best SIEM Solution


Security Information and Event Management (SIEM) technology continues to advance with new ways to ensure the generation and analysis of network security alerts in real-time. Whether via software, appliances or managed services, data is increasingly inspected not only for perimeter breach, but to locate and remediate anomalous internal traffic and activity, as well as ensure credible reports are generated for compliance purposes.

 

The finalists...

LogRhythm's SIEM and Security Intelligence Platform

Splunk

ArcSight ESM

McAfee Enterprise Security Manager

AlienVault's Unified Security Management (USM)

 

Round Fourteen: Best UTM Solution

 

As the range and sophistication of threats increases, so does the complexity of unified threat management (UTM) options. These primary network gateway defence solutions continue to offer multiple security functions within a single appliance, handling antivirus, content filtering, intrusion prevention and spam filtering functions in line with the more complex threat environment now faced.

 

The finalists...

WatchGuard XTM 800 Series

Dell™ SonicWALL™ SuperMassive™ Series

FortiGate-200D 

McAfee Next Generation Firewalls (Stonesoft)

Sophos UTM

 

Round Fifteen: Best Vulnerability Management Solution

 

Finding and fixing vulnerabilities is a basic part of ensuring network integrity, and while it may be routine work for a security team to identify, classify, remediate, and mitigate vulnerabilities in their network, the software and firmware options to assist have continued to proliferate and increase in capability, from vulnerability scanners to test automation and patching.

The finalists...

Secunia CSI 7.0

QualysGuard Vulnerability Management

Rapid7 Nexpose

GFI LanGuard 2014

Tenable Network Security - SecurityCenter Continuous View

Skybox Security Vulnerability Management

Lumension Patch and Remediation

 

More finalists to be announced on Monday 24th February...

Topics:

Find this article useful?

Get more great articles like this in your inbox every lunchtime

Upcoming Events